1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlekseyPX
3 years ago
14

Follow me please.........​

Computers and Technology
1 answer:
devlian [24]3 years ago
4 0

thank you for the free points.

You might be interested in
What is gland? mention it's type​
stealth61 [152]

Answer:

Gland is an organ that makes one or more substances, such as hormones, digestive juices, sweat, tears, saliva, or milk.

TYPES OF GLANDS :

ENDOCRINE glands release the substances directly into the bloodstream.

EXOCRINE glands release the substances into a duct or opening to the inside or outside of the body.

BRAINLIEST PLEASE

5 0
2 years ago
Read 2 more answers
After reviewing device security you learn that a malicious user in an airport
NARA [144]

Answer:

Sniffing.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.

Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.

A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.

Basically, an unauthorized packet sniffer is used to steal user informations.

This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.

In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.

4 0
3 years ago
To change the numbering style for a page number or to specify a number to use as the first page number, _____ should be clicked
Oksi-84 [34.3K]

Answer:

Format Page Number

Explanation:

In order to change the numbering style for  page number or to choose the numbering position or to specify the number to begin with, following the following steps:

a. Go to Insert tab

b. Go to Header & Footer section

c. Click the dropdown icon beside Page Number

d. Select Format Page Number.

7 0
3 years ago
Implement a program that requests the user to enter the x and y coordinates (each between 10 and 10) of a dart and computes whet
igomit [66]

Answer:

Following are the program in the Python Programming Language.

#import math package

from math import sqrt

#define function

def circle(x,y):

 #return the square root

 return sqrt( (x)**2 + (y)**2 )

#get input from the user

x = float(input("Enter first number between -10 and 10: "))

#get input from the user

y = float(input("Enter first number between -10 and 10: "))

#check condition

if(circle(x,y)<8):

 #then, print message

 print("It is in!")

#otherwise

else:

 #print message

 print("It is not in!")

<u>Output:</u>

Enter first number between -10 and 10: 1.5

Enter first number between -10 and 10: 2.6

It is in!

Explanation:

Here, in the following program in the Python Programming Language.

  • Define the function "circle" and pass the argument "x" and "y" then, return square root of x and y.
  • Set a variable "x" which get float type input from the user.
  • Set a variable "y" which get float type input from the user.
  • Set the if conditional statement to check that the function return the value less than 8 then, print the message.
  • Otherwise, it print the following message.
4 0
4 years ago
over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. you need a way to track w
Nuetrik [128]

One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.

<h3>What is a cloud?</h3>

In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.

In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.

Read more on a virtual machine here: brainly.com/question/12060797

#SPJ1

Complete Question:

Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?

A. Enable virtual machine API integration.

B. Rotate the cloud access keys.

C. Deploy an OSI layer 7 firewall.

D. Enable cloud resource activity auditing.

7 0
1 year ago
Other questions:
  • Which of the following jobs are most likely to be in greater demand due to the increasing prevalence of mobile computing? deskto
    13·1 answer
  • Write a class named Averager containing: An instance variable named sum of type integer, initialized to 0. An instance variable
    6·1 answer
  • Cyberlaw consists of: a. only state statutes. b. only federal statutes. c. traditional legal principles that have changed becaus
    6·1 answer
  • What is renewable energy
    13·2 answers
  • Who is the founder of javascript? ​
    14·2 answers
  • Write a c program using loops to generate following output.
    11·1 answer
  • To excel at these professions, you need to be able to combine an eye for elegant design with a mind that delights in efficient o
    8·1 answer
  • The best presentations try to include as much text as possible on each slide true or false ​
    13·1 answer
  • Compare and contrast the advantages and disadvantages of a LAN to a WLAN.
    8·1 answer
  • What is one problem caused by spending too much time studying at your computer? A. It increases stress and negatively affects yo
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!