1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
2 years ago
6

Question # 2

Computers and Technology
1 answer:
CaHeK987 [17]2 years ago
6 0

Answer:

ZeroDivisionError

ValuError

Explanation: Edg 2020-2021

You might be interested in
Why do many administrators choose to use a command line interface on a Linux server?
kozerog [31]
All of the different versions of Linux are the same when using the command line interface.
6 0
3 years ago
Use a colon before a list and put one space after a colon. True False
IceJOKER [234]
True

<span>Colons are used to introduce an item or a list of two or more items. One key thing to remember is that you should always use colons in statements that are complete and never in sentence fragments. In most English style guides that address this matter, only one space is recommended after a colon and no space should be placed before.</span>


5 0
2 years ago
Read 2 more answers
Subscribe to epic beast brothers thank you
nikdorinn [45]
No ono moñón Ik Jkjkjk
5 0
3 years ago
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
11 months ago
Why are the keys on the qwerty keyboard arranged the way they are?
sveticcg [70]
Sholes arranged the keys in their odd fashion to prevent jamming on mechanical typewriters by separating commonly used letter combinations.
7 0
2 years ago
Other questions:
  • Queue is the LIFO structure.<br><br> o True<br><br> o False
    8·1 answer
  • Special programs that facilitate communication between a device and the os are called
    12·1 answer
  • In Alphatech Systems, email software screens incoming messages by organizing them into mailboxes and identifying junk mail. As a
    13·1 answer
  • You start up your laptop while getting a coffee across the room. You hear the usual chimes and doinks as it starts up. When you
    14·2 answers
  • Illusions in physcology​
    14·1 answer
  • Which function of a word processing program enables you to apply a preset formatting
    5·1 answer
  • WILL GIVE BRAINLIEST!!!!!
    8·1 answer
  • Your customer said that understanding the directions is difficult. This is an aspect of
    6·1 answer
  • An epic games service is unavailable at the moment
    8·1 answer
  • What does playstation network is currently undergoing maintenance?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!