1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alborosie
3 years ago
9

so you just gonna bring me a birthday gift on my birthday to my birthday party on my birthday with a birthday gift

Computers and Technology
2 answers:
Vlada [557]3 years ago
8 0

Answer:

um ok happy birthday to you. Jn d Ji Mk dofmf

Marina86 [1]3 years ago
5 0

Answer:

Happy birthday.?

Explanation:

*GLASS BREAKS*

You might be interested in
Joe is a florist and wants to increase his client base. How can he achieve this with the help of a computer?
madam [21]
A because sounds like the correct answer
8 0
3 years ago
Read 2 more answers
Im sad cheer me up please
SSSSS [86.1K]

Answer:

Don't worry !! Everything will be fine

Explanation:

5 0
3 years ago
Read 2 more answers
Advertising managers work on websites used in __________?
Elena-2011 [213]
Campaigns

Hope this is right :-;
3 0
3 years ago
Read 2 more answers
Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and
nikitadnepr [17]

Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users’ needs.Alex been offered

A.Security administrator

Explanation:

  • A security systems administrator handles all aspects of information security and protects the virtual data resources of a company.
  • They are responsible for desktop, mobile, and network security, and are also responsible for installing, administering and troubleshooting an organization's security solutions.
  • A security administrator is the point person for a cybersecurity team.
  • A Security Administrator installs, administers, and troubleshoots an organization's security solutions.
  • The Security Administrator will ensure the network's security, protect against unauthorized access, modification, or destruction, and troubleshoot any access problems

3 0
4 years ago
An analyst receives an alert from the SIEM showing an IP address that does not belong to the assigned network can be seen sendin
lianna [129]

Answer: (A)  Firewall; implement an ACL on the interface

Explanation:

 According to the question, for re-mediate the issue firewall should be implemented the ACL (Access control list) on the given interface. The access control list is one of the type of logic which selectively give permission or deny the number of packet in the system which to through the interface.

Firewall is the type of device that basically examine the traffic in the network system and also make several decisions in the system. ACL is the set of rule which mainly define the route of the packet in the router interface state.

4 0
3 years ago
Other questions:
  • In order to accomplish the same goal, a person can click and hold down the mouse button and drag to the right, or hold Shift and
    5·2 answers
  • Form the recurrence relations (RRs) for the number of vertices and the number of edges of a hypercube of n dimensions, Hn. Solve
    13·1 answer
  • What aspect of web design is Gloria following when she uses the same color
    5·2 answers
  • Computer a has an overall cpi of 1.3 and can be run at a clock rate of 600mhz. computer b has a cpi of 2.5 and can be run at a c
    11·1 answer
  • Jacobson furniture pseudo-code
    8·1 answer
  • John, the network administrator of XYZ Corporation, is interested in changing the format of text from the American Standard Code
    10·1 answer
  • The desktops of computers running the same OS all look the same
    8·1 answer
  • Explaing why the findings are different between a general purpose search engine ( google) and a meta search engine ( ask jeeves)
    9·1 answer
  • PLEASE HURRYYY Suppose your employer wants you to purchase a tablet device that you will use to run the company's custom sales s
    15·2 answers
  • )In a graph represented by adjacency matrix u can find all the neighbours of a given vertices in ____Operations
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!