1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
2 years ago
13

To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to

a list of known computer addresses. Which data mining method is being used to protect the network?
Computers and Technology
2 answers:
ioda2 years ago
5 0

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

Bess [88]2 years ago
3 0

Answer:

Deviation detection

Explanation:

You might be interested in
What is the most commen code used in games?
melamori03 [73]
Uw12e72jeu3j3gd72hd21heys1738he73ue73jdba
3 0
2 years ago
Creating a newsletter
pav-90 [236]
This isn’t helpful considering no one knows what type of news letter you want
6 0
2 years ago
Your school has been declared a school of technology
Angelina_Jolie [31]
I don't really understand the meaning of the question. Can you reply and i'll try to help...
7 0
3 years ago
. When would one use the analytic application fraud detection?
vaieri [72.5K]

Answer:Fraud detection through analytical method is used for detection of the fraud transactions,bribe activity etc in companies, business,etc. This techniques helps in the reduction of financial frauds in the organization, have the control over company to protect it,decrease in the fraud associated costs etc.

It has the capability of identifying the fraud which has happened or going to happen through the analytical ways and human interference. The organizations or companies require efficient processing and detection system for identification of such false happening.

4 0
3 years ago
What were the important developments that occurred in photography that facilitated the creation of motion pictures? Two critical
8_murik_8 [283]

Answer:

"A moving picture is an illusion that makes a still photo seem to move. The basic principal behind motion pictures is the fast transition between one picture to the next, almost creating a seamless transition. A flip-book is a good example of this. Another example would be film used for old movies. The film contains negatives of an image which when light is shined through creates a "shadow" of the image. If you quickly transition the film from one image to the next you end up a motion picture."

Explanation:

7 0
2 years ago
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • How can we set the color of a text that acts as a link in a web page​
    10·2 answers
  • Which of the following is a valid call for the generic method declared below? and why?
    9·2 answers
  • A _____ is a machine that changes information from one form into another.
    7·1 answer
  • When elements are placed on the page so that text and graphic elements are evenly distributed you have:
    9·1 answer
  • Assume the existence of a Bank Account class. Define a subclass, Savings Account that contains the following: a double instance
    5·1 answer
  • Which of the following pathways relates to the Architecture and construction career cluster
    7·1 answer
  • Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk
    8·1 answer
  • How would you want to change the copyright laws?
    11·1 answer
  • Trent is researching what it would take to become a pharmaceutical scientist. What academic requirements should he complete?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!