1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
3 years ago
13

To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to

a list of known computer addresses. Which data mining method is being used to protect the network?
Computers and Technology
2 answers:
ioda3 years ago
5 0

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

Bess [88]3 years ago
3 0

Answer:

Deviation detection

Explanation:

You might be interested in
If you have limited means, you...?
WITCHER [35]

Answer:

You have very little or limited amounts of an item(s).

Explanation:

6 0
3 years ago
What is systems integration?
valina [46]

Explanation:

In engineering, system integration is process of bringing various component subsystems together into one single system and also ensuring that these subsystems function as one system together.

In information technology, it is process of linking together various computing systems and various software applications functionally or physically, to act as coordinated whole.

System integrator integrates various discrete systems utilizing variety of techniques.

7 0
4 years ago
I need help Asap!!! So the question is "Compare and contrast Web page and Websites". ​
777dan777 [17]

Answer:

A website is a mix of web pages while a web page is a single entity.

Explanation:

4 0
3 years ago
Create a Python program that:
Charra [1.4K]

Answer:

```

file = open("trips.txt","r")

file = file.split("\n")

trip_date = []

fuel_used = []

miles_traveled = []

for i in file:

   trip_date.append(i.split(", ")[0])

for i in file:

   fuel_used.append(i.split(", ")[1])

for i in file:

   miles_traveled.append(i.split(", ")[2])

```

This should put the data in their own lists (i didn't test it) but im not going to solve everything for you. The rest is for you to tinker with. You shouldn't throw your question at us and expect an answer. This is the most that I will give you.

Explanation:

4 0
3 years ago
What does it mean when the lottery machine says function suppressed after scanning a ticket
WARRIOR [948]

When a machine  says function suppressed after scanning a ticket, it implies that you have won some certain amount.

<h3>What is lottery  wins?</h3>

This term connote that a person has  a winning ticket in a lottery that is often owned by a government.

Note that  if a winning ticket is scanned, the terminal often shows a message just for you and that suppress function implies  that your the ticket has won something.

Learn more about lottery  from

brainly.com/question/9216200

6 0
2 years ago
Other questions:
  • Print a countdown from n to 1 The function below takes one parameter: an integer (begin). Complete the function so that it print
    8·1 answer
  • Five aplications of ict​
    10·1 answer
  • By default, the hyperlink will display the text in the hyperlink itself, such as the web URL. How can this behavior be modified?
    12·1 answer
  • A medium format camera has a large image sensor what benefit will a large sensor have for resulting images. PICK MORE THAN ONE.
    7·1 answer
  • What should you consider when developing your website content?​
    6·2 answers
  • Discuss the important role of remote sensing application in agriculture. Do you think that the use of remote sensing is applicab
    15·1 answer
  • Choose the term that best matches the definition.
    9·1 answer
  • While shopping online, Tucker visits a website that looks outdated and has limited reviews. Which of the following strategies sh
    11·1 answer
  • A program that converts a program to binary all at once and runs the entire program when finished with the conversion.
    5·1 answer
  • Create a program that a professor can use to display a grade for any number of students. Each student's grade is based on four t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!