1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
2 years ago
13

To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to

a list of known computer addresses. Which data mining method is being used to protect the network?
Computers and Technology
2 answers:
ioda2 years ago
5 0

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

Bess [88]2 years ago
3 0

Answer:

Deviation detection

Explanation:

You might be interested in
Difference between ancient and modern mode of information <br> transmission
ELEN [110]
Ancient mode of transmission are used by people in the past while modern mode of transmission are used by present people
4 0
3 years ago
Which of the following is the component of the processor that directs and coordinates most of the operations in the computer?A.
drek231 [11]

Answer:

C. control unit.

Explanation:

A processor is a miniaturized central processing unit a in digital system that interconnects and controls the activities of other components in the device.

The components of a microprocessor are the bus, registers, cache memory, arithmetic and logical unit and the central or control unit.

The bus is the transportation medium for all activities in the processor. The registers like the accumulator and the B register are memory locations used to hold the operand of an operation.The cache memory holds data meant for immediate use by the processor. Arithmetic and logical unit carries out the various arithmetic and logical operation in the processor, while the control unit is responsible for handling or managing all activities in the processor.

5 0
3 years ago
"Unicorn designs Inc., a software company, requires its employees to wear a specific color every day of the week. The colors for
marishachu [46]

Answer:

Organizational culture

Explanation:

Organizational culture is a system of shared assumptions, values, and beliefs, which governs how people behave in organizations. These shared values have a strong influence on the people in the organization and dictate how they dress, act, and perform their jobs.

8 0
3 years ago
Read 2 more answers
Each type of text has a purpose for the reader if you were looking to research penguins what type of text would u utilize
dlinn [17]
1. ughhhh not entirely sure but B, 2. again not entirely sure should be B as well and finally 3.is D remember these are not always the answer just most likely what one person thinks
3 0
3 years ago
In 1981, Ian Murphy broke into the AT&amp;T online computer system and changed their clocks, allowing people to make calls durin
poizon [28]
A. intentionally or recklessly disrupt, degrade, or destroy information or services on the computer
5 0
2 years ago
Other questions:
  • What is the outlined area called?
    6·1 answer
  • Which symbol is used to separate a worksheet name from a cell reference?
    10·1 answer
  • Data as a service began with the notion that data quality could happen in a centralized place, cleansing and enriching data and
    15·1 answer
  • Linux would be a good example of?
    6·1 answer
  • What is the purpose of the .NET Framework Class Library? a. it provides pre-written code that can be used by .NET applications b
    13·1 answer
  • What does Pentium means?:/
    7·2 answers
  • WILL MARK BRAINLIEST!!!!!!!!!!!
    6·2 answers
  • Acciones de un lápiz
    7·1 answer
  • What safety do you need to have ready to start a device repair?
    6·1 answer
  • Define CPU and its functions​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!