1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
3 years ago
13

To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to

a list of known computer addresses. Which data mining method is being used to protect the network?
Computers and Technology
2 answers:
ioda3 years ago
5 0

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

Bess [88]3 years ago
3 0

Answer:

Deviation detection

Explanation:

You might be interested in
(I'LL GIVE BRAINLIST)
Afina-wow [57]
The answer is D 
Media production house because she is in animation.
5 0
4 years ago
Read 2 more answers
What can be designed to create annoying glitches or destroy data
Yanka [14]
Viruses can cause this.
3 0
3 years ago
How can rows be added to a table? Check all that apply.
Lubov Fominskaja [6]

Tables are used to display information in a more arranged and organized manner.  

Various ways of adding a row in an already existing table are:

1) By drawing a row in the table using the draw option.

2) By using the insert option under the Table Tools tab.

3) By designing the table with an added row using the Design tab.

<u>Explanation:</u>

In the insert option, go to the extreme right corner. There appears an option of Draw Table. Draw another row and it gets added.  

This tab contains two tabs, Design and Layout that enable you to rapidly arrange your table, embed or erase lines and sections, set the arrangement for cells, and organization the typography of the content in your table.

Thus, a table and its capacity are built up from here on and open for designing.

8 0
3 years ago
Read 2 more answers
HTML coding tells a computer what to do by using a series of?
kkurt [141]

Answer:

Elements

Explanation:

A computer code acts as a medium by which a person can communicate with the computer machine.

One such language is known as HTML or hypertext markup language.  HTML stands for Hypertext markup language which is used to markup the language for web pages in computer.

The HTML series consists of a series of elements which are enclosed in the tags commonly called start tag and a stop tag.

Example <head>  

here,  

the head is a series of elements.

< start-tag

> stop-tag

Thus, element is the correct answer.

5 0
3 years ago
Which statement regarding hard drives is incorrect?
Veseljchak [2.6K]

Answer: I think the answer is

c. solid state drives are less expensive than magnetic hard drives

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • The ___ is the primary storage device of a personal computer. hard drive RAM ROM compact disc
    6·1 answer
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers to the e
    9·1 answer
  • Design an algorithm for finding all the factors of a positive integer. For example, in the case of the integer 12, your algorith
    8·1 answer
  • You have stumbled on an unknown civilization while sailing around the world. The people, who call themselves Zebronians, do math
    11·1 answer
  • (d) What other services beside cloud-based software may be provided by Internet hosts?[1]
    11·1 answer
  • Consider the following class definition.
    7·1 answer
  • What was the name of the first personal computer and what year was it introduced
    7·1 answer
  • Mille gets a text from her friend asking if she wants to come over. It seems like a bit of a hassle to go to her friend's house,
    9·1 answer
  • Which statement is true about biometrics as an authentication method?​
    11·1 answer
  • 3.2.3 What major al able to do? 3.2.4 What major advantage would Printer X have for Tembi who want documents printed? 3.3 If Tem
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!