1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GarryVolchara [31]
3 years ago
13

To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to

a list of known computer addresses. Which data mining method is being used to protect the network?
Computers and Technology
2 answers:
ioda3 years ago
5 0

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

Bess [88]3 years ago
3 0

Answer:

Deviation detection

Explanation:

You might be interested in
Look plz help :))))))))))))))))))))
andrey2020 [161]

Answer:

false

Explanation:the answer is false

6 0
3 years ago
HELPPP ME PLEASEEE!!
natita [175]
It’s the last one! The key to an effective persuasion is to know what you want and be clear about your response.
4 0
3 years ago
What organization is responsible for the registration of Internet domain names?
harkovskaia [24]

Answer:

C. Internet Corporation for Assigned Names and Numbers.

Explanation:

The Internet Corporation for Assigned Names and Numbers is an institution founded in September, 1998. The ICANN has the role of maintaining internet databases and promoting safe internet operations. The headquarters of this organization is located in Los Angeles, California.

The ICANN is also involved in the registration of  internet domain names, formulating new top-level domains, as well as the maintenance of root name servers.

The ICANN is also actively involved in forming new policies that would see to safe internet activities. The internet protocol address spaces for IPv4 and 6 are numbered by the ICANN.

5 0
4 years ago
MDM consolidates data from various data sources into a __________, which then feeds data back to the applications, thereby creat
Pepsi [2]

Answer:b) Master reference file(MRF)

Explanation: Master reference file is the collection of data that persist the schedules records for the maintenance and administration. It is the UDC version tool .

It helps in the managing the data content present in the database, archiving and tracing any changes on the database over certain time.Master data management is the managing of data's integrity .It  send the collected critical data to the master reference files.

Other given options are incorrect because backup file is for creating data backup, central directory is record of the data of users and other information and data silo is kind of fixed data having the governance of any organization.Thus, these factors don't help in the critical information management.Thus, the correct option is option(b).

3 0
4 years ago
6.3.6: Adding to a Value codehs<br> help i don't know what to do .
QveST [7]

Question:

Write a function that adds together all values from 0 to a given value and returns the final number. For example, if the given value is `4`, you would add 0 + 1 + 2 + 3 + 4

Answer:

In Python:

def add_to_value(n):

   sum = 0

   for i in range(n+1):

       sum = sum + i

   

   return sum

Explanation:

This line defines the function

def add_to_value(n):

This line initializes sum to 0

   sum = 0

The following iteration adds from 0 to n

<em>    for i in range(n+1):</em>

<em>        sum = sum + i</em>

   

This line returns the calculated sum

   return sum

4 0
3 years ago
Other questions:
  • In setting up a small office network, the network administrator decides to assign private IP addresses dynamically to workstatio
    12·1 answer
  • Which step of the machine cycle examines the op-code of the next instruction to be executed?
    12·2 answers
  • Infrared, a wireless connection used in the past prior to bluetooth, was limited because it ________.
    10·1 answer
  • para que sirve los siguientes sistemas operativos : a. Windows 10 b. Apple yosemite c. linux Ubuntu d. Android marshmallow e. IO
    9·1 answer
  • Atms typically use single factor authentication. <br> a. True <br> b. False flashcard
    5·1 answer
  • If you hear that an airplane crashes into the Empire State Building, and you immediately think of the 9/11 terrorist attack on t
    9·1 answer
  • Which statement about comments is false? Select one: a. Lengthy comments can cause poor execution-time performance. b. Comments
    7·1 answer
  • What is the difference between word processing software and presentation software​
    9·1 answer
  • A large, closet-sized computer capable of simultaneously processing data for hundreds or thousands of users is most likely a ___
    14·1 answer
  • Does anyone know how to permanently delete photos on a dell computer? For my cousin.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!