1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
10

Identify the 1950s programming languages. Choose all that apply.

Computers and Technology
1 answer:
erastova [34]3 years ago
6 0

Answer:????????????????

Explanation: So sorry

You might be interested in
Honey Pots:__________
Mariulka [41]

Answer:

b) A seemingly tempting, but bogus target meant to attract (and distract) hacking attempts.

Explanation:

The name is pretty self explanatory.

4 0
3 years ago
How do you protect the server from modification by non-root users?
Elis [28]

Answer:

We can protect the server from the modification by using the non root users in many ways as follows:

  • By modifying the PHP settings in the server and by using the configured file as, the configuration of the file is basically depend upon the linux and the PHP script.
  • By disabling the URL from the function of file handling that basically accept the local file as the parameters but it also accept the URL.  It can even now get to outer destinations by utilizing fsockopen or any of the CURL capacities.
  • The safe mode  of PHP is presumably probably the best alternative to secure your server however it very well may be prohibitive. Whenever initiated, experimental mode averts access to records not claimed by Apache and access to condition factors and execution of double projects are likewise debilitated.

4 0
3 years ago
You have a large company, and it is important to your business that your employees' work is backed up regularly. Which network w
valkas [14]
Client server network as it has a powerful server which provides all the networks required on the network. Files are usually backed up regularly.

3 0
3 years ago
This type of website, supporting collaborative writing, is designed to allow visitors to use their browser to add, edit, or dele
Daniel [21]
It would be Wiki......
8 0
3 years ago
Give two reasons why network security is the most important issue regarding data centers.
deff fn [24]
Three key concepts of security are integrity, confidentiality, and availability.

Network firewalls are the first line of defense, intended to keep intruders out. Once a system is compromised, all of its data can be accessed, and if a bad actor gains access to one system, they effectively have access to all of the systems. This touches on both system integrity and data confidentiality.

Security is also related to availability, or uptime. If your network is compromised, it may be inaccessible to those who need to use it, making it useless. If I'm working from an office in Chicago, and the company's main DC is in Atlanta, I need the network to remain available to access critical files.
7 0
3 years ago
Other questions:
  • Days of the week are represented as three-letter strings ("Mon", "Tue", "Wed", "Thu", "Fri", "Sat", "Sun"). Write a javaScript f
    14·1 answer
  • HELP PLEASE
    7·2 answers
  • ____ is an object-oriented programming language from Sun Microsystems which allows small programs called applets to be embedded
    13·1 answer
  • Which of the following statements about renting and owning
    6·1 answer
  • Analyze the following code. public class Test { public static void main(String[] args) { double radius; final double PI= 3.15169
    14·1 answer
  • I was killed <br><br> යඞ <br><br> what do i do
    10·1 answer
  • I want to solve this question in C program, Please.
    7·1 answer
  • What is the document that provides basic guidance and regulatory requirements for derivative classification
    9·1 answer
  • A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
    5·1 answer
  • PLZ HELP IM IN A HURRY Select all that apply.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!