1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
13

Anyone from qlsor grax herein bs​

Computers and Technology
1 answer:
PIT_PIT [208]3 years ago
7 0

Answer:

No, I don't think I've ever heard of DLS or Grax either if I'm being honest.

May I have brainliest please? :)

You might be interested in
Howard’s In The Process Of Creating A Google Display Campaign And Decides To Use Custom Intent Audiences As A Targeting Option.
Vladimir79 [104]

Answer:

Option 3 and Option 4 i.e., URLs and Keywords are correct.

Explanation:

Howard through the Phase for developing the following display project as well as determines to still use specific Purpose Viewers As just the targeting tool. He would prefer to affect consumer attention, however his limited demographic is not served by such an in-market client group.  

  • Thus, URLs, as well as keywords, are data inputs that Howard sends to better serve his viewer.
  • So, the following are the reason that describe the other options are not appropriate according to the scenario.
6 0
3 years ago
how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
juin [17]

Answer and Explanation:

User Domain:

Risk

  • User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.

Work Station Domain:

  • The workstation domain has some software vulnerability that connects remotely and steals data.
  • A workstation can fail because of lost data.

LAN domain

  • A worm can spread and infect the computer.
  • LAN have some known software vulnerability.
  • An unauthorized access of the organization workstation in

LAN WAN domain

  • LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems.
  • Server can receive the DOS File Transfer protocol can allow uploaded illegal software.

LAN/WAN Domain

  • The boundary between the trusted and untrusted zones.
  • Hacker can penetrate the IT infrastructure and gain access.
  • Week ingress and egress filtering performance.
  • A firewall with the ports open can allow access to the internet.

System Storage Domain:

  • A fire can destroy the data DOC can cripple the organization's email.
  • A database server can be attacked by the injection of SQL and corrupting data.

Remote Access Domain

  • Communication circuit outage the connections
  • Remote communication from the office can be unsecured VPN tunneling between the remote computer and router
5 0
3 years ago
In an advanced word processing program which type of image or graphic is available in a variety of formats and styles?
ira [324]
IS it coding?If not sorry
5 0
3 years ago
Read 2 more answers
True or false A timeline can be used to demonstrate cause and effect relationships.
7nadin3 [17]
A timeline could be used to ssee the effect that relationships have on a person 
4 0
4 years ago
Read 2 more answers
The term, botnet, means _____________. a. a program that performs a repetitive task on a network b. spam sent via email to sprea
marshall27 [118]

Answer:

c. a group of compromised computers connected to a network that attacks other networks

Explanation:

<em>Botnets </em>refer to a group of computers controlled from a single source in which software programs are run. Botnets can be used for several purposes, such as scientific (SETI), or computing corporate purposes; on the other hand, botnets are also used for illegal purposes, for instance hacker run malicious programs in order to attack other networks.

4 0
4 years ago
Other questions:
  • A ____ paragraph places the first character of a text line near the left border of a placeholder.
    14·1 answer
  • Technician A says that a ratio is a comparison between two values. Technician B says that in a compression ratio, the main value
    5·1 answer
  • What is the definition of Simplex transmission and Duplex Transmission?
    9·1 answer
  • Which software is used for cover letters and resumes
    9·2 answers
  • Create an application named TurningDemo that creates instances of four classes: Page, Corner, Pancake, and Leaf. Create an inter
    7·1 answer
  • PLEASE HELLPPPPP EVERYONE IS IGNORING THISSSSSSSSSS
    11·1 answer
  • What does HTML stand for?
    6·2 answers
  • Made from fruit juice, water and sugar, The American version contains milk and cream and sometimes egg white​
    9·1 answer
  • How do you think Beyoncé choreography has/will influence the future of dance?
    9·2 answers
  • Different the policies and protocols in the industry
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!