1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elanso [62]
3 years ago
13

Is The answers the computer givesback​

Computers and Technology
1 answer:
Ivanshal [37]3 years ago
8 0

Answer:

i think so if you have a question?????

Explanation:

diablo ka

You might be interested in
What is an RGB value?
jasenka [17]
Color's RGB value indicates its red, green, and blue intensity. Each intensity value is on a scale of 0 to 255, or in hexadecimal from 00 to FF.

RGB values are used in HTML, XHTML, CSS, and other web standards. For more, including visual samples and RGB values, see:
5 0
3 years ago
Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling,
Fittoniya [83]

Answer:

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center <u>aggregation</u> layer.

Explanation:

Consider the given information.

A key point for security and application services is the aggregation layer. In the data centre aggregation layer, the Layer 4 security and application services provide server load balancing, SSL offloading, firewalling, and IPS services.

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center <u>aggregation</u> layer.

7 0
3 years ago
Identify at least three tips you would give to people to stay safe on the Internet so that their information stays secure. Expla
Soloha48 [4]

Answer:

1. Do not give away personal information such as your address, school you go to, or anything like that (obvious reasons

2. Do not share your passwords because people can hack into your things

3. Don't make guessable passwords such as Cookies, ILovePizza, Money

7 0
3 years ago
Read 2 more answers
Rhea is creating a digital textbook. She plans to use features that will help make the book more interesting for learners. Which
musickatia [10]
I would go with c. Audio and visuals catch peoples attention
4 0
3 years ago
Read 2 more answers
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes
lisabon 2012 [21]

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

8 0
3 years ago
Other questions:
  • What is client server relationship is the basic form of what
    6·1 answer
  • Excel assigns the name ____ to the first excel table created in a workbook.
    10·1 answer
  • Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwor
    15·1 answer
  • What is metrical task system algorithm?? and can we use that in online shopping project??
    11·1 answer
  • Advancements in nuclear science have led to technological advances which are both harmful and beneficial. Which would be conside
    15·1 answer
  • 16 to 19 year old drivers are how many more times likely to crash? 1.7,2.7,0.7 ,3.7
    12·2 answers
  • What might be some examples of Digital Citizenship Behavior?
    11·1 answer
  • Which is a concept of the CIA of Computer Security
    7·1 answer
  • Examples of 15 viruses in computer
    10·1 answer
  • Question 8 of 25
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!