1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luba_88 [7]
3 years ago
7

How do i work this out? does anyone do programming?

Computers and Technology
1 answer:
Pavlova-9 [17]3 years ago
6 0
Answer : No sorry ..
You might be interested in
Create a security management policy that addresses the management and the separation of duties throughout the seven domains of a
klio [65]

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain.

Explanation:

User Domain : The User Domain covers all theusers (of any rank) that haveaccess to the other six domains.

RISKS:

  • User can destroy data in application(intentionally or not) and delete all
  • User can insert infected CD or USBflash drive into the work computer

Workstation Domain : A computer of an individual user where the production takes place

RISKS:

  • The workstation’s OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.
  • A workstation’s hard drive can fail causing lost data

LAN Domain : Contains all of the workstations,hubs, switches, and routers. TheLAN is a trusted zone

RISKS:

  • A worm can spread through the LANand infect all computers in it.
  • LAN server OS can have a knownsoftware vulnerability.

WAN Domain : Stands for Wide Area Network and consists of the Internet and semi-private lines

RISKS:

  • Service provider can have a major network outage.
  • Server can receive a DOS or DDOS attack.
  • A FTP server can allow anonymously uploaded illegal software

LAN / WAN Domain : The boundary between the trusted and un-trusted zones.The zones are filtered with a firewall

RISKS:

  • Weak ingress/egress traffic filteringcan degrade performance.
  • A firewall with unnecessary portsopen can allow access from the Internet

System / Application Storage Domain : This domain is made up of user-accessed servers suchas email and database

RISKS:

  • A fire can destroy primary data
  • A DOS attack can cripple the organization’s email

Remote Access Domain  :The domain in which a mobileuser can access the local network remotely, usually through a VPN

RISKS:

  • Communication circuit outage candeny connection.
  • Remote communication from officecan be unsecured.
  • VPN tunneling between remotecomputer and ingress/egress routercan be hacked
6 0
3 years ago
Select the qualification that is best demonstrated in each example. Trinity recommends investment strategies to customers. Laris
Viefleur [7K]

Answer:

1:decision making skills 2:integrity 3:communication 4:computer skill

Explanation:

got it right on edg 2020

pov: Your behind on classes

7 0
3 years ago
Read 2 more answers
What is the best web browser to use?
tiny-mole [99]
That would depend on what you would like to get out of your experience with the web broswer. Google chrome offers more efficient computational algorhythms, a quicker navigation of the UI, but loses privacy due to the connected google services which can report your data usage if not properly configured.Browsers like firefox offer extension capability (the same as google chrome) and is open sourced, but may be slower to navigate depending on user to user experience.Other browsers i would avoid unless they are: TOR (which is still just a heavily modified and secured version of firefox).
6 0
3 years ago
Read 2 more answers
What is one way that cell merging is used?
sdas [7]
Apply formatting to all cells
5 0
2 years ago
In cell a10 enter a formula using or to display true if net profit before tax in 2019 (cell b5) are greater than 750000(seven hu
mina [271]

The OR Excel function is a function that is used to test several conditions in one statement.

The Excel formula to display true based on the conditions in cell A10 is =OR(B5>750000,C5>750000)

From the question, we have:

  • Cell B5 represents the net profit before tax in 2019
  • Cell C5 represents the net profit before tax in 2020

The syntax of the OR logical function is: =OR([conditions])

So, the Excel formula to display true based on the conditions in cell A10 is =OR(B5>750000,C5>750000)

Read more about Excel formulas at:

brainly.com/question/14820723

4 0
3 years ago
Other questions:
  • How do i fix my this??
    12·2 answers
  • Is a set of standards that define how email is to be processed between mail servers is exactly the same as smtp copies an e-mail
    10·1 answer
  • what is the definition of web search(ing)? when I look it up it keeps trying to give me definitions for search engines but that'
    10·2 answers
  • Suppose that the domestic production of computer games creates enjoyment for those who play the games. Domestic production of co
    14·1 answer
  • If you used a peach as a model of an animal cell, what would the peach's skin represent? A.nucleus B.cell wall C.cytoplasm D.cel
    10·2 answers
  • Match the elements of a web page with their description
    15·2 answers
  • One example of a <br> is the length of a car.
    7·1 answer
  • Tax preparation software can help prepare and file your taxes by _________.
    7·1 answer
  • Which of these would be the best way to inform an employee that they are losing their job?
    13·1 answer
  • What is destination email address​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!