1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
11

Blockquote

Computers and Technology
1 answer:
docker41 [41]3 years ago
3 0

Answer:

I don't knowthe answer

Explanation:

I really don't know the answer

You might be interested in
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
What is the origin of the name “breadboard”?
8090 [49]

Answer:

Originally the word referred to a literal bread board, a polished piece of wood used for slicing bread. In the 1970s the solderless breadboard ( a.k.a. plugboard, a terminal array board) became available and nowadays the term "breadboard" is commonly used to refer to these.

7 0
4 years ago
You type. The word "weather" when you ment "whether" when will the writer or word flag this as a misspelling or a grammar proble
xxTIMURxx [149]
Most likely depends on the situation
8 0
3 years ago
Select the correct answer.
Marina86 [1]
C: pie chart is the answer to it
4 0
3 years ago
Read 2 more answers
What is the base of a number system?
Vinvika [58]

A number base is the number of digits or combination of digits that a system of counting uses to represent number. The most commonly used number system is the decimal system, commonly known as base10.

6 0
3 years ago
Other questions:
  • Select three examples of cryptographs. Security tokens Shared-key Malware Firewalls Message authentication code Public-key
    7·2 answers
  • Why is important to maintain a naming convention within the company that is developing computer programs?
    6·1 answer
  • What two names are used to describe the configuration in which internal and ​external dns queries are handled by different dns s
    13·1 answer
  • Dueto working at home, lack of interaction may result in ___________ professionalgrowth.
    14·1 answer
  • Account numbers sometimes contain a check digit that is the result of a mathematical calculation. The inclusion of the digit in
    13·1 answer
  • What type of IPv6 address should you use when you have multiple routers on a subnet and want hosts to use the nearest router for
    10·1 answer
  • Does anyone know to get Google updated if it failed to update?
    12·1 answer
  • To activate Spelling and Grammar check using the ribbon, navigate first to the _____ tab
    14·2 answers
  • Since cam systems regulate and self-mange the manufacturing process, you classify them as
    9·1 answer
  • You are installing a single 802.11g wireless network. The office space is large enough that you need three WAPs. What channels s
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!