1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew-mc [135]
3 years ago
14

ما هي طرق اختبار الخرسانة ​

Computers and Technology
1 answer:
ss7ja [257]3 years ago
4 0

Answer:

,,,,,

Explanation: gyf cdgsge rxtfxcdty tdy

You might be interested in
La computadora es un medio de comunicacion moderno?
kolbaska11 [484]
Moderno = mordern, if It does than yes!
3 0
3 years ago
Why computer science is your favorite
daser333 [38]

The most important aspect of computer science is problem solving, an essential skill for life. Students study the design, development and analysis of software and hardware used to solve problems in a variety of business, scientific and social contexts.

5 0
3 years ago
The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a
ValentinkaMS [17]

Answer:

b. The Safeguards Rule

Explanation:

According to a different source, these are the options that come with this question:

a. The Information Assurance Rule

b. The Safeguards Rule

c. The Safety Rule

d. The Guardian Rule

This rule is called the <em>Safeguards Rule</em>, and it comes from the Gramm–Leach–Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999. This is an act of Congress signed by President Bill Clinton that removed barriers among banking companies, securities companies and insurance companies. This meant that organizations such as commercial banks, investment banks, securities firms, and insurance companies were able to consolidate.

7 0
4 years ago
Read 2 more answers
An organization is assigned a Class-C network 200.120.80.0 and wants to form subnets for its threedepartments: D1 (60hosts), D2
Nataliya [291]

Answer:

D1= 60 HOSTS

network address - 200.120.80.64/26

subnet mask -255.255.255.192/26

D2 = 90 HOSTS

network address - 200.120.80.0/25

subnet mask -255.255.255.128/25

D3 = 90 HOSTS

network address - 200.120.80.128/25

subnet mask -255.255.255.128/25

5 0
4 years ago
MARK YOU THE BRAINLIEST!
AVprozaik [17]

1.) Over 3,000 corporations, charity groups, and government agencies reported data breaches. The majority of the accounts were exposed due to deliberate hacking, which accounted for 40% of the 5,000 occurrences.

2.) It drops By 20% within the 4 years. It goes at a steady pace then drops.

3.) It's a lot simpler. Everything, including databases, is now connected to the internet. This makes it much easier for anyone with the right skill set to access this data from anywhere in the world, with very little equipment or personnel, which is why data breaches caused by hackers are far more common than other types of incidents that would necessitate a lot more resources to access the same data.

4.) Another day, hackers claim responsibility for yet another big data leak. A hacker organization known as ShinyHunters said that it was auctioning 70 million sets of sensitive data reportedly obtained from AT&T only days after a breach at T-Mobile exposed roughly 53 million people's personal information. They are also interested in credit cards. If this trend continues, our social security and life will be jeopardized.

5.)Financial and payment systems have evolved over thousands of years, despite the fact that they are typically regarded of as new phenomenon. Over that time, the way transactions are carried out has changed dramatically, but the core goals have not. For instance, the economic tasks performed by Renaissance Italy's first modern banks are still relevant today.

Hope this helps took a while lol :)

4 0
2 years ago
Other questions:
  • ________ is the gathering, organizing, sharing, and analyzing of the data and information to which a business has access.
    6·1 answer
  • What are the changes in ios 14.2? What are the benefits of the ios developer program? What is next for Apple? Base your answers
    14·1 answer
  • You have decided you want to remove a software application from your computer. what is the first place you should go to do so?
    15·1 answer
  • After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready t
    7·1 answer
  • Does anyone know the answer to this question
    9·1 answer
  • How do Europe and North America address the challenges of jurisdiction when a computer crime involves both continents?
    10·1 answer
  • Please help me on this app how do you take a picture of your work
    14·1 answer
  • Clicking this would navigate among different worksheets
    14·1 answer
  • Describe the conventional method of data processing​
    12·2 answers
  • Rr lyrae stars pulsate, but with shorter periods and lower luminosities than cepheids. true false
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!