1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
3 years ago
15

Text Questions

Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
4 0

Answer:

in file

Explanation:

Download txt
You might be interested in
The process of engineering design typically starts with what ?
klemol [59]

The process of engineering typically starts with brainstorming.
6 0
3 years ago
5. How should you use LinkedIn Answers as a professional?
harkovskaia [24]

The LinkedIn Answers is a component of LinkedIn that allows you to get fast and accurate solutions to your questions. It provides a forum through which you can demonstrate your expertise by offering info to your network. You should use LinkedIn answers to ask and answer questions. Essentially, you should use it to provide examples to your work product, decision making skills, and on an interactive basis.






5 0
3 years ago
Marla wants to transfer photos from her digital camera to her computer. She has plugged the camera's cord into the USB port. Wha
QveST [7]
She needs to make sure the camera is on and working, if she doesn't than it wont tranfer
3 0
3 years ago
Read 2 more answers
______ is the software that blocks a user from being able to access your computer.
antiseptic1488 [7]
The answer is firewall. It is a network security device that observes inbound and outbound network traffic and chooses whether to allow or block specific traffic based on a well-defined set of security rules. Firewalls have been a first line of protection in network security for over 25 years. The firewall present a barrier between measured and secured internal networks that can be trusted and untrusted outside networks, for example the Internet. A firewall can be software, hardware, or even both.
8 0
3 years ago
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
4 years ago
Other questions:
  • You are logged in as a user with limited system privileges, you are the linux system administrator and you have the password to
    5·1 answer
  • HELP AS SOON IS A UNIT TEST WILL GIVE BRAINLIEST
    9·2 answers
  • Plugging in a cable is a good troubleshooting technique. <br> True or false
    5·1 answer
  • "The pkill command terminates _________."
    14·1 answer
  • Ryan is the operations manager for a national financial company. His company is in the process of creating a customer handbook.
    13·1 answer
  • Files with what two file extensions are commonly known as tarballs??
    8·1 answer
  • A presentation has bullet points that move. The presenter wants to use these bullet points in several other places in the presen
    6·1 answer
  • Search engines enable you to
    12·1 answer
  • 12. In cell A14, use the INDEX function and structured references to display the value in the first row and first column of the
    8·1 answer
  • Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router is una
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!