1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
3 years ago
7

Eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee i need help if your correct brainliest

Computers and Technology
1 answer:
Nastasia [14]3 years ago
6 0

Answer:

sprint? dash? run?

Explanation:

what's the question?

You might be interested in
"explain why professional software is not just the programs that are developed for a customer"
Darina [25.2K]

To put it into simple terms, software is always a continuous process of coding and updating, thus, you will never code and be done. Professional software not only consists of programs that are developed for a client, but also the compilation of documentation, configuration of data, support websites, requirements, design manuals, and evolution to make these programs operational and complete. 

A professionally done software system consists of more than one program and configuration files used to set up these programs.






5 0
3 years ago
Does Kennesaw State University have any computing ethical policy for computer usage? If so - what is it?
Svet_ta [14]

Answer:

The answer to the questions: Does Kennesaw State University have any computing ethical policy for computer usage? If so - what is it? Would be as follows:

1. Yes, Kennesaw State University, a university in Georgia, does have a computing ethical policy that regulates the proper use of the facilities and computing services within the facilities of the university and the use of computing equipment that belongs to the university. This policy is known as the KSU Computer Usage Policy.

2. As said before this policy establishes that the use of computing services are not the right of a person, but rather a privilege afforded to the students, faculty and other people who are present in the university and who may need to use its computing services. The use of the computing services would be whitin this policy as long as it stays inside the delimitations established by federal, state and University policies.

Explanation:

7 0
4 years ago
Fwee Pwoints Fwor You! :3
Fittoniya [83]

Answer:

Hey thanks for them........

8 0
3 years ago
Read 2 more answers
A command is
Alona [7]

Answer:

D

Explanation:

4 0
3 years ago
Which of the following is the definition of red team?
marysya [2.9K]

Answer:

a. An open source port scanning and host detection utility. In a penetration test, this consists of penetration testers who have been given some background knowledge of the infrastructure.

Explanation:

b. Red team is special for checking to penetration test and there is no defend

c. They are not aware that penetration test is happening

d. The process is to check system security infrastructure by trying different types of penetration in unexpected ways.

a. <em>There is a special team created as called Red Team that they try to penetrate to the system with different methods. This test is longer and different then normal tests to detect is a system giving an alert for any action damaging to the system.</em>

3 0
3 years ago
Other questions:
  • According to your textbook, the three major criteria against which to test documents that you locate on the Internet are authors
    8·1 answer
  • Which statement correctly explains why televisions became less bulky?
    6·1 answer
  • Which company became a digital media leader in 2013 as a result of its horizontally integrated distribution system that branched
    12·1 answer
  • What is the purpose of primary manufacturing processes?
    12·2 answers
  • A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the contro
    9·1 answer
  • PHP can be run on Microsoft Windows IIS(Internet Information Server):
    5·1 answer
  • How to do a linear equations
    8·1 answer
  • A video streaming website uses 32-bit integers to count the number of times each video is played. in anticipation of some videos
    14·1 answer
  • Read the Python program below: num1 = int(input()) num2 = 10 + num1 * 2 print(num2) num1 = 20 print(num1) Question 1 When this p
    6·1 answer
  • On React
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!