1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
diamong [38]
3 years ago
5

How many assignments would you have failed without brainly? lol.

Computers and Technology
1 answer:
svetoff [14.1K]3 years ago
7 0
How many assignments would I have failed without brainy? Lol

ALL OF THEM
You might be interested in
Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
Serggg [28]

Answer:

Alumni Groups

Business Organizations

Explanation: i made a 100 on lesson

7 0
3 years ago
By definition, what is the process of reducing security exposure and tightening security controls?
saw5 [17]

Hardening is the technique of reducing security exposure and tightening security controls of software and network devices.

Security is a major concern, when connecting over a network. Through hardening, security of a network is protected from vulnerable activities. Hardening reduces exposures associated with security and provides tight controls for it.

Hardening is typically a collection of tools and techniques that are used to decrease vulnerability in computer software, applications, network devices and infrastructure. The main goal of hardening is to protect security by identifying and eliminating superfluous programs, applications, permissions and access, which in turn, reduces the chances that attackers and malware will gain access over the network ecosystem.

You can learn more about hardening at

brainly.com/question/27912668

#SPJ4

7 0
2 years ago
What are the two biggest strength as a student
aleksandrvk [35]
Knowledge, and your brain.
3 0
3 years ago
Read 2 more answers
Tạo biến
rewona [7]

Answer:

WHERE ARE YOU FROM

Explanation:

TRANSLATE IT TO ENGLISH

5 0
3 years ago
How does the system work for this:
Snowcat [4.5K]

Answer:

it means someone thought your response to something was helpful. :))

Explanation:

8 0
2 years ago
Read 2 more answers
Other questions:
  • Which of these are examples of a Single Sign-On (SSO) service?
    5·1 answer
  • You can combine the algorithms for converting between infix to postfix and for evaluating postfix to evaluate an infix expressio
    13·1 answer
  • GAMER OYUNCU KOLTUĞU % YERLİ
    6·1 answer
  • Use the _______ to add a line or circle to your presentation.
    8·1 answer
  • The chief intellectual property officer (CIPO) is responsible for collecting, maintaining, and distributing the organization's k
    14·1 answer
  • 1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
    12·1 answer
  • Write a program to prompt the user for hours worked to compute a gross pay for an employee, and he is paid 100/hour. If he worke
    7·1 answer
  • Is anyone a robIox moderator?
    13·2 answers
  • The notes added to slides can be seen during the presentation. TRUE OR FALSE​
    13·1 answer
  • Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!