1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korvikt [17]
3 years ago
15

I NEED TO FIND OUT THE ANSWER!

Computers and Technology
1 answer:
vladimir1956 [14]3 years ago
7 0

Answer:

the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer

You might be interested in
How many categories of bitmap images are there?
seraphim [82]

Answer:

Bitmap images can contain any number of colors but there are four main categories: Line-art. These are images that only contain two colors, usually black and white.

6 0
3 years ago
9 dmz, vpn, vlan where in the network do you place a dmx, why, what attacks are prevented? what does a vpn do, provide an exampl
creativ13 [48]

At the: Firewall, the DMZ is configured in the Organization. Within the firewalls, it is accessible. They have been completed with the intention of adding an additional layer of safety to the organization to protect it.

The DMZ safeguards not only the web server but also the remainder of the network. To allow visitors to the network to access the web server, a security breach must be made.

The DMZ lessens the possible risk caused by this gap. A secure network, protected by the FortiGate, that only permits access if it has been specifically authorized is known as a DMZ network (from the term "demilitarized zone").

In this illustration, a private subnet is used by the DMZ network, which permits access to a web server by internal and external users using distinct addresses while blocking access from the web server to the internal network in the case that the web server is compromised.

To know more about DMZ click on the link:

brainly.com/question/2920815

#SPJ4

7 0
1 year ago
What is the difference between second generation and third generation​
Eduardwww [97]

These were later renamed to "Specialized Technology" and "Simscape Components" to help explain this difference.

Specialized Technology (Second Generation) is a Simulink based library and has been around for longer. It can still connect to Simscape, but in the same way you can connect Simulink models to Simscape -- that is, you need converters and sometimes to break algebraic loops, etc. It also has more dedicated electrical power systems capabilities. If your model will be only power systems, and especially if it's a larger model, I'd recommend this one.

Simscape Components (Third Generation) is built using the Simscape language and therefore connects directly with other Simscape blocks. If you plan to use other Simscape domains like mechanical, hydraulic, etc. I'd recommend this one.

4 0
3 years ago
Select the correct answer.
andriy [413]

Answer:

C. Rulers indicate the margins, tabs, and indents in a presentation slide.

Explanation:

The status bar appears at the bottom of the page, and it never displays options the options to style the slides. And the toolbar never displays the thumbnails of the slides, as well as the document area never provides a list of the commands for creating, formatting or editing the presentations. However, the rules do indicates the margins, tabs, and indents in a presentation slide. Hence C. is the right option.

8 0
3 years ago
____ is a form of software that includes a wide range of built-in functions for statistical, financial, logical, database, graph
Alex17521 [72]

Answer:

The answer is: Spreadsheet

3 0
3 years ago
Other questions:
  • Which of the following is LEAST needed when programming a computer?
    7·1 answer
  • What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?
    15·1 answer
  • In order for Dr. Reynolds to send a CPOE from her office computer system to the computer system at the local hospital, a/an ____
    5·1 answer
  • All of the following are ways to limit what is tracked about you online, except:
    12·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • IDE devices require the use of a controller mounted on the motherboard. True False
    14·2 answers
  • To gain a competitive edge this year, the upper management of a global IT company has decided to focus on customer service, empl
    13·1 answer
  • 4.15 LAB: Password modifier
    14·1 answer
  • I will give Brainliest and Extra points for correct answers!!!
    13·2 answers
  • RAM IS often referred
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!