1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korvikt [17]
3 years ago
15

I NEED TO FIND OUT THE ANSWER!

Computers and Technology
1 answer:
vladimir1956 [14]3 years ago
7 0

Answer:

the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer

You might be interested in
What is the term for delivering an application over the internet called?
34kurt

Answer:

Cloud computing

Explanation:

7 0
3 years ago
Read 2 more answers
A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is
lakkis [162]

Complete Question:

A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Group of answer choices

A. scanning

B. subrogation

C. delegation

D. targeting

Answer:

A. Scanning.

Explanation:

A step commonly used for Internet vulnerability assessment includes scanning, which occurs when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection.

Internet vulnerability assessment can be defined as the process of defining, analyzing, measuring, identifying, classification and prioritization of vulnerabilities in network resources used to access the internet. The main purpose of an internet vulnerability assessment is to provide necessary informations or data about the threats being posed to an individual or organization through the use of a scanning program or system such as a network security scanner

7 0
3 years ago
What does the Auto Fill tool do?
ki77a [65]
I believe this a microsoft tool it <span>It automatically populates data into cells that reference other cells :)

hope this helps</span>
7 0
4 years ago
Read 2 more answers
What is Geocortex and how does it work in web or mobile?
RoseWind [281]

Explanation:

Geocortex -

Geocortex mobile is the framework which is a native application for the different mobile OS such as iOS, Android, and Windows. It is built on the version of Esri’s ArcGIS Run time SDK for the .NET.

The Geocortex mobile Designer which is a browser-based configuration tool which is designed to simplify the experience combined with the Geocortex mobile, can make this the work leading framework and building the mobile offline apps on the Esri’s ArcGIS Run time .

The Geocortex mobile framework has many features which are building cutting-edge apps from the browser and optimizing the apps for mobile and also offline environments. We can also use the Geocortex Workflow for building the end-user interactions and also for any business process .

6 0
3 years ago
On the following page, write a static method print Short Words that accepts two parameters:_____.
barxatty [35]

Methods in Java are collections of program statements that are named, and executed when called/invoked

The printShortWords method in Java where comments are used to explain each line is as follows:

//This defines the static method

public static void printShortWords(String str, int maxLength){

    //This iterates through each word in the string

    for(String word: str.split(" ")){

        //The compares the length of each word to maxLength

        if(word.length()<=maxLength){

            //If the length of the current word is atleast maxLength, the word is printed

        System.out.print(word+" ");

        }

    }

}

Read more about static methods at:

brainly.com/question/19360941

7 0
2 years ago
Other questions:
  • As the European powers grew more industrialized, their colonies became very important as sources of A)slave labor. B)raw materia
    12·2 answers
  • What is SAFFiR? (The robot)
    12·1 answer
  • 3. The invention of the transistor was important to the development of computers because it
    5·1 answer
  • Plzzzzz help right answer gets Brainly
    10·1 answer
  • A great way to obtain Hands-On training in a real quick environment is to complete a ??
    12·1 answer
  • A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
    5·2 answers
  • Which of the following is the most accurate definition of a botnet? a small text file passed to a Web browser on a user's comput
    15·1 answer
  • alle Mbawah: Attempt 1 How does a bystander become an advocate? By harassing the bully until he or she stops the harmful activit
    6·1 answer
  • What should the Dhruv consider when connecting to the Internet in a public place? Select all that apply.
    11·1 answer
  • Data is stored on ________ using a laser to either melt the disc material or change the color of embedded dye.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!