1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nydimaria [60]
3 years ago
6

To reduce the potential for repetitive stress injury you should use proper?

Computers and Technology
1 answer:
mojhsa [17]3 years ago
7 0
Anyone that you can find
You might be interested in
Is Brainly cheating??
Vanyuwa [196]

Answer: What do you mean?

6 0
3 years ago
Read 2 more answers
Jack is assisting his younger sibling Mary with her mathematics assignment, which includes a study of the number system. Jack ex
Elza [17]

Answer:

The answer is A). Integers

Explanation:

Booleans and Strings don't represent numbers (in most cases) so they can be eliminated.

Floats are used for representing decimals while integers are used for whole numbers.

4 0
3 years ago
Read 2 more answers
Allen needs a program that injects automatically semi-random data into a program or stack and detects bugs. What will he use?
Goryan [66]

Answer:

A) fuzzer

Explanation:

From the question, we are informed that Allen needs a program that injects automatically semi-random data into a program or stack and detects bugs. In this case,he will use a fuzzer. A fuzzer can be regarded as a program that gives in a semi-random data to a program/stack, and it will detect bug. fuzzing testing can be regarded as

software testing process which discover bugs in the software, this is done automatically by giving in input of randomized data to the computer program. Generation of data is done by a generator, while vulnerability identification depends on the tools use in the debugging process.

8 0
3 years ago
After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and
Ad libitum [116K]

Complete Question:

After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and:

Group of answer choices

A. Describes how the vulnerabilities could impact the organization.

B. Provides recommendations for system configuration changes.

C. Lists them in alphabetical order.

D. Provides recommendations for additional personnel needed.

Answer:

B. Provides recommendations for system configuration changes.

Explanation:

The Microsoft Baseline Security Analyzer (MBSA) is a software program or application developed by Microsoft and it helps network security administrators to check for security updates, Structured Query Language (SQL) administrative vulnerabilities, Windows administrative vulnerabilities, Internet Information Services (IIS) administrative vulnerabilities, weak passwords, identifying missing security patches and common security misconfigurations.  

After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and provides recommendations for system configuration changes.

<em>Microsoft Baseline Security Analyzer (MBSA) is a legacy software that scores the results of a scan and displays the items posing the highest risk first, based on Microsoft’s security recommendations</em>.

7 0
3 years ago
Define and explain the two different methods by which a file can be compressed. Briefly describe one pro and one con for both ty
Rina8888 [55]

Answer:

The answer to this question can be defined as follows:

Explanation:

In this question, the Lossy compression requires a data merging software program. The benefit would be that compared to lossless compressions, it can create smaller files. One aspect was that every piece of information is usually lost. It is used to analyze their digital information on a computer model, seeking a place to buy it in another form. The pre is also no loss of data. Another thing would be that sound files wouldn't fit properly.

4 0
3 years ago
Other questions:
  • Members of which generation were born after the turn of the millennium?
    11·1 answer
  • Your uncle spent most of his teen years in a hospital undergoing treatment for a severe physical illness. As an adult, he is rat
    10·1 answer
  • Summarize the distinction between a flat file and a database
    15·1 answer
  • Python
    5·1 answer
  • CIST 1122 Project 2 Instructions
    11·1 answer
  • Why vechiles Tyres are black in colour?​
    14·1 answer
  • When you send large attachments, you are not
    14·1 answer
  • Lee has changed the style of his table to make the header row stand out. Next, he wants to center the text in the header row and
    11·2 answers
  • A numeric literal that is written with a decimal point is called a ________. real number floating-point value decimal literal do
    6·1 answer
  • What dod instruction implements the dod cui program
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!