1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
3 years ago
8

What is cyber security ???​

Computers and Technology
1 answer:
mestny [16]3 years ago
8 0

Answer:

Cyber security is the practice if defending computers,servers,mobile devices,electronic systems, networks, and data from malicious attacks

You might be interested in
What is a protocol and what are the types of protocol​
wlad13 [49]
A protocol is a set of rules that governs the communications between computers on a network.

1. HTTP or HTTPs. This stands for Hypertext Transfer Protocol or Hypertext Transfer Protocol (secure).

2. FTP (File Transfer Protocol)

3. Email Protocols (POP3, IMAP, SMTP)

4. TCP(Transmission Control Protocol) and UDP(User Datagram Protocol)

Hoped that helped
3 0
4 years ago
Read 2 more answers
Where Can I Get Actual Microsoft AZ-900 Exam Questions?
Pachacha [2.7K]

Answer:

Pls check the site "examtopics"

U fill find ur questions there

8 0
4 years ago
Name any two software programs that employees can use to communicate effectively ​
notka56 [123]

Answer

unified communication software or video conference.

Explanation:

4 0
2 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
finlep [7]

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


5 0
4 years ago
Read 2 more answers
What gonna happened if you put rice water in your hair
Nikitich [7]

Answer:

That does something?

Explanation:

(•_•)

<) )╯all the single ladies

/ \

(•_•)

\( (> all the single ladies

/ \

(•_•)

<) )╯oh oh oh

/ \

7 0
3 years ago
Other questions:
  • A user is trying to delete a file located on an NTFS volume on his Windows 8 computer but is unable to do so. Why is this?
    6·1 answer
  • In one sentences describe how to change your home page
    10·1 answer
  • Based on your learning this week, consider rules, policies, and procedures. Technicians are often eager to just get started on a
    10·1 answer
  • The presentation ____ determines the formatting characteristics of fonts and colors.
    11·2 answers
  • Garrett wants to search through a csv file to find all rows that have either the name John or Bob in them and display them out t
    9·1 answer
  • Power point presentation make use of pages known as
    9·2 answers
  • Can anyone help me this is due today :) <br> Thank you so much
    14·2 answers
  • Hi good morning how are you all
    12·2 answers
  • When memory allocation is ____, it means all portions of the program and OS are loaded into sequential locations in memory.
    15·1 answer
  • Evaluate the merits of a hard disk drive or a solid state drive to use as the secondary storage
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!