1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
CaHeK987 [17]
2 years ago
15

What is gland? mention it's type​

Computers and Technology
2 answers:
stealth61 [152]2 years ago
5 0

Answer:

Gland is an organ that makes one or more substances, such as hormones, digestive juices, sweat, tears, saliva, or milk.

TYPES OF GLANDS :

ENDOCRINE glands release the substances directly into the bloodstream.

EXOCRINE glands release the substances into a duct or opening to the inside or outside of the body.

BRAINLIEST PLEASE

murzikaleks [220]2 years ago
4 0

Answer:

Gland is an organ that makes one or more substances, such as hormones, digestive juices, sweat, tears, saliva, or milk.

Explanation:

You might be interested in
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Two hundred workstations and four servers on a single LAN are connected by a number of switches. You’re seeing an excessive numb
quester [9]

Answer:

Add more servers or decrease the amount of workstations

5 0
3 years ago
If you want to encrypt all authorization information as it passes through your network, what could you use?
amid [387]

Answer:

You should use the TACACS+, also known by the term "Terminal Access Controller Access Control System Plus".

Explanation:

This protocol provides users with comprehensive accounting information and an adaptable administrative control over processes like accounting, authorization, and authentication. Clients using the TACACS+ can ask for a comprehensive access control and TACACS+ would do the rest by responding to every of that request's components.

4 0
2 years ago
What is a filter in excel (please keep your answer brief)
JulijaS [17]

Answer:

The Excel FILTER function "filters" a range of data based on supplied criteria. The result is an array of matching values the original range. When this array is the final result (i.e. the results are not handed off to another function) matching results will "spill" on to the worksheet.

Explanation:

3 0
2 years ago
Hat are the technical risks and the human risks for the ticktacktoe game
Ierofanga [76]

Answer:

 The technical risk basically occur due to some possible impact modification in the system and due to some technical problem or issue in the entire infrastructure.

Human risk are mainly occur due to the human interference. The technical and human risks are the two main types of risks for ticktacktoe game.

The different types of risks that occur are as follows:

  •  The operational risk
  •   Strategic risk
  •   Compliance risk
  •   Program risk

8 0
3 years ago
Other questions:
  • A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
    14·1 answer
  • 1. Write a bash script to create 3 files of different size greater than 1700 kb and less than 1800 kb . The 2. Content of the fi
    9·1 answer
  • Jeff wants to print quickly so he presses the Ctrl and the P. Jeff used a _____. macro invoice template shortcut
    15·1 answer
  • Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scen
    6·1 answer
  • How long does a bankruptcy affect your financial reputation
    13·1 answer
  • A vehicle fails an HC emission test at idle and 2,500 rpm, and the engine has an acceleration stumble. The heated oxygen sensor
    15·1 answer
  • Remote wiping is a device security control that allows an organization to remotely erase data or email in the event of loss or t
    10·2 answers
  • What is the benefit of working with a ready-to-use cloud based AI vendor service?
    13·1 answer
  • A(n) _____ exists when there are functional dependencies such that XY is functionally dependent on WZ, X is functionally depende
    14·2 answers
  • b. Write a complete program for the following situation related to setting the speed of a car to preset values before starting a
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!