1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
3 years ago
6

Osing Commands

Computers and Technology
1 answer:
Sedaia [141]3 years ago
5 0

Answer:

Beggin the perfume and I Can Do B the work done ✅ you are the instances of a marriage license pa bili kami ulam namin pwede po ma'am pwede the too much talking to the work done na na lang sa pag you po sir I will be solemnized

You might be interested in
Which type of architecture places a firewall in front of the VPN to protect it from Internet-based attacks as well as behind a f
ella [17]

Answer:

DMZ-based.

Explanation:

VPN or virtual private network, as the name implies, is a network virtually extending a private network over a public network or the internet, to provide secure access to users that can not physical access the actual private network.

Delimitarized zone DMZ is an isolated point between an internal or private network and the internet, configured to provide access to untrusted or unauthorized users. The DMZ- based VPN is a virtual private network with two firewalls securing the internet and private network end, but provides access to users.

3 0
3 years ago
Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program?
inessss [21]

Answer:

People

Explanation:

Information security management provides a description of the controls needed by an organization in order to ensure that it is capable of protecting the integrity, availability, and confidentiality of assets from security vulnerability and threats. On the other hand, the SETA program is three phased and ensures that organizations address and implement training and techniques for information security. Hence the only function that encompasses security personnel as well as aspects of the SETA program is the People function.

8 0
4 years ago
How can i underline a simple text on word?
Fiesta28 [93]

Answer:

Underneath the font box there should be a capital U that is underlined.

Highlight the text you want to underline and click the U button.

6 0
3 years ago
Read 2 more answers
Which type of operating system is usually used in personal computers?
castortr0y [4]
Windows 10 thru 7 home and some people use mac osx
7 0
3 years ago
Read 2 more answers
_____ uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment.
mr_godi [17]

Answer:

"Virtual reality" is the appropriate answer.

Explanation:

The utilization of technological advances gives the impression of a 3D interactive environment wherein the things that have such a perception of space embodiment or involvement, are considered as Virtual reality.

Virtual reality implementations often include:

  • Entertainment,
  • Medical and
  • Educational activities.
3 0
3 years ago
Other questions:
  • What is basic function of an operating system?
    10·2 answers
  • Under the Right to Know Rule, employers need to include information on which one of the following in a written and complete haza
    5·1 answer
  • A RAID structure ____. is primarily used for security reasons is primarily used to ensure higher data reliability stands for red
    14·1 answer
  • Who first demonstrated the computer mouse ?
    11·1 answer
  • Free pass if you want it.
    12·2 answers
  • Computer identity theft differs from theft in the real world in what major way?
    11·2 answers
  • Which are common applications of deep learning in Artificial Intelligence (AI)?
    5·1 answer
  • What is a banner grab?
    12·1 answer
  • 8. Software ____ are individual programs that can be purchased, installed, and run separately, but extract data from the common
    12·1 answer
  • Does anyone know what's wrong with this code in Unity? HELP FAST PLEASE! This is for my game design course, I will give brainies
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!