1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
13

Unsupervised learning is:

Computers and Technology
1 answer:
Serga [27]3 years ago
8 0

Answer:

The answer is A, duhhhhhhh

You might be interested in
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
What are the basic problem that my pc can have?
Lena [83]
A virus, malware, unplugged, used too much storage, etc.
5 0
4 years ago
Please please help I don’t understand this
larisa86 [58]

Answer:yes because ye and yes

Explanation:

Yes because yss

7 0
3 years ago
Read 2 more answers
By recording where a hockey puck goes into a net, a goalie can...
Paraphin [41]

Answer:

2. determine where they are not successfully blocking goals.

Explanation:

In the game of ice hockey, a goalie also referred to as goaltender refers to an individual (player) who is saddled with the responsibility of preventing the hockey puck from going into his or her net. When the hockey puck is prevented by the goalie, it simply means that the opposing team is prevented from having a goal or scoring.

The area in front of the net where a goalie plays is known as goal crease.

By recording where a hockey puck goes into a net, a goalie can determine where they are not successfully blocking goals because it helps them to see where they successfully made a save (block) and where they did not.

8 0
3 years ago
Read 2 more answers
Which type of architecture places a firewall in front of the VPN to protect it from Internet-based attacks as well as behind a f
ella [17]

Answer:

DMZ-based.

Explanation:

VPN or virtual private network, as the name implies, is a network virtually extending a private network over a public network or the internet, to provide secure access to users that can not physical access the actual private network.

Delimitarized zone DMZ is an isolated point between an internal or private network and the internet, configured to provide access to untrusted or unauthorized users. The DMZ- based VPN is a virtual private network with two firewalls securing the internet and private network end, but provides access to users.

3 0
3 years ago
Other questions:
  • T<br> F<br> 5.<br> You can save presentations in PDF and XPS formats.
    14·1 answer
  • You want to find information about Paris, France in the last five years, written in English. What is the best way to search for
    5·2 answers
  • This is important I need help please
    14·1 answer
  • A company used computer auditing techniques to compare employees' telephone numbers with vendors' telephone numbers. This is an
    10·2 answers
  • Advancements in nuclear science have led to technological advances which are both harmful and beneficial. Which would be conside
    15·1 answer
  • Linux distributions automatically come with a native software firewall.TrueFalse
    13·1 answer
  • How to turn on a computer
    9·1 answer
  • which cyber protection condition establishes a protection priority focus on critical and essential functions only
    10·1 answer
  • Anyone here good with Alice? I need help ASAP
    10·1 answer
  • Identify suitable hardware components that will meet your requirements. Be reasonably specific. For example:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!