1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kakasveta [241]
3 years ago
9

Sona wants to start a business in India. Her friend suggest an idea to her is that to start business operations through an outsi

de service provider will help to reduce the burden. In such situation, Sona begins​
Computers and Technology
1 answer:
Alina [70]3 years ago
5 0

Explanation:

to try and start her business

You might be interested in
Which of the following is the best example of potential energy?
Otrada [13]
<span>Potential energy is the energy that is stored in an object due to its position relative to some zero position ,so the answer is " A runner positioned at the start line"</span>
6 0
3 years ago
Read 2 more answers
Which processor is better for madvr
nadya68 [22]

Answer:

The i5.

Explanation:

It has a lower clock speed, but you do note that you have more cores, same with the cache memory.

8 0
4 years ago
Jim is an experienced security professional who recently accepted a position in an organization that uses Check Point firewalls.
Contact [7]

Answer: D) CCSA

Explanation: THE CHECKPOINT CCSA(CERTIFIED SECURITY ADMINISTRATOR) is a computer based certification offered by different Computer Institutions in order to equip computer experts or systems engineers on the activities or process or knowledge needed to enhance the security domain of computer systems.

Check Point Firewall is a component of the Software Blade architecture which provides advanced firewall features like VPN and mobile device connectivity.

5 0
4 years ago
____ is concerned with the security of computers or devices that are part of a network infrastructure.
Maru [420]

Network security is concerned with the security of computers or devices that are part of a network infrastructure.

Network security can be defined as a broad term that includes many technologies, devices and processes. In the simplest terms, network security is a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using software and hardware technologies. Every organization, regardless of size, industry, infrastructure or structure needs a level of network security solution to protect it from the ever-evolving cyber threat landscape in today's wild.

There are many avenues to consider when addressing network security across an organization. Attacks can occur at any path in the network security layer model, so hardware, software, and network security policies must be designed to address each area. Network security usually consists of three distinct controls: physical, technical and administrative.

You can learn more about network security here brainly.com/question/14407522

#SPJ4

5 0
2 years ago
Which of the following manages allocation of computer resources during program execution?
Brums [2.3K]
A)memory management
8 0
4 years ago
Other questions:
  • Extend the flow properties and definitions to the multiple-source, multiple- sink problem. Show that any flow in a multiple-sour
    13·1 answer
  • The purpose of the align phase is to align your team with ______.
    9·1 answer
  • What is Tone's Core Move call in Titan Fall 2?
    5·1 answer
  • What is a computer network that provides connectivity in a geographic area or region larger than that covered by a local area ne
    7·1 answer
  • Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
    8·1 answer
  • Try to figure out who the ideal customer is for the IPhone X
    15·2 answers
  • You are adding more features to a linear regression model and hope they will improve your model. If you add an important feature
    7·1 answer
  • How many passes will it take to find the five in this list?
    6·2 answers
  • It can be hard to get close enough to photograph animals in the wild true or false
    14·2 answers
  • Write a function that takes as input a single parameter storing a list of integers and returns the minimum, maximum, and average
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!