1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MatroZZZ [7]
3 years ago
13

I WILL MARK IT BRAINLIEST FOR SURE ☺️❤️

Computers and Technology
1 answer:
Katyanochek1 [597]3 years ago
5 0

Answer:

Virtually all foods are derived from living cells from animals and plant origin and in some cases from some microorganisms by biotechnology.

Explanation:

I actualy dont know how to explain you this ahmm go to your teacher and hit her/he with your module.

You might be interested in
Under which condition below would you expect a glassy extrusive rock like obsidian to form?
agasfer [191]
Hihi!

The correct answer would be D. Quick cooling on Earth's surface! Obsidian is<span>a volcanic rock formed by the rapid solidification of lava without crystallization!

I hope I helped!
-Loliarual
</span>
7 0
4 years ago
Read 2 more answers
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attack
Strike441 [17]

Answer:

Intrusion Prevention System (IPS)

Explanation:

Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer

Thus, the tool you should use is an intrusion prevention system (IPS).

6 0
3 years ago
Return a formatted string with numbers The function below takes three numerical inputs: num1, num2, and num3. Implement it to re
alexira [117]

Answer:

In Python:

def ret_formatted(num1,num2,num3):

   result = str(num1)+"_"+str(num2)+" ! "+str(num3)

   return result

Explanation:

This defines the function

def ret_formatted(num1,num2,num3):

This generates the output string

   result = str(num1)+"_"+str(num2)+" ! "+str(num3)

This returns the result string

   return result

3 0
3 years ago
If we can lock a file, we can solve the race condition problem by locking a file during the check-and-use window, because no oth
yKpoI14uk [10]

Answer:

A file can only be locked out to other users or processes only if it's already open, meaning it's in use as a resource during the time window and therefore it's impossible solving the race condition problem by locking the file during the check-and-use window.

Hence, during the check-and-use process, it's impossible to lock a file.

In conclusion, any lock created can be ignored by the malicious process.

5 0
3 years ago
A(n) __________ port, also known as a monitoring port, is a specially configured connection on a network device that is capable
drek231 [11]

Answer:

The answer is "SPAN"

Explanation:

The full form of SPAN port is  "Switch Port Analyzer", which is used to designed specifically for the interface on a network device, that would be able to monitor all traffic passing across the entire device.

  • The use of this port will also call the mirror ports, that is a popular way of gathering data traffic for tracking purposes.
  • It is primarily used to access the bus switch and all interfaces, which is usually accessible from data transmission.
7 0
4 years ago
Other questions:
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • Changeover means that ____. (select all that apply)
    7·2 answers
  • Define a function setheight, with int parameters feetval and inchesval, that returns a struct of type heightftin. the function s
    6·1 answer
  • It is ok to sell services on Xbox in exchange for real-world money
    10·2 answers
  • Which line of code will print I can code on the screen?
    13·1 answer
  • New technology is NOT vital to businesses in which of the following ways?
    7·1 answer
  • Question No. 5:
    7·1 answer
  • The _____ Tag surrounds all content that will be visible on your web page for all to users to see on that website.
    13·1 answer
  • In what year was the earliest documented use of the word computer?.
    9·1 answer
  • Ginny faced an application error while executing the recorder in opera. Which web browser is generally recommended to use with r
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!