1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
user100 [1]
2 years ago
14

Please answer questions in complete sentences!

Computers and Technology
1 answer:
Troyanec [42]2 years ago
7 0

i need help on that too :cc

You might be interested in
Which two settings must you configure when fortigate is being deployed as a root fortigate in a security fabric topology?
Goryan [66]

The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices.
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

<h3>What is security fabric settings?</h3>

The term Security Fabric is known to be a tool that aids one or allows one's network to be able to automatically see and also dynamically isolate any kinds of affected devices.

Note that is one that can also partition network segments, update rules, and they can bring out new policies, and delete malware.

Hence, The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

See full question below

Which two Security Fabric features are on FortiManager? (Choose two.)

Select one or more:

A. Enables you to view the logical and physical topology of Security Fabric devices

B. Enables you to run security rating on FortiGate devices

C. Enables you to view the security ratings of FortiGate Security Fabric groups

D. Enables you to view and renew Security Fabric licenses for FortiGate devices

Learn more about security from

brainly.com/question/25720881

#SPJ1

8 0
2 years ago
Who was the first person in 1983 to offer a definition of the term computer virus
Simora [160]

Answer:

Fred Cohen

Explanation:

3 0
3 years ago
Read 2 more answers
Read the scenarios below, then use the drop-down menus to decide if you should use a database.
Romashka [77]

Answer:

A. The parent-teacher orginization keeps a log of cookies sales to raise money for the elementary school.

Explanation:

5 0
3 years ago
Error: At least one of the class levels is not a valid R variable name; This will cause errors when class probabilities are gene
qwelly [4]

Using the knowledge in computational language in JAVA it is possible to write a code that use factor levels that can be used as valid R variable names

<h3>Writting the code in JAVA:</h3>

<em>    method  = "repeatedcv"</em>

<em>  , number  = 10</em>

<em>  , repeats = 1 </em>

<em>  , verboseIter = TRUE</em>

<em>  , summaryFunction  = fivestats</em>

<em>  , classProbs = TRUE</em>

<em>  , allowParallel = TRUE)</em>

<em />

<em />

See more about JAVA at brainly.com/question/12975450

#SPJ1

3 0
2 years ago
An online game is played with two dice. In this context, explain what is meant by decomposition.
Vlad [161]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about desinging a game that is played with two dice and gets or shows their value to the player.

The dice value is random, and it can be between one and six. So, you need to generate two numbers between 1 and 6. You may also need to display the numbers

The main part of this program is that you need to know the numbers to limit or restrict what the user may do next while playing.

That's most of the first level of decomposition for solving a problem. In decomposition, you need to keep decomposing (breaking) the problem into smaller pieces, thinking outline of the program and deciding what objects, functions, variables, and logic you're going to implement in the coding.

4 0
3 years ago
Other questions:
  • Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is p
    6·1 answer
  • True false you cannot fill in a callout​
    14·1 answer
  • Which option will automatically update copied data?
    12·2 answers
  • What is one reason that writing effective messages is so important
    11·2 answers
  • (TCO C) When a remote user attempts to dial in to the network, the network access server (NAS) queries the TACACS+ server. If th
    14·1 answer
  • When writing research questions, use action words, such as
    6·2 answers
  • Hi I need help with an assignment. We're learning about encryption and decryption in code.org. i need help with three of the tex
    14·1 answer
  • 1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an eve
    13·1 answer
  • Where did the name "QWERTY" come from?​
    9·1 answer
  • 2023 murano’s available intelligent awd adjusts the ________ to help maintain cornering control.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!