1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Komok [63]
3 years ago
13

A __________ is a thorough examination of each aspect of a network to determine how it may be compromised.

Computers and Technology
1 answer:
Lunna [17]3 years ago
3 0

Answer:

A posture assessment. :3

You might be interested in
im running out of gb on my phone, I have a lot of pics saved there and they're taking a lot of space, is there a way to back up
Varvara68 [4.7K]

Answer:

Google Drive

Explanation:

You should be able to download Google Drive, upload the pictures on there and delete them from your gallery. Then you can view them anytime you want.

3 0
3 years ago
Write an application of computer in robotics?​
MariettaO [177]

Answer:

In robotics, one use the computer has is to help program the robots.

4 0
3 years ago
Insurance can help you:
Blababa [14]
No it can not .............
3 0
3 years ago
13. An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to acce
valentinak56 [21]

Answer:

C. redundant networks are more reliable.

Explanation: I just got a 100 on a test and that question was asked.

7 0
3 years ago
PLZZZ HELP ME THIS IS THE THIRD TIME!!! BRAINLIEST AND 50 POINTS What are the advantages and disadvantages of top-down and botto
lord [1]

I would do top to down approach start from the top and work your way down to the bottom.

5 0
3 years ago
Other questions:
  • Without exception, you must always stop when ______________.
    14·1 answer
  • What may happen if a large number of computer users are attempting to access a web site at the same time that you are
    9·2 answers
  • When building systems, the only two entities that constitute software engineering are people and process.
    9·1 answer
  • Variables set equal to patterns are said to be:_______.
    7·1 answer
  • A(n) ____ is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offens
    11·1 answer
  • failure of the _ cylinder will often result in sudden unexpected loss of the ability to stop the vehicle
    10·1 answer
  • Sorry but, what are brainliest for?
    7·2 answers
  • If the user loads this graphic in a text only browser how will the browser describe it?
    11·2 answers
  • What is referential integrity
    8·1 answer
  • Using the functions from problems 1 and 2, write a MATLAB script to compare the laminar results from to the turbulent results. C
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!