1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sindrei [870]
2 years ago
5

PLEASE HELP ME GIVING BRAINLIEST!! 3.4.3: Go Down Slide: Part one

Computers and Technology
1 answer:
AlekseyPX2 years ago
7 0

                                           above

dgczjklcxhvzkojcvrhyujnhb

explanation:

You might be interested in
I used a walmart MoneyCard and now it says its prepaid. Its my dad's card.
Scorpion4ik [409]

Answer:

oh- Did he find out-

Explanation:

8 0
3 years ago
What is the best way to improve an online search
Slav-nsk [51]
Best way is to put your exact question! And do "advanced search"

Hope I helped and if you need more info or another question, then feel free to ask me!
Have a nice day!
6 0
3 years ago
Read 2 more answers
Why do astronomers prefer to use the reflecting telescope rather than the refracting telescope to view distant objects in space?
sdas [7]
C is the right answer
7 0
3 years ago
Read 2 more answers
_____ allow you to logically separate ports in switches to create subdomains without wiring your network as physical subdomains.
AlladinOne [14]

Answer:

The correct answer for the following question is VLAN.

Explanation:

It stands for Virtue Logical Area Network which allows you to group port on a switch logically. VLANs can be extend across (a period of time) multiple switches means you used to express on port that you're in that VLAN by changing the VLAN number.

We have the ability to improve our security with VLANs by controlling what VLAN is accessing with the other network of VLANs. So that this network is particularly helpful in office situation to create subdomain without wiring physical domain as your network.

6 0
3 years ago
____ of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation
umka21 [38]

Answer:

b. Acceptance

Explanation:

<em>"Acceptance </em><em>of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation.  </em><em>"</em>

<em>Acceptance Control </em>is important as a strategy when an organization has accomplished a determined level of risk, or it has estimated potential damages that might happen due to attacks, or the organization has developed a thorough analysis related to cost benefits, or it has also evaluated the probabilities of attacks.

7 0
3 years ago
Other questions:
  • Which is true about POP3 and IMAP for incoming email?
    6·1 answer
  • How to find i with superposition method
    8·1 answer
  • The color band that represents tolerance on a resistor is the?
    11·1 answer
  • When you access the programs and documents on a computer by what way of icons is said to be employing
    6·1 answer
  • Write a program that asks the user for three names, then prints the names in reverse order.
    5·1 answer
  • Which of the following is a group of email names and addresses used for mass distribution of a message?
    5·1 answer
  • What are two major techniques involved in green computing
    14·1 answer
  • A software process describes the interrelationship among the phases by expressing their order and frequency, but does not define
    14·1 answer
  • What does RFID use for wireless communication?<br> Infrared<br> IoT<br> Smart chip<br> Tag
    14·1 answer
  • What is Identity Theft?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!