1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PolarNik [594]
3 years ago
13

Free point giveaway pt.10 and brainliest to first answer

Computers and Technology
2 answers:
g100num [7]3 years ago
8 0

Answer:

3+3=6

Explanation:

Tysm!!!

jek_recluse [69]3 years ago
3 0

wahhhhh thank youuu !!!!

You might be interested in
Suppose you are the security manager of a company and one of your goals is to design security mechanisms based on three security
Tcecarenko [31]

Answer:

(i) Prevention is more important than detection and recovery.

(ii) Detection is more important than prevention and recovery.

(iii) Recovery is more important than prevention and detection.

Explanation:

(i) Prevention is more important than detection and recovery.

Prevention of attack can be through various applications for example a walk through gates are placed in order to prevent any attacker from entering the premises and causing harm.

(ii) Detection is more important than prevention and recovery.

Detection of an attack can be done through for example a security alarm can detect an attack and inform others.

(iii) Recovery is more important than prevention and detection.

Recovery of an attack can be done by for example an insurance which will recover a portion of loss occurred during the attack.

8 0
3 years ago
In the context of in-house software development options, a firm that enhances a commercial package by adding custom features and
Artyom0805 [142]

In the context of in-house software development options, a firm that enhances a commercial package by adding custom features and configuring it for a particular industry is called a(n) value-added reseller (VAR).

<h3>What is VAR?</h3>

A Value-Added Reseller (VAR) is a company that depends on the production of other firms. They improve the commission of a product or add a unique feature on it and sell that part as a whole apart good. The disadvantage of this practice relies on not maintaining control over the manufacturing prices since these things do not understand what precisely will be delivered next.

To learn more about VAR, refer to:

brainly.com/question/22679694

#SPJ4

7 0
2 years ago
What does the following expression evaluate to?: "2 + 8"
lozanna [386]
10 tell me if I’m wrong
7 0
3 years ago
List three ways on how it's good to meet online and real life
nikitadnepr [17]

Answer:

Explanation:

How to meet people in real life

1. We can meet people if you go to your friend's party, is a great opportunity to meet friends from your friends.

2. We must go to events, in this case, if you like to read books, go to reading events.

3. We can use public transportation if you see someone reading your favorite book is the best opportunity.

How to meet people online

1. We can meet people in social media, but there are a lot of fake accounts, take care.

2. There are special platforms to meet people or to find love.

3. We could meet people on educational websites or apps, for example, if we want to learn Spanish, we can meet Spanish people.

3 0
3 years ago
What is a safe practice when online?
lisabon 2012 [21]

Answer:

Safe work practices are generally written methods outlining how to perform a task with minimum risk to people, equipment, materials, environment, and processes

Explanation:

6 0
3 years ago
Other questions:
  • Which risk mitigation framework allows scope for research and acknowledgement for risk mitigation?
    9·2 answers
  • Write a program that reads in an integer value for n and then sums the integers from n to 2 * n if n is nonnegative, or from 2 *
    5·1 answer
  • Nuclear batteries use devices called thermocouples, which convert the ____ of a nuclear reaction into electricity.
    9·1 answer
  • Write a function namedmake_complex that stores its twoarguments (both of type double) in acomplex structure, then returns thestr
    12·1 answer
  • In the Unified Process (UP) methodology, most of the Implementation activities occurs during the _____ phase.
    14·1 answer
  • What methods do phishing and spoofing scammers use?
    7·1 answer
  • Explain the following buttons as used in emails:compose,inbox and Draft.<br>​
    10·1 answer
  • Kitchen Gadgets
    10·1 answer
  • Write a Python function that join the two string and print it ​
    14·2 answers
  • IF ANYONE ANSWERS YOUR QUESTION WITH SOMETHING LIKE THIS:
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!