1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jonny [76]
2 years ago
6

nts/viewer/classes/289ef1a5d7c341c284010 Select the compound inequality shown on the graph. 5 4 3 2 1 0 1 2 를 4​

Computers and Technology
1 answer:
Nezavi [6.7K]2 years ago
6 0
168 > 892 I just took the test
You might be interested in
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
What usually happens at a police check? Do they just look up your name in their system?
sdas [7]

it depends on the kind of police check. like if its a road block type of check, they make sure everything is right. if you get pulled over you get your name ran in the system to check if you have warrents or warning and depends on what you get pulled over for, you could get a ticket or detained.

5 0
3 years ago
Explain the features of page layout software ​
BartSMP [9]

Answer:

Page Layout explains how the document pages are going to look like after printing. When we check the layout in Word, then we can see that the page layout covers the elements like margins, number of columns, option for editing the header and footers. Various types of layouts are like a magazine layout, static, adaptive, dynamic, and adaptive as well as responsive layout.

And these page layout techniques are being implemented for customizing the magazine appearance, books, newspapers, websites, and various other sorts of publications. And such page layout covers page's all elements. Some of the best page layout software are:

Microsoft Publishers

Scribus

Adobe InDesign

QuarkXpress

Xara

Download the free student version of Microsoft Office today, and explore Microsoft publisher to know more about it.

Explanation:

Please check the answer.

7 0
3 years ago
Scenario: 1. Victim opens the attacker's web site. 2. Attacker sets up a web site which contains interesting and attractive cont
Ann [662]

Answer :

These sort of attacks are known are Injected IFrame Attacks. The Injected IFrame Attacks are a common Cross Site Scripting or XCC attack that contains multiple or single iFrame tags implemented within a page which is not visible to user. User unintentionally enters his information which is posted to hacker’s server and information’s gets hacked.

5 0
3 years ago
Anyone have Minecraft dungeons I need help with it
steposvetlana [31]

Answer:

for sure add me upppp its mypplong

5 0
3 years ago
Read 2 more answers
Other questions:
  • 14. Emelia is very concerned about safety and has conducted a study to determine how many bike helmets were replaced at each loc
    13·2 answers
  • Credibility means that the reader perceives value in what you write.<br> True False
    12·1 answer
  • Which of the following is used to encrypt web application data?
    11·1 answer
  • The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
    7·1 answer
  • Place the steps in order to link and place text into the document outline, effectively creating a master document.
    8·1 answer
  • What type of error results from an error in the formatting of the program code?
    13·1 answer
  • For how long should a media piece hold the user's attention?
    13·2 answers
  • besides entering a url to go directly to a website, what else can you enter in a browser address bar to explore the internet?
    10·1 answer
  • Question #1
    13·2 answers
  • Desktop computers have a(n) ________ unit, located within the system unit, that plugs into a standard wall outlet, converts AC t
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!