1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
3 years ago
11

What plan can businesses use to protect sensitive data from malicious attacks?

Computers and Technology
2 answers:
Anna11 [10]3 years ago
6 0

Answer:

cybersecurity

Explanation:

it's either that or anti-spywhare but cybersecurity seems more likely

Alla [95]3 years ago
4 0
C ethical hacking
So no one will be able to access their information from hacking to their screen
You might be interested in
Identify when programmers use an Else statement.
Gnesinka [82]

Answer:

to tell the program to take a different action when the If statement answer is false

Explanation:

if x = 0:

     print('x equals 0')

else:

      print('x equals something else that isnt 0')

4 0
3 years ago
Read 2 more answers
Jason needs to renew the certificate for his company’s web server. Which of the following is recommended to be submitted to the
notsponge [240]

Answer:

A. CSR

Explanation:

CSR, (certificate signing request also known as certification request, CR) are messages sent by an applicant to a certificate authority to acquire a digital identification certificate or renew an already existing one. It contains information of the client or applicant like domain name, public key etc.

Keyescrow, CRLD and OCSP are not recommended or required for renewing digital certificate as they commands or settings for shortcuts and commands.

3 0
4 years ago
dns is a network of decentralized servers that translate urls (uniform resource locators) into ip address. true false
Rina8888 [55]

Dns is a network of decentralized servers that translate urls (uniform resource locators) into ip address ---- True

<h3>DNS Stands for :</h3>

DNS, or Domain Name System, translates human-readable domain names (such as www.amazon.com) into machine-readable IP addresses.

<h3>What is the IP address of your DNS server?</h3>

The Domain Name System (DNS) is the name database where Internet domain names are found and translated into IP (Internet Protocol) addresses. The Domain Name System maps the name that users use to look up her website to the IP address that computers use to look up that her website.

<h3>Is DNS the same as IP address?</h3>

Web browsers use Internet Protocol (IP) addresses to interact. DNS translates domain names into IP addresses and allows browsers to load Internet resources. Every device connected to the Internet has a unique IP address that other computers use to find the device.

Learn more about DNS :

brainly.com/question/17952402

#SPJ4

4 0
1 year ago
How is counting in this circle and square system similar to how we count in our regular lives? How is it different?
Maslowich

Answer:

1.  Counting in this circle and square system is similar to how we count in our regular lives because it obeys agreed-upon rules

2. On the other hand, counting in this circle and the square system is different to how we count in our regular lives because it utilizes shapes instead of numbers

Explanation:

Circle Square Pattern of counting is a form of counting that is similar to the binary structure but has distinct rules for sorting shapes. It involves the development of all possible messages with three-place values, with other distinct created rules that illustrate how it sorted each message.

Hence, in this case, the correct answers are:

1.  Counting in this circle and square system is similar to how we count in our regular lives because it obeys agreed-upon rules

2. On the other hand, counting in this circle and the square system is different to how we count in our regular lives because it utilizes shapes instead of numbers

7 0
3 years ago
Active cell is indentifed by its thick border true or false​
Effectus [21]

Answer:  It's identifed by its thick border so its true

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the difference in adware and spyware
    11·2 answers
  • What command would you use to list the text files in your
    7·1 answer
  • Title text boxes on every slide must be the same format.<br><br> A) True<br> B) False
    8·2 answers
  • Collaboration, listening, and negotiating are considered __________ skills.
    7·2 answers
  • What is the defining difference between computer security and information security?
    13·1 answer
  • What are the similarities between data mining and data analytics
    11·1 answer
  • To recover from driving off the road steer back onto the road in then ?
    14·2 answers
  • Select the correct answer from each drop-down menu.
    5·2 answers
  • Select the correct answer from each drop down menu
    11·1 answer
  • Assume that the variable myString refers to a string. Write a code segment that uses a loop to print the characters of the strin
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!