Which type of security is specifically concerned with computers or devices that are part of a network infrastructure

Answers

Answer 1

Answer:

Ransomware

Explanation:

"Ransomware is malicious software that threatens to reveal sensitive data or prevent access to your files/systems until you pay a ransom payment within a set timeframe."


Related Questions

The type of software used in soa architecture is often referred to as what?.

Answers

Answer:

software-as-a-service

Explanation:

Need help with 3.2 lesson practice questions (edhesive)​

Answers

Answer:

Doesn't have a question

Explanation:

THANK YOUU

tax preparation software can help prepare and file your taxes by _________.

Answers

tax preparation software can help prepare and file your taxes by April 15.

What are the steps to complete an internet search?

Answers

Answer:

step one: open your search engine

step two: type what you wanna search for in the text box

step three: press enter

and that's it

Yahoo Messenger is an example of a/an __________ service on the Internet.

Answers

Answer:

Yahoo Messenger is an example of a service on the Internet.

INSTANT MESSAGING SERVICE, which includes text messaging, voice calling and file sharing.

Pls name me brainliest!!! ;D

What permissions are needed in order to use a work online that is in the public domain?

A.
Written permission from the creator

B.
A legal agreement attached to the work

C.
A justification through fair use

D.
None

Answers

[tex]⇒Written \: permission \: from \\ the \: creator[/tex]

The term “public domain” refers to creative materials that are not protected by intellectual property laws such as copyright, trademark, or patent laws. ... Anyone can use a public domain work without obtaining permission, but no one can ever own it.

How to edit slides into video.

Answers

Answer:

use videostar. or funimate. but for school use powerpoint

Explanation:

where on a computer is the operating system generally stored?

Answers

The operating system on a computer is generally stored at hard disk.

Typically, a data structure known as the Interrupt Vector Table stores the addresses of interrupt handlers (IVT). When an interrupt happens, the processor refers to the IVT, a table of fixed addresses in memory.

An interrupt is a signal sent to the processor of a computer or other digital device by a hardware component or software function to get the processor's attention. By allowing the processor execute numerous tasks at once, interrupts enable hardware devices to connect with the processor and software to run more effectively.

The interrupt handler, which is normally included in the operating system kernel, receives control when an interrupt occurs, causing the CPU to pause its ongoing task execution. The interrupt handler responds to the interrupt, which may entail resolving an error condition, processing data from a device, or performing input/output tasks. The processor resumes working on the interrupted job once the interrupt has been handled.

Learn more about Interrupt here:

brainly.com/question/29770273

#SPJ6

You are the administrator for a network with a single Active Directory domain called westsim. All computer accounts reside in organizational units (OUs) that correspond to departments. You have previously deployed a WSUS server in your location to specify the approved list of updates. All client computers are configured to download updates from your local WSUS server. You decide that you need to configure a separate update approval list for all computers in the Marketing department. You want the update list to be automatically identified based on the department membership for the computer. What should you do

Answers

Link a GPO to the Marketing OU. In the GPO, edit the Enable client-side targeting policy and specify the Marketing Computers group.

In the WSUS console, edit the options for Computers and specify Use Group Policy or registry settings on computers.

In the WSUS console, create a Marketing Computers group.

Conceptually, a page table is an array. What is found in each element of the page table array, and how is it interpreted?.

Answers

An array is the group of data structure which has a similar data elements of the same data type. In this type of data structure, the information can be quickly recalled by making use of the index number so that each individual data can be retrieved.

With this in mind, we can see that a page table has to do with the data structure which is stored in a virtual memory so that the Operating System can access their virtual and physical address.

See attached image for a better visual description.

Please note that your question is incomplete so I gave you a general overview so that you would better understand the concept.

Read more about page table here:

https://brainly.com/question/15409133

All variables are----------------------------------------------- help please

Answers

Answer:

variables are any characteristics that can take on different values, such as height, age, species I think

Answer

A variable basically works as a "placeholder" for anything that might change a majority of the time.

Examples

In science one may call a factor in a experiment that is subject to change a variable.

In math the term is used for a symbol that we do not know yet, such as x or y. Typically in math a variable is a letter.

In computer programming, variables are used to store information to be referenced and used by a computer program. They do give a way of naming data with a descriptive name as well so programs can be understood more clearly. When you go to assign values to the "variable" you are basically assigning individual variables such as the ones above in a way.

help me.............

Answers

Answer:

Explanation:

Sure

10 toes? Is that what you asked?

5 oceans entirely in the world.

300 bones in a baby and 206- In an adult body

If you do not want to use your Internet service provider (ISP) for your email account, how can you acquire a webmail account

Answers

A lot of services are being provided over the Internet. If you do not want to use your Internet service provider (ISP) for your email account, you can you acquire a webmail account through online services

An online service is simply known as body that gives access to various types of data for different uses through the use of the the Internet.

Examples are: online banking, news, shopping, social media networks, e-mail etc.

This services done online gives an avenue in which subscribers can communicate with one another via exchanging e- mail messages or through online conferences or forums.

Learn more from

https://brainly.com/question/9930336

If the value is set to equals to current entry then
a) the argument remains unchanged
b) the argument always changed
c) the argument will be deleted
d) the argument can be ignored
I will definitely mark you Brainliest for answering the correct answer!​

Answers

Answer:

this is a fallacy

a is the answer

with the ________ delivery model, cloud computing vendors provide software that is specific to their customers’ requirements.

Answers

Cloud Computing  is simply known to be a type of computing. Software-as-a-Service (SaaS) delivery model, cloud computing vendors provide software that is specific to their customers’ requirements.

Software-as-a-Service (SaaS) is simply define as a type of cloud computing vendors that gives software that is particular to their customers' needs.

It is the most used  service model as it gives a broad range of software applications. It also gives web-based services to its user.

Learn more from

https://brainly.com/question/14290655

A client is looking to maximize value from its Cloud investments by baselining, profiling, and prioritizing its human capital needs.Which myNav module will help this client?

Answers

myNav is to be present inn the Accenture software. It aim is to helps companies manage the human, technology and business dimensions of cloud change. The myNav module that will help this client is Cloud Advisor.

Cloud Advisor is simply known to be one of the many modules within the myNav platform. It was set up to handle the difficulties of cloud for digital transformation.

These Advisors are  known worldwide community of technical resources. They have a thorough  knowledge of cloud technologies and practices.

Their mission is to know the trends, regulatory implications, and our clients' needs so as to help them to set goals and create plans to achieve their desired outcome.

Learn more from

https://brainly.com/question/24918185

if you want to build a smart-glove that responds based on the direction and speed a user moves their hand, what sensor should you use

Answers

The Smart glove is known to be a very common hardware. The sensor that an individual can use, is the Inertial Measurement Unit (IMU) sensors.

Inertial Measurement Unit (IMU) sensors is a type of sensor that capture alltogether the motion of hand and wrist movements.

It is known to contain some bending sensors that is used to detect bending in one direction or another.

All the sensors are often linked to a computer system that put together the amount of individual finger movement of the patient.

Learn more from

https://brainly.com/question/20591341

computer science is a blank process

Answers

i agree... its a interesting thing to learn, just like learning an actual new language.

Answer:

yeah and it requires hard work

what is an operating system that controls some aspects of the computer?

(not very well phrased, ik, it's coming from a crossword for one of my classes assigned as a snow day thing. looking for a seven letter word)

Answers

central processing unit (CPU), computer memory, file storage, input/output (I/O) devices, and network connections.

Answer: Windows

Explanation:

examples of operating systems include

windows

mac

linux

windows has seven letters

You receive a worksheet in which the rows are numbered 1, 2, 3, 5,6. This means that row 4 is _____.

Answers

People often hide cells of worksheet due to different reasons. This means that row 4 is hidden.

A worksheet is commonly know as a sheet of paper/computer sheet with which work is done or performed.

 

An individual can hide any worksheet so that it can be removed from their view. The data in hidden worksheets is not visible to the person, but it can still be referenced from other worksheets and workbooks. One can unhide hidden worksheets if need be.

Learn more from

https://brainly.com/question/17106092

What is the difference between compliled and intebrated language?

(class 8th Subject Computer chapter 9 Control Structures In Python) ​

Answers

Answer:  

A compiled language is a programming language whose implementations are typically compilers and not interpreters. In this language, once the program is compiled it is expressed in the instructions of the target machine. There are at least two steps to get from source code to execution. While, an interpreted language is a programming language whose implementations execute instructions directly and freely, without previously compiling a program into machine-language instructions. While in this language, the instructions are not directly executed by the target machine. There is only one step to get from source code to execution.

I hope this helps.

Answer:

1.

Compiled Language:

A compiled language is a programming language whose implementations are typically compilers and not interpreters.

Interpreted Language:

An interpreted language is a programming language whose implementations execute instructions directly and freely, without previously compiling a program into machine-language instructions.

2.

Compiled Language:

In this language, once the program is compiled it is expressed in the instructions of the target machine.

Interpreted Language:

While in this language, the instructions are not directly executed by the target machine.

3.

Compiled Language:

There are at least two steps to get from source code to execution.

Interpreted Language:

There is only one step to get from source code to execution.

4.

Compiler Language:

In this language, compiled programs run faster than interpreted programs.

Interpreted Language:

While in this language, interpreted programs can be modified while the program is running.

What color object would reflect more light?
O Red
O Black
O Blue
o White

Answers

Answer:

White

Explanation:

Red absorbs all light except red light, which it reflects

Black absorbs all light

Blue absorbs all light except blue light, which it reflects

White reflects all light because it has all colors except black.

Hope you do well!

Write any four causes of cyber crime

Answers

A Lack of Empathy
The Victim Deserves It
Self-loathing
It Becomes an Addiction

Which of the following is not a good practice for effective Internet searches? Search for specific keywords that define your topic Use quotation marks to search for exact phrases Be general in your search query to get as many results possible Use or - to include or exclude different topics

Answers

Answer:

Be general in your search query to get as many results possible

poob bn vbyfcfgxfc jghjg jhgh

Answers

Answer:

Ploob was a monster employed at Horville's Hut of Horrors. He looked like a small green ball with a long tube-like nose and hair along his spine.

Explanation:

THE BONUS QUESTION PART FOUR:

what is the most popular game that's lived for soo long

Answers

Answer:

Senet

Explanation:

the use of technology to observe a user's actions often without the user's knowledge is known as:
A) Unauthorized access
B) Industrial espionage
C) Computer surveillance
D) Denial-of-service attack

Answers

Answer:

C

Explanation:

Computer surveillance refers to spying that allows the viewer to gain access of all activity on the given computer.

you need to use task manager to analyze memory utilization on a windows system. for example, you need to see how much system ram is currently in use and how much is available. click on the tab in task manager that you would use to do this.

Answers

Answer:

Performance tab

Explanation:

If you press on the performance tab you should be able to see how much memory is in use and how much is free. For example 50% or 8GB/16GB

Read what is in the commets.

Answers

Answer:

I'm a little confused on what you are asking, could you please explain.

What would the objective of the game be?
What would the operation of the game be?
What obstacles would your players experience?
What outcomes would you like to see in the game?
What sorts of themes, lessons, or skills would you like to express through your game?
What kind of person do you think would enjoy playing your game?

Answers

Answer:

Fresh out of college, Barry the Bee (Jerry Seinfeld) finds the prospect of working with honey uninspiring. He flies outside the hive for the first time and talks to a human (Renée Zellweger), breaking a cardinal rule of his species. Barry learns that humans have been stealing and eating honey for centuries, and he realizes that his true calling is to obtain justice for his kind by suing humanity for theft.

Other Questions
Which american indian people in texas were direct descendants of the early mount builders and built houses shaped like cones?. Element present in a sucrose molecule How many solutions does 7( X -5 ) = X +13 please help fast answer in spanish ! will give brainliest The excerpt from "The Siege of Boston" by Allen French and the painting of The Boston Massacre are EXACTLY the same. True False The t statistic for a test ofH0:=20HA: plus $5 per day. The fee for the game booth is $50 plus $7 per day.Write an expression for how much both booths will cost for the same number of days. Answer to what is CA i bought a new comic book at the comic book shoppe and paid enitrely using quarters. If I had paid using only dimes i would have needed to pay 9 more coins. how much did the comic book cost Tell your friend how to get along better with their roommate(s). Rewrite the following sentences, conjugating the verbs as affirmative t commands. OJO! Be sure to start each sentence with a capital letter and end it with a period. When was the new deal. Laura has $96 to divide between her 3 friends. How much money does each friend get? A state which occurs when the body hasbeen deprived of oxygen for too long The accommodating style of handling conflict reflects a __________ degree of assertiveness and a __________ degree of cooperativeness. Pickwick Production offered employees a defined-benefit retirement plan, in which retirees received benefits calculated on the basis of their age, earnings, and years of service. But the company didn't keep up with technology, and its earnings fell. When the stock market dipped, the company could no longer afford to keep paying for its retirement benefits. What protection will the retirees have in this situation y varies jointly as x, z, and w. when x=2, z=1, and w=12, then y=72. find y when x=1, z=2, and w=3 40 out of 50 birds are female. total number of birds is 1,120, how many of them would be female Of the 250 sheep in a flock, 42% are spotted. What is the total number of spotted sheep in the flock? Eduardo spent 35% of his time at the theme park on a roller coaster if he was there for eight hours how much time did you spend on roller coasters Primary technology skills are skills that are necessary for success in online education.Please select the best answer from the choices providedF