Answer:
B. Classify network traffic.
D. IP route filtering.
Explanation:
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification
Hence, an access control list primarily is composed of a set of permissions and operations associated with a network or file.
In Computer networking, access control lists (ACLs) can be used to perform the following tasks;
I. Classify network traffic: it can be used to classify the different networks on a router and define whether packets are rejected or accepted.
II. Internet protocol (IP) route filtering: any internet protocol (IP) address that's is not on the accept list would be refused permission into accessing a network. Thus, ACLs can either deny or accept IP addresses depending on the routing table configured on the router.
you are the network administrator for a college. wireless access is widely used at the college. you want the most secure wireless connections you can have. which of the following would you use?
A WPA
B WEP2
CWEP
D WPA2
Answer:
D. WPA2
Explanation:
Required
Of the 4 options, which is the most secured?
WPA was created as a solution to the vulnerabilities in WEP/WEP2. Then, WPA was upgraded to WPA2.
WPA2 is the least vulnerable to hacks because for every user that is connected to the network through WPA2, a unique encryption is made available for such connection.
Hence, the most secure connection, of the 4 is WPA2.
Outlook 365 can be described as a personal information manager.
True or false
Answer:
True
Explanation:
The statement is True. The Microsoft Outlook 365 can be described as personal information manager.
What is Microsoft Outlook?Microsoft Outlook is the software system, that allows the users to manage various personal and official information and data altogether at one place.
The Microsoft Outlook is known as personal information manager because it allows the users to managing task, providing calendar services, helps in emailing. It also manages contact and keeps the record of journal logs and many more.
Therefore, the statement regarding outlook 365 is True.
Learn more about Microsoft Outlook, here:
https://brainly.com/question/17457799
#SPJ5
In what tab can a user find the workspace option?
Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.
Answer:
c
Explanation:
They are correct? thank you!
Answer:
[OPINION]
First one is correct.
For the second one, I think the leader should accept the invitation and forward it to the entire team. [As the team experienced success due to group work, so every team member should be invited... as the success was a result of the hardwork of every member]
About the third one, I think it depends on the person so you may be correct. But, if I was asked to choose I would have been chosen.... rational approach
This is just my opinion. Hope it helps you:)
Why use LinkedIn automation for LinkedIn?
Answer:
Using LinkedIn automation tools to run successful outreach campaigns has become popular. It’s because these tools automate tedious networking tasks such as visiting profiles, collecting data, sending out bulk connection requests, messages, and follow-ups, etc.
With the help of the latest LinkedIn automation tools, you can quickly perform all the repetitive tasks while saving yourself a lot of time that you can use on actual relationship building and lead nurturing tasks.
However, LinkedIn isn’t really amused when using any bots or automation tools for LinkedIn.
Suppose we can buy a chocolate bar from the vending machine for $1 each. Inside every chocolate bar is a coupon. We can redeem six coupons for one chocolate bar from the machine. This means that once you have started buying chocolate bars from the machine, you always have some coupons. We would like to know how many chocolate bars can be eaten if we start with N dollars and always redeem coupons if we have enough for an additional chocolate bar.For example, with 6 dollars we could consume 7 chocolate bars after purchasing 6 bars giving us 6 coupons and then redeeming the 6 coupons for one bar. This would leave us with one extra coupon. For 11 dollars, we could consume 13 chocolate bars and still have one coupon left. For 2 dollars, we could have consumed 14 chocolate bars and have two coupons left.Write a program that inputs a value for N and outputs how many chocolate bars we can eat and how many coupons we would have left over. Use a loop that continues to redeem coupons as long as there are enough to get at least one chocolate bar.
Answer and Explanation:
Using JavaScript:
/* program should take N input which represents the dollar amount and output how many chocolate bars and how many coupons we have*/
function chocolatebar(dollars){
var dollaramt= dollars;
var i;
for(i=0; i <= dollaramt; i++){
i=i+6
?
Alert ("you have 1 extra chocolate bar");
:
Alert ("keep buying chocolate bars to get more coupons for a bonus chocolate bar")
}
}
*
What is system software? Write its types.
Answer:
There are two main types of software: systems software and application software. Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS)
Answer:
There are two main types of software: systems software and application software. Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS)
Explanation:
thanks for question
I need someone to explain gor me python coding!
Answer:
Explanation:
Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general purpose language, meaning it can be used to create variety of different programs and isn't specialised for any specific problems
Which Windows installation method requires the use of Windows deployment services (WDS)?
1. Network Installation
2. Repair Installation
3. Bootable flash drive installation
4. Unattended installation
Answer:
1. Network Installation
Explanation:
Given
Options (1) to (4)
Required
Which requires WDS for installation
WDS are used for remote installations where users do not have to be physically present before installations can be done; in other words, it is necessary for network based installations.
Of all the given options, (a) is correct because without WDS, network installation cannot be done.
https://ref.surveyj.co/Oware111
What is the link?
IS IT A HACKING LINK
Identify the statement about Windows tasks that is FALSE.
To launch an application, click the Windows icon, select "All Programs," and then click an application.
The boot process is the process for powering off a computer.
A common way to shut down the computer’s operating system is by using the Start menu.
Users log into their accounts on the Welcome screen, before Windows is ready to use.
The statement about Windows tasks that is FALSE is
The boot process is the process for powering off a computer.According to the question, we are to discuss about Windows tasks and how it works as regards to the computer.
As a result of this we can see that in launching an application;
we need to click on Windows iconselect "All Programs," click an application.Therefore, The boot process is not the process for powering off a computer.
Learn more about Windows tasks .
https://brainly.com/question/1594289
The statement that is false is: The boot process is the process for powering off a computer, which is the second option. The boot process is actually the process of starting or powering on a computer, not powering it off.
The boot process refers to the sequence of events that occur when a computer is powered on or restarted. It is the process of starting up the computer's hardware and loading the operating system into memory so that it is ready for use. During the boot process, the computer's firmware (such as the BIOS or UEFI) performs a series of checks and tests to ensure that the hardware components are functioning correctly. It then searches for the operating system on connected storage devices, such as the hard drive or solid-state drive, and loads it into memory.
Learn more about the boot process here.
https://brainly.com/question/24355262
#SPJ6
If you were driving the blue Prius in the situation pictured above, explain why the red Mustang should be given right-of-way at this intersection.
Answer:
The red Mustang should be given the right-of-way at this intersection because:
The red Mustang arrived first before the blue Prius and is closer to the stop sign before the arrival of the blue Prius. This implies that the red Mustang must have waited for its turn, unlike the blue Prius that just arrived at the intersection.
Explanation:
Traffic laws, regulations, and IPDE defensive driving strategy require that drivers always give way to the vehicle that arrived before them at an intersection. Assuming that multiple vehicles reach the intersection simultaneously, then the vehicle must be given the right-of-way. Alternatively, the traffic lights at the intersection should be obeyed and be allowed to regulate the movement of vehicles. IPDE defensive driving strategy requires drivers to be watchful of their driving spaces to determine the appropriate time to move.
what is the role of media in our society, and how can we become responsible consumers producers of news and information in the digital age?
1.Own your image, personal information and how these are used.Pay close attention to the 2.Terms of Use on apps and websites. ...
3.Obtain permissions when posting videos or 4.images of others on your networks. ...
Scrub your accounts. ...
5.Password diligence. ...
Spread love, not hate.
How to use the AI System ?
ANSWER:
· New artificial intelligence systems are being developed to help teachers administer more effective testing that could uncover some of these often-hidden conditions. Once they can be properly identified, educators can tap into the resources available for a learning disability. Students can use AI to give reliable feedback.
When we have signals within 1-2 MHz band, using a waveguide is the most preferred choice for a transmission line. T or F?
Answer:
T
Explanation:
What is the iterative procedure of recursive and nonrecursive?
Answer:
nonrecursive
Explanation:
Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be
558c::d367:7c8e:1216:0:66be
(1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term ergonomics. (4) explain the following. a click b right click c double click d triple click e drag and drop
Answer:
1.similarity:
they are both editing keys3.ergonomics are designed keying devices that alleviates wrist strain experienced when using ordinary keyboard for long hours
4.
.a click is pressing and releasing the left mouse button onceright click is pressing the right mouse button once to display a short cut menu with commands from which a user can make a selectiondouble click is pressing the left button twice in rapid successiondrag and drop is where by the user drags an icon or item from one location on the screen to another.Consider the following JavaScript code fragment:var greeting = function ( name ) {console.log ( name )}The best answer for what is wrong with this code is:Group of answer choices
Answer:
name is a reserved word in JS and cannot be used as an identifier
Explanation:
From the group of answer choices provided the only one that may be a problem would be using the word name as a parameter. Although name is not a reserved word per say in JS it is in HTML, and since JS targets HTML it could cause some errors. This however does not prevent this code from running correctly. JS does not require semicolons anymore, and the opening and closing braces for a body of code does not need to be on their own lines. Also, variable names are not Strings and do not need to be inside quotes, even for console.log()
Neymar machine that Run on electricity
"Neymar" = "name a"?
if so, well, there are many, like the little glowing box you use the type questions to the brainliest community, let it be a phone, a pc, or a molded Nintendo
if you meant Neymar indeed, I'm not sure if he runs on electricity, unless he is a soccer playing android somehow.
Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access to his tablet.
Which network type is Marco using?
LAN
PAN
WAN
MAN
Answer:
PAN
Explanation:
For wireless devices like laptops, tablets, wireless desktops, and cellphones to communicate, a wireless LAN normally has a Wi-Fi router or wireless access point. A wireless LAN is essentially a LAN that doesn't use cables. Thus, option B is correct.
What are the PAN network type is Marco using?The computer network that links computers and other devices within a specific person's range is known as a personal area network (PAN). PAN stands for personal area network and gives a network range within a person's range, often within a range of 10 meters (33 feet).
A PAN is a network that primarily serves a tiny space, usually a single small room. It allows computer devices to share data and information with other nearby computers.
Therefore, Whereas in LAN, computers are connected via a network over a short distance, such as within a building, or in a single computer network made up of several computers.
Learn more about network type here:
https://brainly.com/question/29515062
#SPJ2
You have two microservices that need to communicate with each other without holding up a thread on either end. One service will receive an ID and return a message once the job is complete.
Which communication framework should be used?
A.) Have a shared database that allows both
applications to read and write to the tables to share the data instead of having to communicate
B.) Use asynchronous messaging to send and receive messages between each microservice
C.) Abandon the microservice architecture so no interaction is needed
D.) Create a third service to handle the interaction between the services
E.) Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available
Answer: E. Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.
Explanation:
Since there are two microservices that need to communicate with each other without holding up a thread on either end, the communication framework should be used is a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.
REST is a software architectural style which is used in defining the set of rules that be used for the creation of web services. The REST architecture allows requesting systems to be able to access and manipulate web resources.
what is the build in libary function to compare two strings?
Answer:
strcmp() is a built-in library function and is declared in <string. h> header file. This function takes two strings as arguments and compare these two strings lexicographically.
Explanation:
Hope it helps
Imagine that you wanted to write a program that asks the user to enter in 5 grade values. The user may or may not enter valid grades, and you want to ensure that you obtain 5 valid values from the user. Which nested loop structure would you use?
A. A "for" loop inside of a "while" loop
B. A "while" loop inside of a "for" loop
C. None of the above
D. Either a or b would work
The type of nested loop which I would use to write the program is:
B. A "while" loop inside of a "for" loopWhat is a Loop?This refers to the control flow statement which is used to iterate and lets a particular line(s) of code execute repeatedly
With this in mind, we can see that the type of nested loop which I would use to write the program is a "while" loop inside of a "for" loop because it is a conditional statement that continues to ask for the certain valid grades until it gets the right one.
Therefore, the correct answer is option B
Read more about loops here:
https://brainly.com/question/26098908
advantages of computational skill
Explanation:
algorithmic thinking - developing a set of instructions or sequence of steps to solve a problem;
evaluation - ensuring a solution is fit-for-purpose;
decomposition - breaking a problem down into its component parts;
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task
Question Completion with Options:
A. device flow correlation
B. simple detections
C. application blocking list
D. advanced custom detections
Answer:
The outbreak control method that is used to accomplish the task of configuring AMP for endpoints and to block certain files from executing is:
C. application blocking list
Explanation:
The application blocking list creates a list of application files, which the AMP continuously tracks and analyzes to compare the file activities with previous cyber attacks. Specifically, the AMP for Endpoints is a cloud-managed endpoint security solution, which provides a retrospective alert to prevent cyber-security threats, and rapidly detects, contains, and remediates malicious files on the endpoints.
continuously tracks and analyzes files and file activities across your systems, and compares these events to what preceded or happened in past attacks. If a file exhibits malicious behavior, the AMP provides you with a retrospective alert which enables you to stop a potential threat from succeeding.
The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion
Answer:
B. data at rest, data in transit
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.
Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.
Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the maximum number of hosts possible on each subnet.
Required:
a. What is the dotted decimal value for the subnet mask?
b. How many additional bits will you need to mask in the subnet mask?
Given:
Network IP address [tex]\bold{= 172.149.254.0 /24}[/tex]
Subnet numbers [tex]\bold{= 13}[/tex]
Calculating the borrow bits:
[tex]\to \bold{= ceil(\log_{2} 13) = 4 \ bits}[/tex]
a)
Calculating the dotted decimal value for the subnet mask:
[tex]\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\[/tex]
b)
The additional bits which will be needed to mask the subnet mask that is = 4.
Learn more: brainly.com/question/2254014
If every company is now a technology company, then what does this mean for every student attending a business college
Answer:
Explanation:
There are all sorts of possibilities for, say, inserting new technologies into existing processes. But most of these improvements are incremental. They are worth doing; in fact, they may be necessary for survival. No self-respecting airline, for instance, could do without an application that lets you download your boarding pass to your mobile telephone. It saves paper, can't get lost and customers want it.
But while it's essential to offer applications like the electronic boarding pass, those will not distinguish a company. Electronic boarding passes have already been replicated by nearly every airline. In fact, we've already forgotten who was first.