Answer:
Tunneling
Explanation:
A networking protocol that is used to send data from one network to another network by encapsulation process.
It is the more secured method as it secures the data with the help of encapsulation process. Rest of the protocols are not helpful in security of data.
If Windows does not automatically detect a newly added device, to get the device recognized and the drivers installed, you should _________.
Answer:
Update the device driver
Explanation:
Devices drivers are softwares used to link a component of the computer to the operating system functionality.
It normally comes with the installed operating system, but most plug and play devices , come with a little built-in OS that runs once it is plugged in.
If a device is not recognized, update the driver software and restart the system.
To get Windows to recognize a newly added device, manually run the Add Hardware Wizard from the Control Panel, use Device Manager to install drivers, or download drivers from the manufacturer's website.
If Windows does not automatically detect a newly added device, to get the device recognized and the drivers installed, you should manually run the Add Hardware Wizard in Windows. Access the wizard from the Control Panel under Hardware and Sound, or search for it in the Start menu.
Follow the prompts to install the device drivers which can also be found through the Device Manager. It may be necessary to download and install drivers from the manufacturer's website if Windows does not have the appropriate drivers.
Data at Work: Best practices for creating effective charts and information graphics in Microsoft Excel by Jorge Camoes.
Answer:
Making a graph in Excel is a very simple task. For this you need only a small table with data like the following:
Once the range of the table is selected, we will select the «Insert» tag and then go to the «Graphics» group where we will select one of the graphs that Excel offers us and which we have explained previously. The steps you must follow can be seen in this image:
The great advantage of creating these charts in Excel is that you can edit very easily through the menu options and you can also change the chart type very easily.
What scope would be set for a Custom Dimension that reports membership status for a customer rewards program?
A. Session.
B. Hit.
C. Product.
D. User.
Answer:
Option D is the correct answer.
Explanation:
The organization held a program for customer known as customer reward program in which the problem arises by the customer of a organization is get solved by the expert. It affects the organization's decision. It also helps to the organization on taking the decision for future enhancement because the customer is the key point for any organization.
This program is held because the organization wants to listen the customer and wants to know that which factor of the organization is cause the problem for customer or user so that the organization remove or modify that factor and their customer will happy. So the main scope of this program is for user which is described above. Hence Option D is the correct answer while the other is not because--
Option A states about session which used for online website data.Option B states about Hit which is used for any website.Option C states about product, but this program is for user.If Twitter were to exclusively use e-mail, collaborative computing, and other computer connections to connect geographically separate employees, it would be considered a(n) ______ organization.
Answer:
Virtual is the correct answer for the above question.
Explanation:
A Virtual organization is a collection which is used to connect the geographical people, organizational units, employees, individuals and groups for some communication purpose. Virtual means that there is some existence like physically but it is not physically present. So the organization also connects the person and gives the real scenario with the help of some software for communication.
The question states that if twitter uses email and other computing connections to connect people globally then it comes in the Virtual department because it follows the concept of the virtual department. Hence Virtual is the correct answer.
In computer science, what are two names that are used to describe data structures organized by association
Answer:
Answer to the following question are,
Association list TablesExplanation:
Because these are the two associations data structures.
Association List: are referred to that data type which contains the pair of the key and item in the Java Programming Language and Python Programming Language, it is called a dictionary data type.Tables or Hash Tables: are referred to that data type which converts the keys into the integer value.Final answer:
In computer science, 'associative arrays' and 'maps' are two data structures organized by key-value associations, which enable efficient retrieval of data.
Explanation:
In computer science, two names that are often used to describe data structures organized by association are associative arrays and maps. An associative array (also known as a dictionary or a map) is a data structure that pairs unique keys with corresponding values.
This allows for efficient data retrieval based on those keys. Similarly, a map is a collection of key-value pairs where each key is unique and is used to store and retrieve data. Both associative arrays and maps are highly useful for situations where quick lookups of associated data are necessary.
write a program that find all possible combination of picking 3 letters or numbers
Answer:
This is a MATLAB code.
clear all
clc
alphabet = 'abcdefghijklmnopqrstuvwxyz0123456789';
for i = 1:combntns(length(alphabet),3) %takes the combination of (36,3)
pick(1) = ceil(rand()*length(alphabet)); %randomly chooses a letter or number
alphabet(find(alphabet == pick(1))) = ''; %removes the chosen character from the list
pick(2) = ceil(rand()*length(alphabet)); %randomly chooses second letter or number
alphabet(find(alphabet == pick(2))) = ''; %removes the chosen character
pick(3) = ceil(rand()*length(alphabet)); %randomly chooses the third letter or number
result(i,:) = alphabet(pick); %saves the 3-character pick into an array
alphabet = 'abcdefghijklmnopqrstuvwxyz0123456789'; %restores the original list of letters and numbers
end
disp(result) %displays all the combinations
Explanation: Please read the comments on each line.
You decide to use a packet sniffer to identify the types of traffic being sent to a router. You run the packet sniffing software on a laptop computer which is connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to your laptop and not frames addressed to other devices. Which feature should you configure on your laptop?
Answer:
Port Mirroring.
Explanation:
Port mirroring allows to send a copy of network packets seen on one port to a network monitoring connection on another port and hence you will be able to monitor frame addresses of other connected devices.
Laura manages DLP for a large company where some employees have COPE and some have BYOD. What DLP issue could these devices present?
Answer:
For the COPE device, there won't be a lot of risks, because this type of model is very secure and trustworthy. The device belongs to the company and only the corporative use is allowed. The company owns maximum control on the information managed by the device. Some Blackberry devices were only COPE designed.
For the BYOD device, is the opposite, because this type of model is very unsecure since it doesn't count with the security barriers like the COPE model does, leading to the user losing critical information or getting hacked by installing malware. Even though it is a cheaper alternative for a lot of companies, it's far away from beign the most recommendable in terms of security, productivity and privacy.
If you enter the formula, =B2-B5-B6 into cell B7, the answer would be ____.
A. 70
B. 80
C. 30
D. 10
Please insert an image to refer to
Answer: 30
(Got it right on Odyseyware)
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
Answer:
DiffServ (Differentiated Service)
Explanation:
DiffServ (Differentiated Service) field is used to prioritize traffic in IPv4 packet.
DiffServ is used as QoS (quality of service) on networks at Layer 3, replacing former IPv4 TOS field to effectively deal with the web traffic and prioritization issues starting from 1998.
HOUSE HEARING, 109TH CONGRESS - THE INTERNET IN CHINA: ATOOL FOR FREEDOM OR SUPPRESSION?
Answer:
SUPPRESSION TOOL
Explanation:
In China there is not internet, in this Asian country exists the biggest intranet in the world, with a lot of government restrictions.
If we try to enter any occidental social media, we cannot because the Chinese government has these websites blocked even in cellphone apps.
Chinese people cannot talk bad about the government because they can go to the prison, China has their social media, nobody can say a bad comment about the government, in addition in China have a scoring system, if you have a bad score, you cannot get a job or a loan.
According to security vendor Finjan Software, a bug in Google could have allowed attackers to grab a Google user’s ____.
Answer:
The correct answer for the given question is "cookie".
Explanation:
In the security of vendor Finjan Software, a bugs or error in the google could allowed the attackers the grab the information of google users account i.e cookie.The cookie gives all the information of google account OF that user because it is stored in the client side machine that means it stored in the web browser .all the information of particular user are stored in the browser with the help of cookie attackers easily grab the information by using cookie and harm the user.
Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injection attack against the server. What term describes the issue that Adam discovered?
Answer:
Vulnerability
Explanation:
Vulnerability: In information security, Vulnerability is defined as a weakness or flaw in the system which leaves it wide open to attackers to gain sensitive/confidential information and cause severe damage to the organization.
What can happen?
If this weakness doesn’t get treated, then the SQL injection attack is most likely to happen which will result in sensitive database being stolen by the hackers. This can cause serious implications for any organization hence it very important to take such vulnerabilities very seriously and dealt accordingly.
While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?
Answer:
Wireshark
Explanation:
Wireshark is a free tool used to troubleshoot a network it was named wireshark in 2006 from ethereal due to trademark issues, it is especially used for examining the information exchange between the server and the client. You can analyze and read live data on different types of network. Wireshark is an important tool for network admins, QA engineers, developers, etc.
What are some types of vehicle technology advancements?
A. Navigation system
B. Dashboard of a car
C. Braking systems
D. All of the above
Answer:
D is the suitable answer.
Explanation:
All of the above
The incorporation of technical advancements into automobiles improves their value and utility for car owners, while also making them safer and more user-friendly. Thus, option D is correct.
What are the role of vehicle technology advancements?In addition to the traditional safety measures like seatbelts and airbags, more recent innovations like automatic braking and front collision warning are now becoming standard.
Similar to how countless sensors, bells, and whistles assist us in maintaining the efficient operation of our machinery, cushions or heated seats assist us in traveling in comfort.
The actual application of knowledge about self-propelled machines or vehicles is known as automotive technology.
Therefore, Students majoring in automotive technology gain knowledge of a variety of topics, including engine design, fuel and ignition systems, drivetrains, brakes, and gearboxes, as well as electronic and diagnostic tools.
Learn more about vehicle technology here:
https://brainly.com/question/11314281
#SPJ5
Refer to the following code segment. You may assume that array arr1 contains elements arr1[0],arr[1],...,arr[N-1], where N = arr1.length int count = 0; for (int i = 0; i < N; i++) if (arr1[i] != 0) { arr1[count] = arr1[i]; count++; } int[] arr2 = new int[count]; for (int i = 0; i < count; i++) arr2[i] = arr1[i]; If arr1 initially contains the elements 0, 6, 0, 4, 0, 0, 2 in this order, what will arr2 contain after the execution of the code segment?
Answer:
6, 4, 2 will be contained by the arr2.
Explanation:
In the following code execution the integer array variable "arr2" contain 6, 4, 2 elements because in the code, set integer type variable "count" and initialize to 0 then, set the for loop which starts from 0 and end at length of the array variable "arr1" then, set the if conditional statement and check condition the variable "arr1" is not equal to 0 then, the value of the variable "arr1" initialize in the variable "arr2".
Your wireless network has been breached and it seems as though the attacker has modified a portion of your data that is used with a stream cipher. This was used to expose wirelessly-encrypted data. What type of attack is this?
Answer: IV attack
Explanation:
IV attack is stand for the initialization vector attack that are used over the wireless network an it is used as the encrypted packet during the process of transmission. An initialization vector attack basically attempts for exploits for exposing the encrypted information.
According to the question, the IV attack is basically used with the stream cipher for exposing the information wirelessly.
The initialization vector is one of the arbitrary number that are used in the for of secret key in the system and it helps in prevent the duplicate character in ciperhtext.
Therefore, IV attack is the correct answer.
A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that?
Answer:
192.168.1.96/28 and 192.168.1.64 /27
Explanation:
In computer networking, subnetting is a way of sharing up a network into several more networks. It's importance includes improving routing effectiveness, enhancing security on the network and better managment control. subnetting is acheived by slicing IP address, in the case given in the question, Subnet 192.168.1.64 /27 with 5 bits allocated for the host and will only be able to hold 32 addresses, Subnet 192.168.1.96/28 on the other hand has 4 bits for the host addresses and as such will be able to hold 16 addresses.
All of the following are U.S.-EU data privacy requirements except:
Select one:
a. Notice of purpose and use of data collected
b. Redundant hardware and data backup systems
c. Access for consumers to their information
d. Adequate security, data integrity, and enforcement provisions
Answer:
b. Redundant hardware and data backup systems
Explanation:
Data privacy is important where a company collects, processes and stores personal information.In the US-EU have laid down regulations to ensure data privacy is maintained. It is a requirement before collection of personal data, to clearly state why the data is being collected and how it will be used.The individuals whose data is being processed have a right to access their data at no cost during processing . Of great importance is the security of the data so as to maintain its integrity, Companies are required to take steps in protecting the data from unauthorized access, processing and accidental loss.redundant hardware and data backup system are used by companies as a fail-safe mechanism in data protection but they are not a requirement in data privacy, although they enhance it.
Hamish has created a website with an online booking system for his salon appointments. He wants to engage more with his customers and came up a list of goals. Help Hamish to match each task with the online tool you think he should use to achieve his goal.
Answer:
Gather customer feedback: Email SurveyTell customers about the extended opening hours: Social Media PageShow customers Hamish’s latest hair looks: An online galleryHelp customers find the new salon: A mapExplanation:
1. By sending a questionnaire or survey via email, Hamish can gather customer feedback. Customers can answer these questionnaires directly in attached questions. They can also give feedback over email. Email survery is an economical way to collect feedback and can be sent to a many customers at the same time.
2. Hamish can tell customers about opening hours by a Social Media Page is a mean to assist social media accounts through QR Codes. He can update with his salon information via this web page. When customers scan can see salon's logo, information etc on this page in order to follow.
3. Hamish can display his latest hair looks through an online gallery by sharing his photos to many people. These images are stored, organized displayed and shared on the website (online gallery). This is a better option than using expensive albums and hard copies.
4. Hamish can help customers to find a new salon by providing a map on his website. This makes easier for customers to locate the new salon as map provides with the navigation information. Customers can get a route from their current location to the salon.
The online tools that Hamish should use to engage more with his customers are;
Map: for directionsEmail: exchange informationWhat are online tools?Online tools are tools such as email, social media handle that can help one business to move forward and gain potential customers.
In the case above, Hamish can use email to exchange information with his clients about his products.
Learn more Online tools at;
https://brainly.com/question/24749457
. What does it mean when a school bus is stopped with its red signal lights flashing? A. Children are loading or unloading and you must stop and wait for the lights to stop flashing before you move B. Children are loading or unloading and you must slow down and pass carefully C. Children are loading or unloading and you must make a complete stop and pass carefully D. Children are loading or unloading and you must look out for pedestrians as you continue on your way
Answer: A. Children are loading or unloading and you must stop and wait for the lights to stop flashing before you move.
Explanation: This is a major safety Management in the roads,managed by The National Highway Traffic Safety Administration (NHTSA) of the United States Department of transportation, its mission is to Save lives, prevent injuries, reduce vehicle-related crashes. NHTSA was established December 31,1970.
Once a school bus is stopped with its red signal flashing all vehicles must stop pending the Loading or unloading of the school children is completed and the flashing red signal stopped.
Answer:
A. Children are loading or unloading and you must stop and wait for the lights to stop flashing before you move.
Computer maker Dell realized the problems with keeping large inventories, especially because of the fast rate of obsolescence of electronics components. Dell now keeps only about two hours of inventory in its factories. The company is most likely using a ________ system.
Answer:
what are you asking
Explanation:
Which of the following is true regarding the use of instance variable j in class B1?
A) It is directly accessible only in B1
B) It is directly accessible only in B2
C) It is directly accessible only in B3
D) It is directly accessible in B1 and B2
E) It is directly accessible in B1, B2, and B3
Answer: A) It is directly accessible only in B1
Explanation: In the given chunk of code, Class B1 is a base class. Class B2 is derived class of class B1. Class B3 is derived class of B2. As you can see class B1 has two members or instance variables i and j. Instance variable cannot be directly accessible by both B2 and B3. If you see this statement of the given code private int j; the keyword private is used with the variable j. This keyword is called access specifier. Access specifiers specifies how the members of a class can be accessed. These members are attributes and methods of that class. Any member of a class that are declared private cannot be inherited by derived classes of that class. Additionally these private members cannot be accessed from within any method inside derived class. So j is directly accessible only in B1. You can access a private instance variable from within the same class or can access it through the methods of class.
which command should you enter to configure a single port to discard inferior bpdus 200-125?
Answer:
spanning-tree portfast bpduguard
Explanation:
spanning- tree protocol (STP) is a layer 2 protocol in the OSI model. It is automatically configured in a switch to prevent continual looping of BPDUs, to avoid traffic congestion. The fastport bpduguard is only applicable in non-trunking access in a switch. It is more secure to configure the fastport mode in switch port connected directly to a node, because there are still bpdus transfer in a switch to switch connection.
BPDUs Guard ensures that inferior bpdus are blocked, allowing STP to shut an access port in this regard.
A python programmer is writing a function definition. What syntax should be used?
Answer:
Syntax of function in the Python Programming Language.
def function_name():
'''body of the function or code'''
#calling of the function
function_name()
Note: In Python Programming Language, Indentation is sensitive if you not focus on the indentation then, you program occurs an indentation error.
Explanation:
In Python Programming language, we can use the "def" keyword to define a function then we write the name of the function and then use parentheses for the argument list. "#" is used for the single-line comment and " ''' ''' " is used for the multiple line comment.
A function is the part or module of the program which provides users the feature of reusability of that code anywhere only by calling them.
Answer:
def functionName( arguments ):
statement1
statement2
statement3
Explanation:
help me please and thanks
Answer:
b
Explanation:
1) These are operators that add and subtract one from their operands. A) plus and minusB) ++ and --C) binary and unaryD) conditional and relationalE) None of theseAnswer: 2) What is the output of the following code segment?n = 1; while (n <= 5) cout << n << ' '; n++; A) 1 2 3 4 5B) 1 1 1... and on foreverC) 2 3 4 5 6D) 1 2 3 4E) 2 3 4 5Answer: 3) This operator increments the valu
Answer:
1) B: ++ and --
2) B: 111... and on forever
Explanation:
++ and -- in most programming languages are used for incrementing(adding) by 1 or decrementing(substracting) by 1.
The code will output 111... and on forever because the while loop was not covered in curly braces.
--------------------is a host that runs software to provide information, such as web content, to other hosts.
Answer:
Server is the correct answer for the above question.
Explanation:
The Network is an architecture which is used to connect one or more computer (host) to share the information or to do communication. There are two types of 'host' in this network--- one is server and the other is the client. The Server is used to provide the functionality to the clients whereas clients are used to taking the information from the server. The Server is a collection of larger database and software which have following functions--
It runs the software for the clients.It authenticates the clientsIt gives the information or answer to the question asked by the clients.The above question statement asked about a device which is used to run the software for other host and provide information to other host and that is a server which is host computer connected in the network. Hence the server is the correct answer.
A salesperson in your organization spends most of her time traveling between customer sites.After a customer visit, she must complete various managerial tasks, such as updating yourorganization's order database.Because she rarely comes back to your home office, she usually accesses the network from hernotebook computer using Wi-Fi access provided by hotels, restaurants, and airports.Many of these locations provide unencrypted public Wi-Fi access, and you are concerned thatsensitive data could be exposed. To remedy this situation, you decide to configure her notebookto use a VPN when accessing the home network over an open wireless connection.Which key steps should you take when implementing this configuration? (Select two.)a. Configure the VPN connection to use MS-CHAPv2.b. Configure the browser to send HTTPS requests through the VPN connection.c. Configure the VPN connection to use IPsec.d. Configure the browser to send HTTPS requests directly to the Wi-Fi network withoutgoing through the VPN connection.e. Configure the VPN connection to use PPTP.
Answer: b. configure the browser to send HTTPS requests through the VPN connection
e. configure the VPN connection to use PPTP
Explanation:
b. sending the HTTPS requests directly to the WiFi network will bypass the VPN which will make the sensitive data vulnerable, hence, defeating the reason for making use of the VPN.
e. the salesperson accesses the WiFi using her notebook computer, which is most likely going to be running on a windows operating system, OS. The VPN connection type for windows OS is usually PPTP (it will be provided in the subscription details by the VPN being used). However, Mac OS does not support the PPTP. In such cases, the VPN being used will also provide the information (usually IKEv2).
Which of the following IP address ranges is reserved for automatic private IP addressing?
Answer:
169.254.0.1 to 169.254.255.254
Explanation:
Automatic Private IP Addressing is a feature in windows computers that gives a computer the ability to assign itself an IP address in the situation that there is no DHCP (Dynamic host configuration protocol) to do the task. the above range of IP Address are the reserved addresses available to chose from when the need arises.