The Cisco three-layer hierarchical model doesn't describe how communications take place.
What is Cisco three-layer hierarchical model?The Cisco three-layer hierarchical model is also referred to as a hierarchical internetworking model and it can be defined as a three-layer model that's used for the design of an enterprise (large) network based on the following layers:
Core layerDistribution layerAccess layerIn conclusion, the Cisco three-layer hierarchical model doesn't describe how communications take place, but it focuses on how best to design a an enterprise (large) network.
Read more on Cisco three-layer hierarchical model here: https://brainly.com/question/3787380
#SPJ1
Which VPN protocol provides encryption but does not support IP multicast traffic?
IPsec
PPTP
L2TP
SSL VPN
Answer:
this?
Explanation:
multiple choice?
When you start an online course, what should you do to make sure you have access to college resources
As a student starting an online course, you should explore the college website to make sure you have access to college resources.
What is an online course?An online course can be defined as an education programme that typically involves the process of providing and sharing learning resources (contents) in an organized way over the Internet, so as to allow the students (users) progress in their understanding of a course or topic.
As a student starting an online course, you should do the following to make sure you have access to college resources:
Explore the college website.Bookmark links to your course.Search for information with regards to advising, degree requirements, and financial aid.Read more on online course here: https://brainly.com/question/14591988
#SPJ1
Choose the correct numbers in order to have the following output.
3 1
3 2
4 1
4 2
for numx in [3,
]:
for numy in [1,
]:
print (numx, numy)
Answer:
4, 2
Explanation:
for numx in [3, 4]:
for numy in [1, 2]:
print (numx, numy)
make sure to indent properly
The correct numbers, in order to have the following output, are 4, 2. The correct option is d.
What are the outputs of coding?A programmer may decide to incorporate outputs to keep the user updated on what is happening inside the program. Here, the user is presented with the program's data either visually (on the screen) or physically (as printouts or signals, for example).
The communication between an information processing system, such as a computer, and the outside world, which may include a human or another information processing system, is known as input and output, or I/O. The system's inputs are the signals or data it receives, and its outputs are the signals or data it sends.
for numx in [3, 4]:
for numy in [1, 2]:
print (numx, numy)
Therefore, the correct option is d. 4 2.
To learn more about the outputs of coding, refer to the link:
https://brainly.com/question/28992006
#SPJ2
What report shows which types of mobile devices visited a website?.
Answer:
Technology > Network report. All traffic > Source/Medium report.
Explanation:
hope this helps
When you insert a new slide in a presentation, where is it placed in relation to the existing slides?.
What is the one small catch with password managers?.
Answer:
password managers can acess and autofill your passwords
Explanation:
the catch is if you loose all data from your computer or smartphone, then you loose all your passwords
Define special computer
Answer:
A computer designed from scratch to perform a specific function. Contrast with general-purpose computer. See ASIC.
Answer:
Special computer is the computer designed for a particular type of application only. It is defined as a stored program digital computer, whose architecture is oriented towards one or more applications.
what is full form COMPUTER????
Explanation:
The full form of the Computer is Common Operating Machine Purposely Used for Technological and Educational Research.
Explanation:
The computer full form of common opreating machine purposely used for technical educational research
I hope you helps:)
True or False. It is OK for students to find answers to questions on the Internet and submit those answers during a test.
Strange question, but I would say false. FALSE
Why online fraud rose 79% in UK after they switched to the chip and PIN system in the first three years?
Answer:
TBH I HAVE NO FREAKING IDEA BUT I NEED POINTS BC IM DOING AN EXAM AND HAVE NO MONEY SORRY
Remote workers in an organization use company-provided laptops with locally installed applications and locally stored data Users can store data on a remote server using an encrypted connection. The organization discovered data stored on a laptop had been made available to the public. Which of the following security solutions would mitigate the risk of future data disclosures?(A) FDE(B) TPM(C) HIDS(D) VPN
Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.
What is FDE in security?Full disk encryption (FDE) is known to be a kid of a security measures that is often taken so as to help in the protection of all data saved on a hard drive from any kind of unauthorized access through the use of disk-level encryption.
Therefore, Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.
Learn more about Remote workers from
https://brainly.com/question/26512743
#SPJ1
what are backup storage device of computer ?
advantages and disadvantages of algorithm
Answer:
\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
Explanation:
It is easy to understand. Algorithm is a step-wise representation of a solution to a given problem. In Algorithm the problem is broken down into smaller pieces or steps hence, it is easier for the programmer to convert it into an actual program
Algorithms are time-consuming. Big tasks are difficult to put in algorithms. Difficult to show branching and looping in algorithms. Understanding complex logic through algorithms can be very difficult.
1. The Forever block is present in the
......... block category.
Answer:
loop or a repeating block. I think it’s this because I like robotics and I have to know a lot of different kinds of blocks.
Explanation:
This is why.
The _____ _____ form of database attack injects code into user login information with one or more statements that perform actions on the database.
Answer:
The answer is cross-site scripting(XSS)attack.
Explanation:
Hope this helps!
The cross-site scripting (XSS) attack form of database attack injects code into user login information with one or more statements that perform actions on the database.
What is cross-site scripting (XSS)?Cross-site scripting (XSS) attacks insert a malicious executable script into the source code of a trustworthy program or website. Attackers frequently give users a malicious link to click on in order to launch an XSS attack.
Cross-site scripting can be broadly classified into three types: stored, reflected, and DOM-based XSS. When a third-party web application is loaded from an unrelated attack site in a way that makes it execute a JavaScript segment that has been prepared by the attacker in the security context of the targeted domain by using a reflected or non-reflected.
Thus, it is cross-site scripting (XSS) attack.
For more information about cross-site scripting (XSS) attack, click here:
https://brainly.com/question/26706948
#SPJ5
i'll give u 16 points answer thisss
What are two benefits of defining a function?
Answer:
enhances the readability of a program.
Northern trail outfitters has the case object set to private. the support manager raised a concern the reps have a boarder view of data than expected and can see all cases on their groups dashboards. what could be causing reps to have inappropriate access to data on dashboards
The option that could be causing reps to have inappropriate access to data on dashboards is known to be Dynamic Dashboards.
What is a Dynamic dashboards?Dynamic dashboards is known to be a tool that helps all user to be able to view the data they are known to have access to.
Note that in the case above about Northern trail outfitters, the option that could be causing reps to have inappropriate access to data on dashboards is known to be Dynamic Dashboards.
see options below
Northern Trail Outfitters has the Case object set to private. The support manager raised a concern that reps have a broader view of data than expected and can see all cases on their group's dashboards.
What could be causing reps to have inappropriate access to data on dashboards?
A. Public Dashboards
B. Dashboard Subscriptions
C. Dynamic Dashboards
D. Dashboard Filters
Learn more about Dashboards from
https://brainly.com/question/1147194
#SPJ1
The __________ backup method is based on the philosophy that a full backup should occur at regular intervals, such as monthly or weekly
Answer:
full/incremental backup
Explanation:
I believe it's full/incremental backup.
Maria is developing an online gaming website. She is working on an interactive game that has a central character guiding visitors through the game. Which element of multimedia is most suitable for this type of website?
Answer:
The answer is animation. This question has been answered already.
Source:
https://brainly.com/question/12414395
Describe a new career in computer science that may be created in the future
No Code / Low Code Business Analyst.
This would involve someone that goes in to make sure that the business processes of the No Code / Low Code programmers are doing their job efficiently!
A restaurant has an app that allows users to view the menu and order online. You have been hired to upgrade the app because it is out of date, in both style and content. What parts of the existing code could you reuse, and what might you need to design from scratch?
Answer:
You could reuse most of the code. You will need to update some of the style parameters and re-word some of the content, but the base code is there to be used. You will need to fix the items that are on the menu. (Adding new items, Deleting items that don't exist, e.g.)
For this step, submit your work in the programming environment by running your code, checking your code for a score. The score you get will show a percentage - this is a percentage of the 10 possible points. For example, if you check your code and earn a 50%, this means you have earned 5 out of 10 points. You can check your code more than once, until you earn a score you are happy with.
You must include all of the following requirements in your webpage to earn full points:
A page title
At least three headers (h1, h2, etc)
Paragraph tags
Font styles (for example, using to change the font's color)
At least two images (see below for more information about images)
At least one link to another website
One email link
A background, using either of the following techniques:
Inserting a background image (does not count as one of the two images above)
Changing the background color (using the tag)
Once you complete the steps on this page, proceed to Step 2 on the next page. You must complete both steps to complete this unit's assignment.
A sample HTML code that contains headers, paragraph tags, hyperlinks is
<h1> This is a header </h1><h2> This is a subtitle heading </h2><p> This is a paragraph </p><a href=”www.brainly.com”> Brainly Website </a>What is HTML?This is the building block of a website and is an acronym that means Hypertext Markup Language.
The HTML code that can be used to add a sample image is: "<img src="pic_Brainly.jpeg" alt="Brainly" width="500" height="333">
The src code means the specific location of the external resource
The width and height show how tall and wide the image would be.
The alt shows the alternative information for the image that can be seen when a person hovers over the image on the website.
Read more about HTML and CSS here:
https://brainly.com/question/24051672
#SPJ1
What happens when you restrict someone on messenger?.
Answer:
You won't get any notifications from the person that's restricted, via messages, videos, or images. If the restricted person tries calling you, your phone won't ring.
How to change lowercase to uppercase in excel 2010 shortcut key?.
You defined a shoe data type and created an instance.
class shoe:
size = 0
color = 'blue'
type = 'sandal'
myShoe = shoe()
Which statement assigns a value to the type?
type = 'sneaker'
myShoe.type( 'sneaker')
myShoe.type = 'sneaker'
NEXT QUESTION
ASK FOR HELP
Answer:
myShoe.type = 'sneaker'
Explanation:
type is a field of the class shoe. The myShoe object which is an instance of the class shoe has the field type also.
To assign a value to type filed of the object myShoe, reference the object then the field as such;
myShoe.type = "sneaker"
You defined a shoe data type and created an instance. The statement that assigns a value to the type is myShoe.type = 'sneaker'. The correct option is C.
What is data in programming?A variable's data type and the kinds of mathematical, relational, and logical operations that can be performed on it without producing an error are classified as data types in programming.
An attribute of a piece of data called a "data type" instructs a computer system on how to interpret that data's value.
type is one of the class shoe's fields. The field type is also present in the myShoe object, which is an instance of the class shoe.
Reference the object and the field as such in order to assign a value to the type field of the object myShoe;
Therefore, the correct option is C. sneaker" in myShoe.type.
To learn more about data in programming, refer to the link:
https://brainly.com/question/14581918
#SPJ2
what is the Result obtained after data processing called?
Answer:
Output
Any information which get processed by and sent out from a computer is called output. It is the final result which we get after processing
Answer:
output
Explanation:
it'll be called output
Which device performs the function of determining the path that messages should take through internetworks?.
Answer:
A router
Explanation:
Mack signs into his laptop and gets a message saying all his files have been encrypted and will only be released if he sends money to the attacker. what kind of software did this
Answer: Ransom-Ware
Random-Ware is a type of malware that encrypts files in hopes of the victim to give the attacker a form of currency to gain access to the files again.
What two functions does tcp/ip perform?
reassemble data packets at the destination.
alert users about unsafe websites and servers.
request servers for data the user wants.
check and request for missing data packets.
The two functions does tcp/ip are:
Reassemble data packets at the destination.Request servers for data the user wants.What are the functions of TCP IP?The role of the Transmission Control Protocol is known to be the one that helps to take in and put together the Data Packets while that of IP is to send the Data Packets to the right location or destination.
Therefore, The two functions does tcp/ip are:
Reassemble data packets at the destination.Request servers for data the user wants.Learn more about tcp/ip from
https://brainly.com/question/17387945
#SPJ1