Sign In
Ask Question
Computers & Technology
Sariah Hudson
You are least likely to feel that an Internet source is reliable if the information is posted
A. from a university department.
B. without a specific source.
C. on the U. S. Department of Labor Web site.
D. on the Web site of your local police department.
Answer
Answers (1)
Computers & Technology
Guest
This device transmits data to all the workstations on a network. gateway hub router switch
Answer
Answers (1)
Computers & Technology
Anne Kelly
You've been asked to conduct a penetration test for a small company and for the test, you were only given a company name, the domain name of their website, and the IP address of their gateway router. What describes the type of test?
Answer
Answers (1)
Computers & Technology
Xiomara Hatfield
Write a program that prompts the user for an integer and then prints all prime numbers up to that integer.
Answer
Answers (1)
Computers & Technology
Donavan Huang
Given the following code segment, what is output after "result = "? int x = 1, y = 1, z = 1; y = y + z; x = x + y; cout << "result = " << (x < y? y : x) << endl;
a. 2
b. 3
c. 4
d. 1
Answer
Answers (1)
Computers & Technology
Memphis Bernard
E-Waste recycling dispose of toxic heavy metals such as:
A. lead and mercury
B. gold and silver
C. copper and steel
D. Brass and copper
Answer
Answers (1)
Computers & Technology
Macey Mckay
Give a BNF grammar for the language "The set of all strings consists of zero or more As".
Answer
Answers (1)
Computers & Technology
Nigel Pierce
Refer to the exhibit. the gigabit interfaces on both routers have been configured with subinterface numbers that match the vlan numbers connected to them. pcs on vlan 10 should be able to print to the p1 printer on vlan 12. pcs on vlan 20 should print to the printers on vlan 22. what interface and in what direction should you place a standard acl that allows printing to p1 from data vlan 10, but stops the pcs on vlan 20 from using the p1 printer? (choose two.)
Answer
Answers (1)
Computers & Technology
Olivia Ford
Marge needs to collect network device configuration information and network statistics from devices on the network. She wants to protect the confidentiality of credentials used to connect to these devices. Which of the following protocols would BEST meet this need?
a. SSH
b. FTPS
c. SNMPv3
d. TLS
Answer
Answers (1)
Computers & Technology
Moreno
What does "WPA" stand for?
Answer
Answers (2)
Computers & Technology
Mira Wilkins
Which of the following is not considered a Personal Computer (PC) A. A gaming computer B. An ultrabook C. A mainframe D. A macbook
Answer
Answers (2)
Computers & Technology
Karley Bartlett
This system relates to the process by which an organism replicates. Sexually reproduction usually involves male cells (sperm) meeting female cells (eggs) to produce a fertilized egg or zygote.
Answer
Answers (1)
Computers & Technology
Donavan Adams
The section of an inode that stores permissions is referred to as what?
Answer
Answers (1)
Computers & Technology
Yurem Villegas
Cell phones replacing fixed line phones is an example of:
Select one:
a. Disruptive innovation
b. Differentiation
c. A value shift
d. None of the above
Answer
Answers (1)
Computers & Technology
Reginald Thornton
Martha receives an e-mail message containing a notice that appears to be from her bank, asking her to call and update her password. Which type of attack is this?
Answer
Answers (1)
More
1
...
222
223
224
225
226
...
Home
»
Computers & Technology
» Page 224
Sign In
Sign Up
Forgot Password?