1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prisoha [69]
2 years ago
10

You are working on a ticket for a user who cannot access the Internet from their PC. After troubleshooting, how do you confirm t

hat the reported problem is solved
Computers and Technology
1 answer:
ki77a [65]2 years ago
8 0
Could be anything?
Maybe you get an email from them on their PC, which means they have internet
You might be interested in
An IT security threat is anything that might cause serious harm to a computer system.
Blababa [14]

Answer:

True

Explanation:

this is true because a threat can endanger the computer and its system

5 0
2 years ago
which feature will configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workst
Ugo [173]

Answer:

Demilitarized zone (DMZ).

Explanation:

Demilitarized zone is a kind of security assurance scheme used by network administrator to detect network breach even before it gets to the secured network.

The private LAN is protected with a firewall and a DMZ is configured to allow access by untrusted users, on another workstation, which is a duplicate of the companies private local address.

7 0
3 years ago
Andy uses a dial-up modem to connect to the Internet. He usually browses news sites, but he notices that online video takes a lo
Korvikt [17]
The answer is C. The modem does not contain enough bandwidth to handle modern video streaming.
4 0
3 years ago
Read 2 more answers
Who Plays Rainbow six siege
vekshin1
What’s that? I never heard of it.
4 0
3 years ago
Read 2 more answers
a. The DES algorithm is based on the idea of the Feistel cipher. Explain how the Feistel cipher structure achieves substitution
madam [21]

Answer:

a. Feistel Cipher is basically a design model used in many block encryption algorithms one of them is DES. The Feistel structure has many rounds of substitution followed by permutation. In each round the plaintext is processed.

A Feistel Cipher comprise of;

1. Divide plaintext block into two parts

2. Perform multiple rounds of

a. Substitution on left half

b. Permutation by swapping halves

See attachment for the diagram of a feistel cipher.

B.

The concept of confusion and diffusion were identified by Claude Shannon in his paper Communication Theory of Secrecy Systems, published in 1949.

According to Shannon's definitions,

-Confusion means, making the relationship between the ciphertext and the key as complex and involved as possible.

It basically hides the relationship between the cipher text and the key. This property makes it difficult to find the key even tough there are many plaintext cipher text pairs created using the same key.

Diffusion is property that the non-uniformity which is much harder to detect. The distribution of the individual and pairs of neighbouring letters in the plaintext should be redistributed into the non-uniformity in the distribution of much larger structures of the ciphertext. The concept behind diffusion is to hide the relationship between the plaintext and the ciphertext. A cipher with good diffusion, should make sure that even if one bit in plaintext changes, then the ciphertext should change completely, in a manner such that its unpredictable.

Both Confusion and diffusion prevents the deduction of encryption key difficult. As a result this protects the original message or plaintext. Confusion and diffusion can be achieved using substitution and permutation.

Encryption methods use the principles of confusion and diffusion.

Confusion does the work of changing the data drastically from input to output by many ways like translate the data using a non-linear table created from the key.

Diffusion is used in encryption to make every bit of input affect every bit of the output which in tun makes the analysis difficult.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which network could NOT carry commercial traffic?
    5·1 answer
  • Which software can managers use to discuss financial performance with the help of slides and charts?
    7·2 answers
  • A user's computer will not boot. A technician notices four indicator lights on the backside of the
    8·1 answer
  • Refer to the following code segment. You may assume that array arr1 contains elements arr1[0],arr[1],...,arr[N-1], where N = arr
    8·1 answer
  • Enterprise Resource Planning (ERP) is an example of a single user database.
    7·1 answer
  • What is a Stereo In (& Out) in audio?
    7·1 answer
  • To display “ hello ” message on the screen
    14·1 answer
  • Group of answer choices When declaring a variable, you also specify the type of its values. Variables cannot be assigned and dec
    7·1 answer
  • A type of authentication that requires the user to provide something that they know, such
    6·1 answer
  • Explain the history of America ​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!