1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
2 years ago
10

Gary says, "Ports are where data enter a network before reaching a gateway. The data travel via transmission

Computers and Technology
1 answer:
m_a_m_a [10]2 years ago
3 0

The correct explanation of why Gary is wrong is that Ports are where connectors attach to destinations, not where data enter the network.

<h3>What is a port?</h3>

A port is physical part of the computer system where the external devices are connected using cables.

Therefore, it serves as an interface between the motherboard and an external device of the computer.

From Gary statement about ports, he is wrong because, Ports are where connectors attach to destinations, not where data enter the network.

Learn more about ports here:

brainly.com/question/4804932

#SPJ1

You might be interested in
How secure is a password protected word document?
tensa zangetsu [6.8K]
Secure enough to keep someone out who get on your pc but you should encrypted it so no one o the pc or remotely access it with out a password or with out decrypting it
8 0
4 years ago
You are auditing a client's network and have gained physical access to a workstation. To prevent any security software from dete
Llana [10]

Answer:

OphCrack LiveCD.

Explanation:

The user examines that server of a client, as well as requires complete control of such a system. To avoid recognizing its invasion by certain security programs, he wants to select a LiveCD which can break Operating System's credentials,  and he would have been using OphCrack LiveCD because it used to crack the credential of the Windows user.

So, the following are the reason by which the answer is correct according to the scenario.

3 0
3 years ago
Robert is working on an image as part of his school project. he has to do multiple edits on the file. what is a good practice fo
kenny6666 [7]
D, save the file in multiple formats at the beginning
8 0
3 years ago
You want to know your grade in Computer Science, so write a program that continuously takes grades between 0 and 100 to standard
Dominik [7]

Answer:

Following are the program in the Python Programming Language.

#declare variables and initialize to 0

s=0

n=0

avg=0

#set the infinite while loop  

while(True):

 #get input from the user

 score=input()

 #set if statement to break loop

 if(score =="stop"):

   break

 #otherwise, perform calculation

 else:  

   n+= 1

   s=s+ int(score)

   avg= s/n

#print average of the input

print ('average: ',avg)

<u>Output</u>:

58

96

34

15

stop

average:  50.75

Explanation:

<u>Following are the description of the program</u>.

  • Firstly, set three variable that is 's' for sum, 'n' for count and 'avg' for average and initialize them to 0.
  • Set the infinite while loop and inside it, set variable 'score' that get input from the user then, set the if conditional statement for break the loop, otherwise we calculate the sum of the user input and calculate its average.
  • Finally, we print the result with message.
6 0
3 years ago
IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally,
bogdanovich [222]

Answer:

True is the correct answer for the above question.

Explanation:

  • The software is a collection of instruction which states the computer to how to do a specific work. The software developer only develops the software, but it is used by many users of the software who wants to do some specific task.
  • The developer creates a graphical event for users through which the user can use the software of the computer system for his personal use.
  • So the above line concludes that the software is for the user only. So the user interaction in software development is necessary which is also said by the question-statement. Hence the question statement is the true statement.
5 0
4 years ago
Other questions:
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • What is malware short for?
    13·2 answers
  • â________________ software can sometimes be used to decrypt a drive that is utilizing whole disk encryption.
    15·1 answer
  • One example of how psychological research can be used to control harmful behavior would be __________. A. fooling individuals th
    13·2 answers
  • Which of the following peripheral devices can be used for both input and output? mouse touch screen on a tablet computer printer
    5·1 answer
  • Use rounding to decide if the answer is reasonable. Write
    15·1 answer
  • Which platform is the best? (X-box, PC, Playstation, Nintendo Switch, Wii)
    10·1 answer
  • In a new worksheet, you must start by typing in cell A1.
    11·1 answer
  • How can having more than one goal cause truble in the work place
    6·1 answer
  • Example of vector image format​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!