1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sati [7]
1 year ago
10

A message is sent to all hosts on a remote network. Which type of message is it?.

Computers and Technology
1 answer:
Nimfa-mama [501]1 year ago
4 0

Answer:

a directed broadcast

Explanation:

You might be interested in
While developing a network application, a programmer adds functionally that allows her to access the running program without aut
Ierofanga [76]

Answer:

Backdoor

Explanation:

Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level

The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts

5 0
3 years ago
How can you logout your account and do not want to have this anymore
hram777 [196]

Answer:

Just Click Log out!

Explanation:

Its Simple, really! I promise its real

5 0
3 years ago
Read 2 more answers
What would be the best tool to display the following information from a basketball game?
Shkiper50 [21]
A table. Hope this helps friend
4 0
3 years ago
Which statement describes borders and shading ?
Marina CMI [18]

Answer: Borders are rules you can add to any or all of the four sides of a paragraph. Shading is the color or artistic design you use as background for a paragraph. Borders and shading are formatting tools for enhancing text, paragraphs, table cells or frames.

3 0
3 years ago
Consider the following schema for customer: (id, name, street, city, state, zip, phone), in which customers are uniquely determi
Art [367]

Answer:

Super key is a set of attributes that uniquely identifies all attributes in a relation.Super keys are more than candidate key.

Explanation:

For example in the given schema where

Customer: (id , name , street , city,state,zip,phone)

We have a relation we check super keys by following dependencies

Functional Dependencies                          Super Key

id                                                                     YES

name                                                               YES

id , name -> street , city,state,zip,phone       YES

id , street  ->name , city,state,zip,phone       YES

id,city ->name , street ,state,zip,phone         YES

id,state ->name , street ,city,zip,phone         YES

id,phone  ->name , street ,state,zip,city        YES

id , name , street                                             YES

id , name , street , city                                    YES

id , name , street , city,state                          YES

id , name , street , city,state,zip,phone         YES

All these are uniquely identified

All these are super key but in reverse they are not super key such as

street , city,state,zip,phone->id , name        No

8 0
3 years ago
Other questions:
  • What shooting position is commonly used when hunting with a shotgun?
    14·2 answers
  • What so the term used to describe how many bits are used in each pixel?
    7·1 answer
  • An organization is assigned a Class-C network 200.120.80.0 and wants to form subnets for its threedepartments: D1 (60hosts), D2
    7·1 answer
  • What command is most effective at identifying different types of files?
    6·1 answer
  • Suppose that the instruction format for a modified Little Man Computer requires two consecutive locations for each instruction.
    5·1 answer
  • The elements in a long array of integers are roughly sorted in decreasing order. No more than 5 percent of the elements are out
    12·1 answer
  • Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
    8·1 answer
  • What does BGP use by default to calculate the best route?
    15·1 answer
  • 2. How does the internet give us the ability to communicate?
    15·1 answer
  • Provide the user with a menu for the following 10 algorithms. Then ask which algorithm the user decides she/he wants to use. Fin
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!