1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
12

Activities that scan network locales for active systems and then identify the network services offered by the host systems is kn

own as __________.
Computers and Technology
1 answer:
antoniya [11.8K]3 years ago
8 0
The answer is fingerprinting
You might be interested in
Terry visits the website www.examplewebsite.org. What can you gather about the site from the domain?
Alja [10]
Answer: B

Explanation: This question asks the student to consider the domain .org. The student needs to know that org is short for organization. This would point to option B. For option A to be true, the domain would need to be .com. Option C and D couldn’t be true, as there is no domain to point to these options. For option E to be true, the domain would need to be .gov.

Hope this helps! Comment below for more questions.
3 0
3 years ago
If you receive an email message you suspect is spam, what should you do?
Alla [95]

Answer:

A.  delete the message without opening it.

Explanation:

Never open emails you don't know who sent it, it could be a hacker trying to get your personal/financial information.

6 0
4 years ago
Lindsey also needs to calculate the commissions earned each month. If the company earns $200,000 or more in a month, the commiss
lutik1710 [3]

Answer:

I have created and attached an image with example values for this question.

First we'll learn the IF function syntax:

IF(logical_test, value_if_true, [value_if_false])

Where

logical_test is the decision making comparison

value_if_true is the result to return when TRUE

value_if_false is the result to return when FALSE

We assume that cells B10 to G10 contain the Total Sales for January to June. And cells B17 to G17 contain the Commissions for January to June.

a.

The formula to use in cell B17 is:

<em>=IF(B10>=200000;True;False)</em>

<em />

b.

The formula to use in cell B17 is:

<em>=IF(B10>=200000;B10*0.35;False)</em>

<em />

c.

The formula to use in cell B17 is:

<em>=IF(B10>=200000;B10*0.35;B10*0.27)</em>

<em />

d.

To copy the formula in B17 to C17:G17, you can just copy and paste or select cell B17 and drag from the black square on the bottom right of the cell.

8 0
3 years ago
Read 2 more answers
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. Yo
krok68 [10]

Answer:

have the same SSID but different channels

Explanation:

Based on the information provided within the question it can be said that the best option to accomplish this would be to have the same SSID but different channels. This would maintain the users connected to the same network name (SSID) but still be able to roam and jump from one access point to the other.

7 0
3 years ago
Read 2 more answers
For each problem listed below, use the drop-down menu to select the field of the professional who can help solve the issue.
Paul [167]

Answer:

  • Interactive media
  • Information services and support
  • Programming and software development
  • Network systems administration

Explanation:

The company has finished designing a software program, but users aren’t sure how to use it. <u>interactive media</u>

Several people in the human resources department need new software installed. <u>information services and support</u>

An employee has an idea for a software program that can save the company time, but doesn’t know how to write it. <u> programming and software development</u>

A new branch of the company is opening soon, and the computers there need to be connected to the Internet. <u>network systems administration</u>

<u>OAmalOHopeO</u>

3 0
3 years ago
Other questions:
  • Wharton professor Jerry Wind "believe[s] that digital networks are the key differentiator, [and] enable new forms of sharing, di
    9·1 answer
  • Which type of multiple inheritance does Java support?
    15·1 answer
  • You should not define a class field that is dependent upon the values of other class fields: Group of answer choices In order to
    14·1 answer
  • Help!!!!!!!!!!!!!!!!!!!
    12·1 answer
  • __________bits equal one byte.EightTenSixty-fourThirty-twoSix
    10·1 answer
  • Write a Java class called getName that prompts a user for their name and then displays "Hello, [name here]!" The flow should loo
    14·1 answer
  • 16. What's the difference between a footnote and endnote?
    11·1 answer
  • You designed a program to find the midpoint of two points. Which step below corresponds to finding the average of the x-coordina
    15·1 answer
  • Will give 5 star and mark brainleist
    14·1 answer
  • True or false, the total number of clock cycles (cc) for a delay loop of 10 ms for 2-mhz 8086 clock is 10,000 cc.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!