1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goblinko [34]
3 years ago
11

What is the definition of a server?

Computers and Technology
1 answer:
elena-14-01-66 [18.8K]3 years ago
8 0

Answer:

A person or thing that provides a service or commodity.

You might be interested in
Assume you have the following array: int[] values = new int[15]; What will happen if the following code is executed? int[15] = 2
andrey2020 [161]

Answer:

You are creating an array "values" which stores 15 integers. And if we will write int[15]=20, we are not following correct syntax. Hence, nothing will happen, and it might however, throw an error that the syntax is wrong.

Explanation:

int[15]=20 is a wrong syntax, and hence nothing will happen or computer might throw an error like that not correct syntax is being used. And if we write values[15]=20,  It will certainly throw ArrayIndexOutOfBoundsException as the maximum length is fixed to 15 and values[14] and not more than that.  

3 0
4 years ago
Identifying the problem is crucial when trying to solve a problem. There are several techniques that you can use to aide you in
erica [24]
Consensus Building is NOT a technique that you can use to help you in identifying a problem.
8 0
4 years ago
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
tatiyna

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

5 0
3 years ago
Which Cisco network security tool is a cloud-based service that provides alerts to network professionals about current network a
ArbitrLikvidat [17]

Answer:

Security Intelligence Operations      

Explanation:

Security Intelligence Operations    

  • It is an advanced security framework that offers the detection, assessment and prevention of risks and continuously provides clients with the maximum level of security.
  • It provides quick and efficient security to allow consumers to interact and work together and adopt new technology in a secure manner.
  • It does effective identification of malware, proactive security against loss of data and embraces new technologies to stay ahead of the new threats.
  • The three main components of Cisco Security Intelligence Operations are Cisco SensorBase, Threat Operations Center, and Dynamic updates.
  • Cisco SensorBase is the biggest vulnerability detection database that collects traffic and sensor data from an extensive network of Cisco devices and services worldwide.
  • Threat Operations Center consists of a virtual team of researchers, technicians, security analysts, engineers that collect data from SensorBase and provide actionable intelligence and realistic information to provide security against current and complex threats.
  • Dynamic updates provide real time alerts distributed automatically to monitoring devices, as well as best guidelines and other resources focused on helping customers to monitor attacks, interpret information, and eventually improve the overall security procedures of their organization.
4 0
3 years ago
The system log daemon, rsyslogd, creates a socket for other system processes to write to. what is the path to this socket?
Vlada [557]

If the system log daemon, rsyslogd, creates a socket, the path to this socket is known to be /dev/log.

<h3>What is the system log daemon?</h3>

The syslog daemon is known to be a kind of a server process that is known to often gives or provides a form of message logging tools that is made for application and system processes.

Note that the syslog daemon is said to be one that begins by the Internet Daemon and it is also one that tend to receives messages on well-known port such as  514.

Note that The syslog daemon must be on before any application program and as such, If the system log daemon, rsyslogd, creates a socket, the path to this socket is known to be /dev/log.

See full question below

The System Log Daemon, rsyslogd, creates a socket for other system processes to write to. What is the path to this socket?

Select one:

a. /etc/rsyslog.socket

b. /var/log.sock

c. /tmp/log

d. /dev/log

Learn more about system log from

brainly.com/question/25594630

#SPJ1

6 0
2 years ago
Other questions:
  • Which document lists the planned dates for performing tasks and meeting goals identified in the project plan?
    15·1 answer
  • PLS HELP!!
    13·1 answer
  • Which step of the machine cycle examines the op-code of the next instruction to be executed?
    12·2 answers
  • Whats your favorite sport between these options?
    12·2 answers
  • Explain with a few sentences and using the terms sequencing, selections and loops how they
    9·1 answer
  • Many contemporary languages allow two kinds of comments: one in which delimiters are used on both ends (multiple-line comments),
    7·1 answer
  • Does Congress have a role in determining FAA regulations? If so, what is it?
    11·1 answer
  • To use appropriate personal protective equipment we should​
    12·1 answer
  • Before u can open and edit a file, you need to zip it, T/F
    12·1 answer
  • Hue purchased 50 shares of stock on April 24, 2019. The price skyrocketed, so she decided to sell the stock in April of 2020. Wh
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!