Answer:
b. white-hat hacker
Explanation:
A White-hat Hacker, also known as an Ethical Hacker is an information security specialist, known for performing penetration testing and checks in search for information and communications system's vulnerabilities on demand for his/her clients.
These efforts are meant to find security risks before someone else does, who could cause any kind of damage to the systems or unauthorized access to sensitive information
I would go with A) Tablet because that's basically a bigger phone and mobile cmp combined, its not D) because that's a synonym for a smartphone and not C) because paper and pencil is not like a smartphone, and not B) because that's like reading online books.
Answer:
C. 2^16
Explanation:
In Computer Networking, there are five (5) classes of IP addresses, these include;
- Class A
- Class B
- Class C
- Class D
- Class E
The various classes of IP address are represented by the value of their first octet. The first octet value of Class B is 128-191 with a subnet mask of 16.
Hence, from the IP address 149.130.x.y where x and y are 8-bit numbers. The x and y equals 16-bit numbers.
Thus, 2^16 devices can connect to the Wellesley network before we run out of IP addresses.
That is true your state of mind is what matters most