1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
3 years ago
6

What is the name of the port that you plug an ethernet network cable into?

Computers and Technology
1 answer:
IrinaVladis [17]3 years ago
3 0

the answer is RJ-45

You might be interested in
__________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
True [87]

According to security evaluation, <u>Penetration testing</u> is a level beyond vulnerability testing, a set of security tests and evaluations that simulate attacks by a malicious external source (hacker).

Penetration testing is often considered or described as ethical hacking. It involves the process of securing a firm or organization's cyber defenses.

The process of penetration testing or security testing includes assessing for exploitable vulnerabilities in networks, web apps, and user security.

Hence, in this case, it is concluded that the correct answer is <u>Penetration testing.</u>

Learn more about <u>penetration testing</u> here: brainly.com/question/13137421

6 0
3 years ago
Factors to consider while selecting a software to use​
luda_lava [24]
You need to consider what exactly you will be using the software for, there are many different softwares and they all have different purposes.
6 0
2 years ago
I need help thanks please!
maw [93]

Answer:

a) to persuade

she is doing this to propose an idea to the boss of the company

6 0
3 years ago
Read 2 more answers
. Write a function called is_sorted that takes a list as a parameter and returns True if the list is sorted in ascending order a
aalyn [17]

Answer:

There are multiple ways to solve the given problem, I will be presenting the most simple and easy way of solving this problem in few lines of code.

Python code:

def is_sorted(user_list):

   return user_list == sorted(user_list)

user_list=input("Please enter a list: ")

user_list = user_list.split()

print(is_sorted(user_list))

print("Your list: ", user_list)

Explanation:

A function is_sorted is created which takes a list as input and using the sorted() function of python which returns true when the list is sorted in ascending order and returns false when the list is not sorted in ascending order.

Driver code includes getting input list from the user and using split() function to create a list separated by space then printing the output of is_sorted function and in the last printing the contents of that list.

Output:

Please enter a list: 1 3 6 9

True

Your list:  ['1', '3', '6', '9']

Please enter a list: 15 7  2 20

False

Your list:  ['15', '7', '2', '20']

8 0
3 years ago
email communication has its own set of etiquette guildelines for users to follow if they want to be effectove communicators. whi
Len [333]
Effective not effectove. These are guidelines:
Be brief.
Have a short opening sentence or paragraph that puts the matter in context.
Use the middle paragraph(s) to cover the matter(s) in hand.
Close with a clear agreement of what will be done, by whom, and by when.
7 0
3 years ago
Other questions:
  • There are two types of short-term memory: one type is involved in the input and storage of new information, the other type of sh
    9·1 answer
  • Which magazine can help the public to determine the best technology to buy?
    14·1 answer
  • What do yo need to do for device manager to display nonpresent devices?
    9·1 answer
  • Example: An amount of $1,500.00 is deposited in a bank paying an annual interest rate of 4.3%, compounded quarterly. What is the
    5·1 answer
  • Every character is represented by a code. The ASCII code for upper letter A is 65 and for lower a is 97. Similarly the numeric c
    9·1 answer
  • When typing the Works Cited in a report, set a .5" ______ indent. *
    12·1 answer
  • __________________ ensures that each row is uniquely identified by the primary key, which means that a proper search for an exis
    10·1 answer
  • What is the correct process for selecting an entire row in a spreadsheet?
    8·2 answers
  • My friend Leo wants to have an emergency plan for his final exams on University of Southern Algorithmville. He has N subjects to
    6·1 answer
  • You are working at the help desk and you get a message that a user cannot access the internet. you open a command prompt, ping t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!