1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kodGreya [7K]
3 years ago
9

The wired or wireless means of connecting a computer to the internet is called a ________.

Computers and Technology
1 answer:
viktelen [127]3 years ago
7 0
The wired or wireless that means of connecting a computer to the internet is called :  B. physical connection
In computers, physical connection does not necessarily physical. It is the medium that do the direct connect to the internet

hope this helps

You might be interested in
Caleb is working in an Excel spreadsheet and realizes that he incorrectly spelled a word he used in multiple cells. Which can Ca
Irina18 [472]
Given the situation above regarding the error that Caleb made in the spelling of a particular word which was repeated in multiple cells, the steps that he can do in order to correct this are the following:
1. G<span>o to Review, Spelling, and select Change each time the error is found.
2. G</span><span>o to Home, Editing, Find, search for the incorrect spelling, and Replace to replace it with the correctly spelled word.
Hope this helps.</span>
5 0
3 years ago
Is www part of every url address?
melisa1 [442]
The correct answer is that WWW. is universal, meaning that any and all url addresses start and have www.

My reasoning is that if you were to look up, lets say google, do :

www.(google).com ( remove parentheses )

then

google.com 

You come up with the same results THUS YOUR CORRECT ANSWER IS YES! ALL URL ADDRESS HAVE AND CONTAIN WWW.!!!

5 0
4 years ago
A Configuration Management System is a collection of formal documented procedures used to apply the following items EXCEPT:
RoseWind [281]

Answer: (C) Confirm project requirement

Explanation:

 The configuration management is the type of system and it is collection of the formal document that is use to applying for the technical direction. It is the subsystem of the management system of the project.

It basically record each change occur in the project and then report the each change status in the project. It also control various physical characteristics in the project.

It identify all the physical and the functional characteristics of any type of service, result and product in the project document. It basically include the tracking system that is used for the document authorizing and also for the controlling purpose.  

4 0
3 years ago
You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
DedPeter [7]

ICMPv6 is used by IPv6 nodes to report errors encountered in processing packets, and to perform other internet-layer functions, such as diagnostics.  An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests.

Explanation:

Issues that are of concern which could be a problem include :

Denial-of-Service Attacks  

  • ICMPv6 can be used to cause a denial of service (DoS) in a number of  ways, including simply sending excessive numbers of ICMPv6 packets to destinations in the site and sending error messages that disrupt  established communications by causing sessions to be dropped.

Probing

  • A major security consideration is preventing attackers from probing  the site to determine the topology and identify hosts that might be vulnerable to attack.  Carefully crafted but, often, malformed  messages can be used to provoke ICMPv6 responses from hosts thereby  informing attackers of potential targets for future attacks.  However, the very large address space of IPv6 makes probing a less effective weapon as compared with IPv4 . Redirection Attacks

Redirection Attacks

  • A redirection attack could be used by a malicious sender to perform  man-in-the-middle attacks or divert packets either to a malicious  monitor or to cause DoS by blackholing the packets.  These attacks would normally have to be carried out locally on a link using the Redirect message.  Administrators need to decide if the improvement  in efficiency from using Redirect messages is worth the risk of  malicious use.  Factors to consider include the physical security of   the link and the complexity of addressing on the link

Renumbering Attacks

  • Spurious Renumbering messages can lead to the disruption of a site.  Although Renumbering messages are required to be authenticated with  IPsec, so that it is difficult to carry out such attacks in practice,  they should not be allowed through a site boundary firewall.  On the  other hand, a site may employ multiple "layers" of firewalls.

Problems Resulting from ICMPv6 Transparency

  • Because some ICMPv6 error packets need to be passed through a  firewall in both directions, malicious users can potentially use  these messages to communicate between inside and outside, bypassing  administrative inspection.

Packet types or specific circumstances in which ICMPv6 traffic could compromise network security :

Ping sweep — A type of attack that uses ICMP echo request messages to enumerate live hosts on a network.

Ping flood — Utilized to launch a denial of service attack (DoS), where the attacker sends ICMP requests in a rapid succession without waiting for the targeted system to respond.

ICMP tunneling — A method used to establish a covert communication channel between remote systems, most times between a client and a proxy. All communications are sent via ICMP requests and replies

Forged ICMP redirects —  The attacker would send a ICMP redirect message, which informs a host of a direct path to a destination, to the victim that contains the IP addresses of the attacker’s system. This allows an attacker to compromise network traffic via a man-in-the-middle attack or cause a DoS.

8 0
3 years ago
WordArt ____ in the interior of a letter can consist of a solid color, texture, picture, or gradient.
Svetach [21]
WordArt fill in the interior of a letter can consist of a solid color, texture, picture, or gradient. 
3 0
4 years ago
Other questions:
  • True or false. Every word has only one correct spelling and pronunciation.
    6·1 answer
  • An example of movement as a gameplay mechanic includes
    14·2 answers
  • ________ is the extent to which differences in observed scale scores reflect true differences among objects on the characteristi
    13·1 answer
  • A strategy to solve a logic problem is to break it into steps. Using the drop-down menu, complete these sentences about solving
    15·2 answers
  • What characteristics of IT careers can be a challenge for employees
    9·2 answers
  • A ______ or workstation computer is typically used by one or a small number of people to perform everyday productivity tasks, su
    10·1 answer
  • Kyle owns a growing delivery business. He would like to buy two more vans but first he needs to figure out related costs and his
    10·2 answers
  • Can someone solve this for me please? It’s part of an escape room.
    13·2 answers
  • What is the hack of the cookie clicker
    11·1 answer
  • Let cell E2 = 100, what is the result of this formula? =NOT(E2&lt;100) *
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!