1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
4 years ago
13

Why is it important to use proper line types

Computers and Technology
1 answer:
AnnZ [28]4 years ago
6 0
Because then the line is proper as opposed to if the line is improper. If the line is improper, then it has no manners and you can't invite it to dinner with your family because it will be rude and your mother would be offended.
You might be interested in
Jason needs to renew the certificate for his company’s web server. Which of the following is recommended to be submitted to the
notsponge [240]

Answer:

A. CSR

Explanation:

CSR, (certificate signing request also known as certification request, CR) are messages sent by an applicant to a certificate authority to acquire a digital identification certificate or renew an already existing one. It contains information of the client or applicant like domain name, public key etc.

Keyescrow, CRLD and OCSP are not recommended or required for renewing digital certificate as they commands or settings for shortcuts and commands.

3 0
4 years ago
Write a program that reads a target string from the keyboard and then another sentence string from the keyboard.
Rzqust [24]

The solution is in the attachment

5 0
3 years ago
The comments down bellow are wrong
Ket [755]

Answer:

What Do U mean

Explanation:

6 0
3 years ago
Read 2 more answers
You are scanning a network to ensure it is as secure as possible. You send a TCP probe packet to a host with a FIN flag and rece
AleksAgata [21]

Answer:

Hello your question lacks the required options here are the options

A)This response means the port he is scanning is open.

B)The RST/ACK response means the port Fred is scanning is disabled.

C)This means the port he is scanning is half open.

D) This means that the port he is scanning on the host is closed

answer : This means that the port he is scanning on the host is closed ( D )

Explanation:

When you scan a network to ensure it is secure enough by sending a TCP probe to a host with a FIN flag and you receive a RST/ACK response it means that The port that is been scanned on the host is closed

A TCP scanning/probe involves sending a number of packets to each port that is scanned. when you Compare TCP scanning methods to other methods of scans, a TCP Connect scan is typically slow and methodical.

7 0
4 years ago
_________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
Sever21 [200]

Answer:

IPSec

Explanation:

IPSec is an acronym for Internet Protocol Security. It is a standardized protocol used in determining the cryptographic and authenticated packets across the Internet Protocol networks.

It can be utilized to establish access control, confidentiality, data origin authentication, connectionless integrity, rejection of replayed packets, and limited traffic flow confidentiality.

3 0
3 years ago
Other questions:
  • Renee just got on the freeway to go to her cousin's house in Denver. She is driving 50 miles per hour. Her sister Kim left one h
    12·1 answer
  • 535 = d +4<br> Whats d?????????????????????<br> &lt;33 thnx babes.
    8·2 answers
  • Which function should be used to display a value based on a comparison?
    11·1 answer
  • “When using a public computer for browsing the Internet, try to use for 1.________ transactions. Also, use 2.__________ browsing
    10·2 answers
  • Which is an example of a tertiary source?
    13·1 answer
  • I need an answer and fast What happens if a sequence is out of order?
    5·2 answers
  • Vocational schools are also called all of the following except:
    12·2 answers
  • How to do a linear equations
    8·1 answer
  • Which daemon manages the physical memory by moving process from physical memory to swap space when more physical memory is neede
    14·1 answer
  • List and explain three computing devices from the 20th century​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!