1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VLD [36.1K]
3 years ago
15

If an external server needs to communicate with servers inside the green zone, which network setting on smoothwall can be opened

?
Computers and Technology
2 answers:
Vedmedyk [2.9K]3 years ago
6 0

The network setting on smooth wall that can be opened if an external server needs to communicate with servers inside the green zone is to open the pinholes with the use of DMZ in the green zone.

Further Explanation:

DMZ is basically the buffer zone between the external network and company network. DMZ works between both the firewalls since all incoming packets are checked by the firewall before they reach servers the company hosts in the DMZ. It is efficient for most of the threats.

Pinholes are communication point of the DMZ in the LAN network. By default, it blocks all the incoming packets.  

Therefore, it is concluded that the pinholes are the communication venue of the DMZ in the green zone.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623

Answer details:

Grade: Computer Engineering

Subject: Computer Science and Engineering

Chapter: Computer Network

Keyword:

Computer, network, CPU, RAM, ROM, hardware, software, indexing, communication, Windows, Linux, server, demilitarized zone, DMZ, LAN,WAN, buffer zone, pin holes, external server, green zone, network, firewalls, host, block, incoming packets

astraxan [27]3 years ago
3 0

The network setting on the smooth wall that can be opened when the external server has the need to communicate with the servers inside the green zone is the DMS±pinholes as the pinhole will be opened with the use of the DMZ and to the green zone.

You might be interested in
Information in​ folders, messages,​ memos, proposals,​ emails, graphics, electronic slide​ presentations, and even videos create
valkas [14]

Answer:

The answer is "Unstructured"

Explanation:

In comparison, unstructured information applies to information, which doesn't suit the conventional column and rows concerning databases properly. It is also known as sources, that include mails, audio and video files, web pages and posts in  communication networks.

  • This tracks and communicates on travel and object flow-through sensors and much more.
  • These types of data are used in both companies and organizations.
5 0
3 years ago
Write a function that asks a user for his/her name and movie
Alex777 [14]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

                     

The code is written in C++

/******************************************************************************

                             Online C++ Compiler.

              Code, Compile, Run and Debug C++ program online.

Write your code in this editor and press "Run" button to compile and execute it.

*******************************************************************************/

#include <iostream>

#include <string>  

using namespace std;

void display()

   {

       string yourName;

       string watchedMovie;

       cout<<"What is your name?  ";

       cin>>yourName;

       cout<<"Which movie have you seen?  ";

       cin>>watchedMovie;

       cout<<"Today, I have learned that  " <<name<<" watched "<<watchedMovie<<" movie";

   }

int main()

{    

   

   display();

   return 0;

}

 

7 0
3 years ago
Q1). Write a python program to pass a list to a function and double the odd values and half even values of a list and display li
zepelin [54]

Answer:

\textsf{\large{\underline{Solution}:}}

The given problem is solved using language - Python.

def f(x):

   new_list=[]

   for i in x:

       if i%2==0:

           new_list.append(i//2)

       else:

           new_list.append(i*2)

   return new_list

   

my_list=list(range(1,6))

print('Original List:',my_list)

my_list=f(my_list)

print('Modified List:',my_list)

\textsf{\large{\underline{Logic}:}}

  1. Create a new list.
  2. Iterate over the list passed into the function.
  3. Check if the element is even or not. If true, append half the value of element in the list.
  4. If false, append twice the value of the element in the list.
  5. At last, return the new list.

There is another way of doing this - By using map() function.

—————————————————————————————

def f(x):

   return list(map(lambda x:x//2 if x%2==0 else 2*x,x))

   

my_list=list(range(1,6))

print('Original List:',my_list)

my_list=f(2my_list)

print('Modified List:',my_list)

—————————————————————————————

\textsf{\large{\underline{O{u}tput}:}}

Original List: [1, 2, 3, 4, 5]

Modified List: [2, 1, 6, 2, 10]

8 0
3 years ago
What considerations should you make when deciding on the size of a table?
Kisachek [45]

Answer:

You should consider the number of cells needed for data, labels, titles, and formulas.

Explanation:

4 0
3 years ago
What is the fifth and final stage in the process of media production?
Monica [59]

Answer:54

Explanation:

8 0
3 years ago
Other questions:
  • You have been asked to delete some data from medisoft but find that there is no delete button. what is another method you can us
    10·1 answer
  • Determine the number of bytes necessary to store an uncompressed RGB color image of size 640 × 480 pixels using 8, 10, 12 and 14
    11·1 answer
  • A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was call
    11·1 answer
  • In ________ for final fields and methods the value is assignedlater but in ______ you assign the value during declaration.
    15·1 answer
  • Tcp takes a three-step approach to establishing a reliable communication. first, from the transport layer of the sending device
    12·1 answer
  • Write a recursive method that receives a string as a parameter and recursively capitalizes each character in the string (change
    5·1 answer
  • What do earthquakes and tsunamis have in common?
    13·1 answer
  • How to transfer bookmarks to new computer
    15·1 answer
  • Lab 8-1: Working with Boot Loader and Runlevels what is the root password
    9·1 answer
  • Question 1 of 10
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!