1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr-060686 [28]
3 years ago
10

A technician from your isp has arrived to help you troubleshoot a weak wan connection. To what location do you take her?

Computers and Technology
1 answer:
stiv31 [10]3 years ago
8 0

The answer is an Entrance Facility.

The entrance room or entrance facility is the location for the access provider equipment and demarcation points. This is the area of a building where carrier and private network enter the building. Whenever we talk about a WAN connection, we are talking about a geographically distributed private network that interconnects multiple LANs. Therefore, it is safe to say that you should take the technician to the entrance facility since it is the point at which the outdoor plant cable (WAN) connects with the building’s backbone cable (LAN).

You might be interested in
Predict how digital video will be viewed in the future. Step into the year 2028. How are people viewing digital video? Or have w
Nostrana [21]
<span>Google Glass was interesting; a personal screen overlaid onto the real world, with 'augmented reality' ideas. The Nintendo 3DS was the first 'no glasses' portable 3D system.

So I predict Google 3D Glasses with built in Dolby 9.1 sound emulation. </span>
4 0
3 years ago
Read 2 more answers
You work in a classified environment where Bell LaPadula MLS (Multilevel Security) model is employed. Your clearance is "SECRET"
kumpel [21]

Answer:

The answer is by using a covert channel like shared memory objects such as files, directories,messages, etc since both  the user and the sender of the document are on same network of the company.

Explanation:

The Bell LaPadula MultiLevel Security model was a security policy developed by Bell and LaPadula in 1973 in response to a security issue raised by the US Air Force regarding file-sharing mainframe computers . Actually, many people with networked systems have realized by early 1970s that the protection purportedly offered by many commercial operating systems was poor, and wa not getting better any time soon. This was observed when it was noticed that as one operating system error was fixed, some other vulnerability would be discovered. There was also the constant worry that various unskilled users would discover loopholes in the operating system during usage and use them to their own advantage.

 Information release may take place via shared memory objects such as files, directories, messages, and so on. Thus, a Trojan Horse acting on behalf of a user could release user-private information using legitimate operating system requests. Although developers can build various mechanisms within an operating system to restrict the activity of programs (and Trojan Horses) operating on behalf of a user  , there is no general way, short of implementing nondiscretionary policy models, to restrict the activity of such programs. Thus, given that discretionary models cannot prevent the release of sensitive information through legitimate program activity, it is not meaningful to consider how these programs might release information illicitly by using covert channels.

For example, for someone with higher integrity level (SECRET) to send an accounts payable application to a user, if the untrusted accounts payable application contains a Trojan Horse, the Trojan Horse program could send a (legal) message to the said user process running at a lower integrity level (CONFIDENTIAL), thereby initiating the use of a covert channel. In this covert channel, the Trojan Horse is the receiver of (illegal) lower integrity-level input and the user process is the sender of this input.

7 0
3 years ago
A(n) _____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.
weqwewe [10]

Answer:

A- Application Service Provider

Explanation:

An application service provider (ASP) is someone that render computer service to his/ her customers or clients over a network by delivering software applications.

It also give access to an application, by charging a usage or subscription fee over the internet.

6 0
3 years ago
A resistor bank is connected to a controller with conductor insulation rated 75 °C. The resistors are not used in conjunction wi
irina [24]

Explanation:

This means that it requires a disconnecting means for each motor, and it must be located in sight from the motor location and the driven machinery location.

Multiply the FLC of the largest motor by 125%.

Add up the FLCs of the other motors.

Multiply the continuous non-motor loads by 125%.

Add up all of the above to the total of the non-continuous loads.

3 0
3 years ago
A piece of data in a program whose value can change is called a(n) -
Arada [10]

Answer:

it is b variable

Explanation:

7 0
2 years ago
Read 2 more answers
Other questions:
  • Survey Q, Non-scoring: What role are you playing in your team?
    5·2 answers
  • If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appr
    14·1 answer
  • An example of software most commonly associated with productivity software is ____.
    12·1 answer
  • 1)Ce procent de grasimi putem găsi in lapte ?
    10·1 answer
  • A trench is a narrow excavation in which the depth is greater than the width and the width does not exceed 15 feet. A. False B.
    13·2 answers
  • Along a road lies a odd number of stones placed at intervals of 10 metres. These stones have to be assembled around the middle s
    12·1 answer
  • Why are free web based providers so popular?
    12·1 answer
  • A digital designer might do computer animations for video games,<br> OA<br> True<br> OB<br> False
    12·2 answers
  • Halp me vanajsudhrbfhjrjfjfjf ​
    9·1 answer
  • What might a designer need to consider when choosing an appropriate energy source for products and power systems
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!