1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlekseyPX
4 years ago
12

What is Nintendo's uniqueness?​

Computers and Technology
2 answers:
docker41 [41]4 years ago
7 0
It’s unique because it comes with 2 screens well dependents which Nintendo
bezimeni [28]4 years ago
4 0

Answer:

Nintendo is unique for it is one of the only portable gaming devices. They are also more family based gaming console. They make the gaming devices to the needs of beginners in gaming.

Hope I helped!

You might be interested in
35 points please help!
Ahat [919]

Answer:

Microsoft Poweroint

Explanation:

this software helps people to present their projects.

7 0
4 years ago
Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping
tresset_1 [31]

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

6 0
4 years ago
To transform information into _________, resources are used to discover patterns, rules, and context.
RSB [31]

Main Answer:

To transform information into<u> knowledge resources are used to discover patterns,rules,and context </u>

<u>Sub heading :</u>

<u>what is knowledge?</u>

<u>Explanation:</u>

<u>1.knowledge can be defined as awareness of facts or as practicals skills and may be als refer to familiarity with objects</u>

<u>2.knowledge of facts also referred to as propositional knowledge is often defined as true belief that is distinct from opinion</u>

<u>Reference link: </u>

<u>https//brainly,com</u>

<u>Hashtag: </u>

<u>#SPJ4</u>

<u></u>

3 0
1 year ago
PLEASE HELP
dimulka [17.4K]
It’s C, balanced forces.
8 0
4 years ago
How do you change the desktop background in the macos mojave operating system?
sleet_krkn [62]

Answer: Click the System Preferences icon on the dock. In the first row, click Desktop & Screen Saver.

Explanation: When it comes to macOS versions, Mojave and High Sierra are very comparable. The two have a lot in common, unlike Mojave and the more recent Catalina.

8 0
2 years ago
Other questions:
  • Angelina, the outgoing student body president, has finished a report about the upcoming school election. She wants to add a bord
    7·2 answers
  • A blank is a link on a web page that leads to another web page.
    14·1 answer
  • How many water bottles must be collected to win?
    8·2 answers
  • Service-oriented architecture (SOA) provides a way for apps on a network to talk to each other using all these ways, EXCEPT ____
    10·1 answer
  • Which is an example of synchronous communication? e-mail voicemail text message telephone conversation
    11·2 answers
  • The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify phys
    15·1 answer
  • Print person1's kids, call the incNumKids() method, and print again, outputting text as below. End each line with a newline.
    8·1 answer
  • I am in school what should i do i am 15
    5·2 answers
  • The data type of 17.3 should be ________________.
    12·2 answers
  • How can i get games on my chromebook after my school has blocked almost everything... even zoom!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!