1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
4 years ago
7

At what two layers of the osi model are lan and wan protocols likely to differ??

Computers and Technology
1 answer:
Anuta_ua [19.1K]4 years ago
5 0
A LAN is connecting two or more computers to form a cable network between them.
<span>A WAN is connecting two or more computers over a broad area to form a cable network between them.</span>
You might be interested in
Self-disclosure is most likely to occur _____________.a.
Feliz [49]

The answer is..

C.  During one-on-one conversations

4 0
3 years ago
Read 2 more answers
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
Consider the following static method, calculate.
vfiekz [6]

Answer:

return 8 * x

Explanation:

Given

The attached code segment

Required

Which single statement can replace the program body

From calculate(), we have:

x =  x + x;\\ x =  x + x;\\ x =  x + x;

The first line (x = x + x) implies that:

x=2x

So, on the next line; 2x will be substituted for x

i.e.

x = x + x becomes

x = 2x + 2x

x = 4x

So, on the third line; 4x will be substituted for x

i.e.

x = x + x becomes

x = 4x+ 4x

x = 8x

In programming: 8x = 8 * x:

This means that: return 8 * x can be used to replace the body

6 0
3 years ago
Explain how advanced analytics (e.g., Machine learning) helps the threat life cycle management. State the stage of the threat li
noname [10]

Advanced analytics may help to simulate the behavior of an infectious disease in epidemiology.

<h3>What is Advanced analytics?</h3>

Advanced analytics refers to the computation strategies that are able to manage a huge number of parameters to model a situation.

Advanced analytics is very useful in epidemiology because this approach allows for predicting the transmissible behavior of infectious diseases caused by pathogenic microorganisms (e.g., bacteria) and viruses.

In conclusion, Advanced analytics may help to simulate the behavior of an infectious disease in epidemiology.

Learn more about Advanced analytics here:

brainly.com/question/15007647

#SPJ1

8 0
2 years ago
Help me with 3dMODELING art please
Ahat [919]

Answer:

See the answers below.

Explanation:

6. Input

7. Hardware

8. Graphic Tablets

9. An Abacus or Counting Rods

Regards: Your Friendly Study Co-Pilot!

7 0
3 years ago
Other questions:
  • There is no need to schedule video calls ahead of time; they can be used the same way as
    6·1 answer
  • Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the b
    10·1 answer
  • . SQL is a(n) _____ language.
    8·1 answer
  • Modern car odometers can record up to a million miles driven. What happens to the odometer reading when a car drives beyond its
    8·1 answer
  • URGENT!! Ronald wants to search for an image of a sports car. Ronald doesn’t have to remember the specific name of the image to
    5·1 answer
  • The OSI is a reference system that is used by most types of technicians EXCEPT _____.
    11·2 answers
  • Ignorance of policy is a legal excuse for an employee. TRUE or FALSE
    11·1 answer
  • Given a sorted list of integers, output the middle integer. A negative number indicates the end of the input (the negative numbe
    13·1 answer
  • The entities on which data are collected are _____.
    10·2 answers
  • Using above information, Write a prolog program to answer the following queries. Please note that you cannot simply answer these
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!