1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
14

A network technician is setting up a wireless access point in the front office of a small company. The technician needs to disab

le an option on the access point that would allow devices to dynamically add themselves to the network without configuration. Which technology should the technician disable?- NAT- UPnP- MAC filtering- port forwarding
Computers and Technology
1 answer:
VladimirAG [237]3 years ago
6 0

Answer:

He should disable UPnP technology to disallow devices to dynamically add themselves to the network without configuration.

Explanation:

  • UPnP stands for Universal Plug n Play.
  • It is an easiest way that allows gadgets to find all other devices connecting to your network.
  • This can also modify router settings to allow devices from outside the network to access the router.
  • External IP address can also be obtained by the gadget and a new port forwarding map can be set
  • So from all perspectives, UPnP is an open invitation for hackers to scan for the ports and hack into the device.
  • UPnP is a vulnerability to the secure system
You might be interested in
What has happened (or is still happening) to make this speech occur? armageddon
Elodia [21]

Answer:

Are you talking about the bruce willis is superman basically? Because if so i don't think so because that is a future event that hasn't happened yet also that film sucks.

Explanation:

6 0
2 years ago
6.10.1: Modify a C string parameter. Complete the function to replace any period by an exclamation point. Ex: "Hello. I'm Miley.
Andrej [43]

Answer:

#include <iostream>

#include <cstring>

using namespace std;

void replacePeriod(char* phrase) {

int i = 0;

while(*(phrase + i) != '\0')

{

if(*(phrase + i) == '.')

*(phrase + i) = '!';

i++;

}

}

int main() {

const int STRING_SIZE = 50;

char sentence[STRING_SIZE];

strcpy(sentence, "Hello. I'm Miley. Nice to meet you.");

replacePeriod(sentence);

cout << "Updated sentence: " << endl;

cout << sentence << endl;

return 0;

}

Explanation:

  • Create a function called replacePeriod that takes a pointer of type char as a parameter.
  • Loop through the end of phrase, check if phrase has a period and then replace it with a sign of exclamation.
  • Inside the main function, define the sentence and pass it as an argument to the replacePeriod function.
  • Finally display the updated sentence.
6 0
3 years ago
What's sprite and a costume?
astra-53 [7]

Answer:

Costumes are the artwork associated with a sprite. Sprites are things that move, so they can have multiple costumes. Backdrops are the artwork for the stage. The stage doesn't move, but can have multiple backdrops.

Sprites are used to make complex and interesting animations and games. A sprite is able to store images or animations with a set of properties such as position and visibility. Sprites also have properties to report interactions with other sprites or the mouse.

3 0
3 years ago
6. What is saddle-stitch binding?
kifflom [539]
Commonly known as book stapling, ‘saddle stitched’ is one of the most popular binding methods. The technique uses printed sheets which are folded and nestled inside each other. These pages are then stapled together through the fold line. Saddle stitched binding can be applied to all book dimensions and both portrait and landscape orientation.
5 0
2 years ago
Read 2 more answers
Excel contains ____ tools not available in access.
max2010maxim [7]
I think that calculation tools would be the answer. <span>Excel contains calculation tools not available in access. Excel enables you to create formulas for ease in operation for future purposes. Almost all operations can be found in excel which cannot be found in Access.</span>
5 0
3 years ago
Other questions:
  • A computer has a pipeline with four stages. each stage takes the same time to do its work, namely, 1 nsec. how many instructions
    5·2 answers
  • When was unicode invented?
    13·1 answer
  • What mass of nh3 can be made from 35g of n2?
    14·1 answer
  • Digital certificates can be used for each of these EXCEPT _____. A. to encrypt channels to provide secure communication between
    13·1 answer
  • Which skill type refers to the knowledge and ability to perform a task?
    13·2 answers
  • Which technology has the potential to be misused to make atomic bombs? A. computer technology B. nuclear technology C. medical t
    14·1 answer
  • You respond to a fire at a pharmaceutical production plant. One of the outside storage tanks is on fire. The placard on the tank
    10·1 answer
  • X = 10<br> y = 20<br> x &gt; У<br> print("if statement")<br> print("else statement")
    12·1 answer
  • What can a government use to determine your location at a specific time as long as you're using your mobile device
    6·1 answer
  • For quantitative data (e.g. the number of milligrams of a drug) coding your data involves?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!