1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
koban [17]
3 years ago
5

For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can acc

omplish this task?
Computers and Technology
1 answer:
liq [111]3 years ago
6 0
<span>The administrator of the network can access the admin settings on the network's primary DNS servers. From there, there are hundreds of various settings and changes to make. There is one, however, that is able to disable pings. This will prevent computers from responding to ping requests. This can help to ensure internal security and reduce internal network traffic.</span>
You might be interested in
Electronic transmission of information standards, such as transaction and code sets and uniform identifiers, are covered underQu
Mila [183]

Answer:

option A

Explanation:

Option A.

With the use of Administrative simplification, we can transform all the paper work to electronic media such as electronic receipts or electronic mail. By shifting towards electronic means in Administrative simplification we are actually saving a lot of time by helping the human resource and from the laborious tasks of paper work and data management.

The management of electronic means is very easy and friendly, it is also a reason for implementing administration simplification as well.

3 0
3 years ago
Some email programs let you use a ____ to move incoming mail to a specific folder or to delete it automatically based on the con
KatRina [158]

Answer:

filter

Explanation:

Some email programs let you use a filter to move incoming mail to a specific folder or to delete it automatically based on the content of the message.​

The filter performs this role by either automatically deleting or moving to another location.

Most messages that are moved or deleted are unsolicited emails or spam messages.

Filtering of your mails helps so you ou can manage your incoming mail using filters to send email to a label, or archive, delete, star, or automatically forward your mail.

This is a way of organising your correspondence.

6 0
3 years ago
Creating parts that are interchangeable in manufacturing terms is key to the ____ line
denis-greek [22]

Answer:

Assembly line.

Explanation:

The interchangeable parts was a game-changing concept for the manufacturing industry during the Industrial Revolution.

It was first introduced by Eli Whitney, also the inventor of the Cotton Gin, and later was perfected by Henry Ford, who was the first to create a continuous moving assembly line. The Interchangeable parts are identical pieces created from a master model and are so similar to each other, that they can fit into any line of production of the same kind.

Thanks to these advances, the manufacturing process across all industries could be now faster, more cost-efficient, and profitable.

7 0
3 years ago
Write a static method that implements a recursive formula for factorials. Place this method in a test program that allows the us
matrenka [14]

Answer:

Written in Java

import java.util.*;

public class Main {

  public static int fact(int n) {

     if (n == 1)

        return n;

     else

        return n * fact(n - 1);

  }

  public static void main(String[] args) {

     int num;

     Scanner input = new Scanner(System.in);

     char tryagain = 'y';

     while(tryagain == 'y'){

     System.out.print("Number: ");

     num = input.nextInt();

     System.out.println(num+"! = "+ fact(num));

     System.out.print("Try another input? y/n : ");

     tryagain = input.next().charAt(0);

}        

  }

}

Explanation:

The static method is defines here

  public static int fact(int n) {

This checks if n is 1. If yes, it returns 1

     if (n == 1)

        return n;

If otherwise, it returns the factorial of n, recursively

     else

        return n * fact(n - 1);

  }

The main method starts here. Where the user can continue executing different values of n. The program keep prompting user to try again for another number until user signals for stoppage

  public static void main(String[] args) {

This declares num as integer

     int num;

     Scanner input = new Scanner(System.in);

This initializes tryagain as y

     char tryagain = 'y';

This checks if user wants to check the factorial of a number

     while(tryagain == 'y'){

This prompts user for input

     System.out.print("Number: ");

This gets user input

     num = input.nextInt();

This passes user input to the function and also prints the result

     System.out.println(num+"! = "+ fact(num));

This prompts user to try again for another value

     System.out.print("Try another input? y/n : ");

This gets user response

     tryagain = input.next().charAt(0);

}        

Download txt
4 0
2 years ago
What is the TSA motto
yulyashka [42]

Answer:

the answer is "Learning to lead in a technical word".

Explanation:

7 0
2 years ago
Other questions:
  • T<br> F<br> 5.<br> You can save presentations in PDF and XPS formats.
    14·1 answer
  • Why do objects in the back seat move when the car turns
    11·1 answer
  • What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
    6·1 answer
  • What is information technology?
    9·1 answer
  • VEE Physics 2006 E.C
    7·1 answer
  • An article explaining the uses of the parts of a computer​
    14·1 answer
  • A computer _________________ is a text file that a computer can understand
    12·1 answer
  • En una Memoria SD de 128 Gb, ¿Cuántas fotos en alta resolución de 16 Mb puedo almacenar?
    12·1 answer
  • Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router is una
    7·1 answer
  • scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!