Answer:
Al hablar de entornos digitales de enseñanza y aprendizaje, la frase apunta al avenimiento de medios informáticos y tecnológicos al proceso metodológico de enseñanza de los distintos sistemas educativos a nivel mundial.
Así, la irrupción del internet como medio de búsqueda de información y las herramientas digitales como vídeos, diapositivas y libros electrónicos como métodos de presentación de información han facilitado el acceso de los alumnos y docentes al conocimiento a través de la generación de un entorno digital que permite a estos un acceso mas rápido y abarcativo al conocimiento.
Answer:
Answered below
Explanation:
A macro or macroinstruction is a programmable pattern which translates a sequence of inputs into output. It is a rule that specifies how a certain input sequence is mapped to a replacement output sequence. Macros makes tasks less repetitive by representing complicated keystrokes, mouse clicks and commands.
By thoroughly testing a macro before deployment, you are able to observe the flow of the macro and also see the result of each action that occurs. This helps to isolate any action that causes an error or produces unwanted results and enable it to be consistent across end user platforms.
Answer:
You should configure a DHCP superscope.
Explanation:
The problem here is that after the host #200 is connected to your LAN, the next host IP is going to be the APIPA Address(Automatic Private Internet Protocol Addressing) because the server don´t have any IP to offer, in windows server you must configure a feature of the DHCP service called superscope. A superscope is a feature of Windows Server DHCP that enables to serve multiple IP subnets to the same physical LAN, this feature will enable another subnet in your system so any host connected must have a valid IP address.
Answer:
You should disable WPS in the access point's configuration.
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
In wireless access points, the encryption technologies used for preventing unauthorized access includes WEP, WPA, and WPA2.
In this scenario, you notice that an access point supports Wi-Fi Protected Setup (WPS) using a PIN and you are concerned about the security implications of this functionality. Therefore, to reduce this risk you should disable Wi-Fi Protected Setup (WPS) in the access point's configuration.
This ultimately implies that, the wireless access point will operate in an open state and as such would not require any form of password or PIN for use.
Answer:
B the internet
Explanation:
Online learning = internet