1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notka56 [123]
3 years ago
10

At least one method in an abstract class must be abstract. a. True b. False

Computers and Technology
1 answer:
azamat3 years ago
5 0

your answer is A: ture

You might be interested in
does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
Kryger [21]

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

5 0
1 year ago
PartnerServer is a Windows Server 2012 server that holds the primary copy of the PartnerNet.org domain. The server is in a demil
ella [17]

Answer:

i. True

Explanation:

A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.

Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.

PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.

Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.

In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).

A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.

7 0
3 years ago
Write a query that returns the Genres that I have purchased the most tracks of. I only care about genres that I've purchased at
Murljashka [212]

Answer:

<em>SQL Query</em>

///////////////////////////////////////////////////////////////////////////////////////////////////

select Genre_Name, Number_Purchased from Genre

INNER JOIN Tracks on Genre.Genre_Name = Tracks.Genre_Name

WHERE Number_Purchased >= 10 AND Tracks.price >= 1

ORDER BY Number_Purchased ASC;

Explanation:

First off, I selected the required columns from <em>Genre</em> Table.

Then I inner joined <em>Genre</em> table with <em>Tracks</em> table, to get the <em>price</em> of tracks of the corresponding Genres.

Then the required Where conditions are written, which includes one from the <em>Tracks</em> table.

Finally, the Order by statement is written by <em>Number_Purchased</em> column in ascending (ASC) order.

6 0
2 years ago
Microsoft Excel used for making document and presentation.
dalvyx [7]

Explanation:

Charts that are created in Excel are commonly used in Microsoft Word documents or for presentations that use Microsoft PowerPoint slides. Excel provides options for pasting an image of a chart into either a Word document or a PowerPoint slide. You can also establish a link to your Excel charts so that if you change the data in your Excel file, it is automatically reflected in your Word or PowerPoint files.

5 0
3 years ago
For which firewall feature should you create forward trust and forward untrust certificates?
guajiro [1.7K]

Answer:Jun 19, 2019 - Additionally, set up a forward untrust certificate for the firewall to ... After setting up the forward trust and forward untrust certificates required for SSL Forward Proxy ... If you do not install the forward trust certificate on client systems, ... Create a Decryption Policy Rule to define traffic for the firewall to decrypt.

WELCOME

8 0
3 years ago
Other questions:
  • Speech on inventors and inventions
    14·1 answer
  • Software that interprets commands from the keyboard and mouse is also known as the ​
    7·1 answer
  • When you make a pointer variable im C++, is star label a must?
    9·1 answer
  • What are some facts about webmasters?
    10·1 answer
  • Wireless networks are the most difficult type of network to set up <br> true or false
    15·1 answer
  • Of the key reasons for creating organizational units which of the following is not one of them?
    13·1 answer
  • What is the purpose of the domain name​
    5·1 answer
  • In excel, a number can contain the characters__
    8·1 answer
  • SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long bee
    7·1 answer
  • L00000000000000000000000000000000000000000000000000000000l they b00ty tickled
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!