1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inessss [21]
3 years ago
14

NEED ASAP!!

Computers and Technology
1 answer:
kow [346]3 years ago
4 0

Answer:

because he needs to connect them all to the sane network (i think)

You might be interested in
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
3 years ago
You have created a slide that is functional, but a bit on the boring side. In five to ten sentences, describe changes you would
Bess [88]
To make my slide more effective, I would add two or three pale colors that would decorate it while not distracting viewers from the topic. I would also add visuals that would engage viewers and give them a better understanding of the material. Additionally, I would include more examples and details to give viewers a clearer picture of what I would be attempting to convey to them. The final thing I would do to the slide would be to organize it in a way that would present information well. In conclusion, in order to improve the effectiveness of a slide, I would make changes to its design and layout that would make it easier for viewers of the slide to understand.
4 0
2 years ago
Which of these is true of blackhat and whitehat hackers?
earnstyle [38]

Answer:

Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.

Explanation:

that's all. c:

5 0
3 years ago
Read 2 more answers
_____ is a method for analyzing and reducing a relational database to its most streamlined form. Structured query Normalization
mixas84 [53]
<span>Structured query Is The Answer.</span>
4 0
3 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
Other questions:
  • Using caller id is part of which step in an effective time management plan
    10·1 answer
  • What sequence is used to create a brochure document from a template?
    8·2 answers
  • When entering a formula or function into a cell, most spreadsheet programs require that you begin with some type of symbol, usua
    5·1 answer
  • A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addr
    6·1 answer
  • Four parts of the compuet mouse​
    6·1 answer
  • Write a program that calculates the occupancy rate for each floor of a hotel. The program should start by asking for the number
    10·1 answer
  • Why did the creation of ARPANET help with this critical need?
    9·1 answer
  • Computer security:
    15·1 answer
  • Which internet resource can you use to publicly describe an adventure trip you recently made?
    6·2 answers
  • What data unit is addressed based on the IP address of the recipient?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!