1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
6

Which of the following is not a network connection LAN WAN SAN MAN

Computers and Technology
1 answer:
nataly862011 [7]3 years ago
6 0
SAN is not a network connection.

Can I have brainlest please?
You might be interested in
Write an algorithm that receives a number from the user (you can store the number in a variable called N). Then the algorithm sh
lbvjy [14]

Answer:

Algorithm:

1. Declare an integer variable N.

2. Read the value N from user.

3.While(N):

 3.1 find r=N%10;

 3.2 print r in new line.

 3.3 Update N as N=N/10.

4.end program.

Implementation in C++.

// header

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variable

int N;

cout<<"Enter an Integer:";

   cin>>N;

// find the digits of number

   while(N)

   {

       // last digit

       int r=N%10;

       // print last digit

       cout<<r<<endl;

       // update the number

       N=N/10;

}

return 0;

}

Output:

Enter an Integer:329                                        

9                                                          

2                                                          

3

7 0
3 years ago
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
On tool hackers use to get sensitive information from victims is/are:
Feliz [49]
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
5 0
3 years ago
Read 2 more answers
The customer's endpoint device on the wan is called the __________________.​
Lelu [443]
<span>The customer's endpoint device on the WAN is called the Data Terminal Equipment (DTA).
WAN 
is wide area network, referring to a network that extends over a large area. DTA is an end instrument which converts information into signals.</span>
3 0
3 years ago
To manage OpenLDAP policies over Command Line Interface (CLI), a certain type of file is needed. What is this type of file calle
qwelly [4]

The type of file which is needed to manage OpenLDAP policies over Command Line Interface (CLI) is called: LDIF files.

<h3>What is OpenLDAP?</h3>

OpenLDAP can be defined as a free, open-source version of the Lightweight Directory Access Protocol (LDAP) that was developed in 1993 by the OpenLDAP Project.

Basically, it is the server software implementation of the Lightweight Directory Access Protocol (LDAP).

<h3>The uses of OpenLDAP.</h3>
  • It is used for LDAP database control.
  • It allow end users to browse, create, remove and change data on a LDAP server.
  • It allows end users to manage their passwords and browse through data schema.

In conclusion, LDAP Data Interchange Format (LDIF) file is a type of file which is needed to manage OpenLDAP policies over Command Line Interface (CLI).

Read more on LDAP here: brainly.com/question/25998402

7 0
2 years ago
Other questions:
  • You have to communicate a signal in a language that has 3 symbols A, B and C. The probability of observing A is 50% while that o
    11·1 answer
  • Read the spreadsheet formula below, then answer the question.
    14·2 answers
  • Anicius boethius invented a system that made possible the memorization and written transmission of melodies.
    9·1 answer
  • If you were to create a new app for a smartphone or tablet that does not already exist, what would you create?
    10·1 answer
  • Microsoft’s SharePoint server product dramatically altered the content and records management (RM) markets. Crocker (2015), edit
    6·1 answer
  • Which type of CPU instruction performs arithmetic calculations and stores the results in memory?
    14·2 answers
  • How to use repl.it css
    7·1 answer
  • Speed(?)
    5·1 answer
  • What is the value of the variable named result after the following code executes?
    10·1 answer
  • What is the purpose of the Zoom dialog box? to put the selected range in ascending order in a query to put the selected range in
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!