1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alisha [4.7K]
4 years ago
10

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for

this network? (Choose two.)
implementing an intrusion detection system

implementing a firewall

adding a dedicated intrusion prevention device

installing a wireless network

installing antivirus software

​
Computers and Technology
1 answer:
yarga [219]4 years ago
8 0

Answer:

implementing a firewall

installing antivirus software

Explanation:

implementing a firewall: implementing this you could prevent the inbound and outbound not permitted connections to your internal network.

installing antivirus software: We need to install a antivirus software in the endpoints to detect and delete possible infections.

You might be interested in
Strange<br><br> String<br><br> Striated<br><br> Stop
VashaNatasha [74]
What is this supposed to be?!
4 0
3 years ago
Ví dụ sau sẽ in ra dữ liệu của x là kiểu gì ?
Virty [35]
Sjsjsjsjsjdhshshshshususs
7 0
3 years ago
Briefly describe the interface between the memory and the processing unit. That is, describe the method by which the memory and
xxMikexx [17]

Answer:

The memory and the processing unit communicate through the Memory Address Register (MAR) and the Memory Data Register (MDR).

Explanation:

7 0
4 years ago
A company produces coffee makers. The labor cost of assembling one coffee maker during the regular business hours is $2.65. If t
DochEvi [55]

Answer:

520

Explanation:

Let's say the x = smallest number of units that must be assembled during the regular hours, and 660-x is the number of units that can be assembled in overtime. Then, the total cost should be smaller than or equal to cost1 *x + cost2*3.75

⇒ (x * 2.65) + ((660 - x) * 3.75) <= 1903

⇒ x * (2.65 - 3.75) + (660 * 3.75) <= 1903

⇒ 1.1 * x >= 2475 - 1903

⇒ 1.1 * x >= 572

⇒ x >= 520

6 0
4 years ago
You are given a list of n positive integers a1, a2, . . . an and a positive integer t. Use dynamic programming to design an algo
Anna11 [10]

Answer:

See explaination for the program code

Explanation:

The code below

Pseudo-code:

//each item ai is used at most once

isSubsetSum(A[],n,t)//takes array of items of size n, and sum t

{

boolean subset[n+1][t+1];//creating a boolean mtraix

for i=1 to n+1

subset[i][1] = true; //initially setting all first column values as true

for i = 2 to t+1

subset[1][i] = false; //initialy setting all first row values as false

for i=2 to n

{

for j=2 to t

{

if(j<A[i-1])

subset[i][j] = subset[i-1][j];

if (j >= A[i-1])

subset[i][j] = subset[i-1][j] ||

subset[i - 1][j-set[i-1]];

}

}

//returns true if there is a subset with given sum t

//other wise returns false

return subset[n][t];

}

Recurrence relation:

T(n) =T(n-1)+ t//here t is runtime of inner loop, and innner loop will run n times

T(1)=1

solving recurrence:

T(n)=T(n-1)+t

T(n)=T(n-2)+t+t

T(n)=T(n-2)+2t

T(n)=T(n-3)+3t

,,

,

T(n)=T(n-n-1)+(n-1)t

T(n)=T(1)+(n-1)t

T(n)=1+(n-1)t = O(nt)

//so complexity is :O(nt)//where n is number of element, t is given sum

6 0
3 years ago
Other questions:
  • Evaluate the following expressions.
    10·1 answer
  • Which VMware product would allow administrators, to manage enterprise desktops with increased reliability, security, end-user ha
    11·1 answer
  • Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
    7·1 answer
  • A pair is a simple struct with two data members, one of type T1 and one of type T2. A set and a map are organized as binary sear
    10·1 answer
  • Greg is the network administrator for a large stadium that hosts many events throughout the course of the year. They equip usher
    7·1 answer
  • Where can you access email accounts on your Windows 7 computer in order to modify current account or create new ones
    15·1 answer
  • In information security, a specification of a model to be followed during the design, selection, and initial and ongoing impleme
    5·1 answer
  • PROGRAM LANGUAGE C
    5·1 answer
  • To defeat SQL injection attacks, a web application has implemented a filtering scheme at the client side: basically, on the page
    15·1 answer
  • All of the following are personal security safeguards except ________. Select one: A. send no valuable data via email B. Use htt
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!