1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
4 years ago
6

Which of the following is an example of a protocol? IPsec CPU VPN PSU

Computers and Technology
1 answer:
svetlana [45]4 years ago
7 0

Answer:

IPsec

Explanation:

CPU & PSU are computer components. VPN is software. IPsec stands for Internet Protocol security

You might be interested in
Although “dog.jpg” and “dog.JPG” and “Dog.jpg” and “DOG.JPG” all appear to be the same file, they are not considered the same wh
bonufazy [111]
They are not considered the same when programming web pages on the Internet, because it depends on what opereting system you're using to create web-site. Every OS use different <span>character encoding capable. You can avoid that by entering utf-8 (or smth like that) in your html file.</span>
4 0
4 years ago
The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the bas
Sophie [7]

Answer:

CISSP

Explanation:

The CIDDP concentrations are an extension and development on the knowledge and credentials of the standard CISS certification that improves employability and career advancement

The CISSP concentrations includes

Information System Security Architecture Professional which can be known as ISSAP

Information System Security Engineering Professional which can be known as ISSEP

Information System Security Management Professional which can be known as ISSMP.

4 0
3 years ago
Which of these are steps in the testing cycle? Check all of the boxes that apply.
ollegr [7]

Answer:

A,C and D

Explanation: You're welcome

5 0
3 years ago
Read 2 more answers
How many frequencies does a full-duplex qam-64 modem use?
Vsevolod [243]

The answer is 2 frequencies.

A Full-Duplex QAM 64 K Modem uses two frequencies. One frequency is used for upstream and the other for downstream. A variety of common QAM forms are available and include, 16 QAM, 32 QAM, 64 QAM, and 256 QAM. For example, for domestic broadcast use, 64 and 256 QAM are used for cable modem and digital cable TV. The modulation scheme for this modem uses both amplitude and phase.

8 0
4 years ago
Read 2 more answers
We have a user Sally Smith who we want to grant the ability to launch applications and browse folders. But we do not want her to
igomit [66]

Answer:

LIST

Explanation:

NTFS is A proprietary journaling file system developed by Microsoft. It started with windows 3.1.

List Folder Contents: Is what Gives authorized user the permission to viewing and listing of files and sub-folders as well as executing of files inherited by folders only.

NTFS permissions applies to every file and folder stored on a volume formatted with the NTFS file system. By default, permissions are inherited from a root folder to the files and sub-folders beneath it, although this inheritance can be disabled.

List Folder Contents will allow you to display the folder's contents and to display the data, attributes, owner, and permissions for files within the folder.

The NTFS permission that applies to the Domain Users group that will allow Sally to do what he wants without allowing more access than necessary is LIST.

8 0
3 years ago
Other questions:
  • A (n) _____ exposure is a short term or brief exposure that may create an immediate health hazard
    9·1 answer
  • Having network users login with a username and password is an example of:
    12·1 answer
  • The instructions for the OS provided by application software
    14·2 answers
  • A short circuit locator should be periodically run along the cords used in a shop to check for shorts and open circuits. A.)True
    12·2 answers
  • Which of these components is a part of the central processing unit (CPU) of a computer? A. memory B. storage C. control unit D.
    8·2 answers
  • Agile methods typically use a ______ model, which represents a series of iterations, or revisions, which are based on user feedb
    7·1 answer
  • Which of the following is considered a basic task in the context of computer operations? a. Connecting to the Internet b. Natura
    6·1 answer
  • Software licensed using the Open Software Initiative (OSI) definition
    5·2 answers
  • Why ads on this app do it help pay for the free stuff?
    9·1 answer
  • What (if any) are the same feature requirements that might be found in server software/OS environments
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!