Answer:
n = f = 7
loop f = gt(n,1) f * (n = n - 1) :s(loop)
output = f
end
Explanation:
There are 4 different types of communication and I can share my experience by helping you out to solve the assignment.
Explanation:
1. Verbal Communication:
- Communication with voice
- Provides active listening
- Body language is equally important.
2. Non-Verbal:
- Body language is the most important
- Communicating without using the words
3. Visual communication:
- Listening contents through photos and videos
4. Written communication:
- Serves as record
- Does not require tone
So in day today aspect we come across almost all type of communication. To answer the discussed question
1. Did the variety of communication surprised you?
I would say yes. I can say unknowingly I have experienced various types.
2. Did you find that your were more involved in one type of communication?
I would say yes. People may like communication type depending on their interest and skill set. So according to me even I have involved in my life with one set of communication and I am trying to use it more.
3. Which one(s) is/are most involved?
So it differs from people to people. I like verbal communication, because I am good at speaking with good tone and voice. Also, I am attracted towards visual communication because one picture will talk more than what an essay would communicate.
Answer:
B)tracert
Explanation:
Tracery Command can be regarded as
network diagnostic tool, it is used in tracking process of pathway of packet ranging from source to destination on IP network. It as well allows to know real time of each hops that are been taken by a packet as it enroutes to it's destination. The traceroute can be run by following these steps:
✓Open the run window
✓Open Command prompt, this can be done by enter "cmd" then enter.
✓ input" tracert" then destination ( Ip address or web address)
It should be noted that Tracery command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer.
Answer:
Available options in question are
- a firewall :
- a server
- an application
- control standard
Answer is : Control Standard. It is not an example of layer of security.
Explanation:
Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.
- A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
- A server is typical example of physical control. In this it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.
- An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples
Control Standard is not an example of Layered Security.