1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uranmaximum [27]
4 years ago
14

A company has a file server that shares a folder named Public. The network security policy specifies that the Public folder is a

ssigned Read-Only rights to anyone who can log into the server while the Edit rights are assigned only to the network admin group. Which component is addressed in the AAA network service framework
Computers and Technology
1 answer:
klasskru [66]4 years ago
3 0

Answer:

authentication

Explanation:

At the authentication process, there is a way of identifying a user, this is typically done by having the user enter a valid user name and valid password before access is granted. Here at authentication the process is based on each user having a unique set of criteria for gaining access.

The AAA server have to ascertain by comparing a user's authentication credentials with other user credentials stored in a database. In the event the credentials match, the user is granted access to the network. But on the other hand, If the credentials varies, and authentication fails then network access will be denied.

You might be interested in
What does anti-malware software look for to determine that a program or a process is a virus?
Kryger [21]
Certain extensions of files. Sometimes, the name of the file could be something like Trojanx64.sys(I think). I had a few files of malware, but they were deleted. I believe the most common extension is .sys for viruses. Additionally, antivirus software could look into the properties of the program/process.
3 0
3 years ago
You can restore an event you deleted by mistake in Calendar by ______.
andre [41]

Answer:

1.Clicking on the event date and adding it again

3 0
3 years ago
P36. In Section 3.5.4, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why
KatRina [158]

Answer:

The Packets can be arrived out of an order from the Internet Protocol layer.  

So, whenever the out of an order packets would be received then, it would be generated the duplicate ACK's, if we perform the re-transmission after the first duplicate ACK would be lead the senders to introduced too many redundant packets in the networks.

Explanation:

  • All the bytes, in the Transmission Control Protocol connections, are the numbered, from the beginning at the randomly choose the initial sequence number (ISN).  
  • The SYN packets consumes the one sequence number, so the data will be actual and it begins at the ISN+1.  
  • The receivers ack's sequences the number x acknowledged the receipts of all the data bytes that is less than byte the number x.
7 0
3 years ago
What is an example of value created through the use of deep learning?
vichka [17]

An example of value which is created through the use of deep learning is: b. reducing multi-language communication friction in a company through automatic language translation.

<h3>What is machine learning?</h3>

Machine learning (ML) is also known as deep learning or artificial intelligence (AI) and it can be defined as a subfield in computer science which typically focuses on the use of computer algorithms, data-driven techniques (methods) and technologies to develop a smart computer-controlled robot that has the ability to automatically perform and manage tasks that are exclusively meant for humans or solved by using human intelligence.

In Machine learning (ML), data-driven techniques (methods) can be used to learn source ranges directly from observed multi-language communication.

In this context, we can infer and logically deduce that an example of value which is created through the use of deep learning is reducing multi-language communication friction that exist among employees working in a company through automatic language translation.

Read more on machine learning here: brainly.com/question/25523571

#SPJ1

8 0
2 years ago
In numerical methods, one source of error occurs when we use an approximation for a mathematical expression that would otherwise
Shtirlitz [24]

Answer:

The function in Python is as follows:

import math

import numpy as np    

def exp(x):

   mylist = []

   for n in range(10):

       num = (x**n)/(math.factorial(n))

       mylist.append([num])

   exp_approx = np.asarray(mylist)

   sum = 0

   for num in exp_approx:

       sum+=num

   return sum

Explanation:

The imports the python math module

import math

The imports the python numpy module

import numpy as np    

The function begins here

def exp(x):

This creates an empty list

   mylist = []

This iterates from 0 to 9

   for n in range(10):

This calculates each term of the series

       num = (x**n)/(math.factorial(n))

This appends the term to list, mylist

       mylist.append([num])

This appends all elements of mylist to numpy array, exp_approx

   exp_approx = np.asarray(mylist)

This initializes the sum of the series to 0

   sum = 0

This iterates through exp_approx

   for num in exp_approx:

This adds all terms of the series

       sum+=num

This returns the calculated sum

   return sum

3 0
3 years ago
Other questions:
  • Which pane displays commands that change relative to the activity taking place in the presentation window's main work area?
    11·2 answers
  • What are the best app development companies in Dubai?
    8·1 answer
  • How many functions can Excel perform?
    15·1 answer
  • In which network zone should a web server be placed?
    14·1 answer
  • 1. Write a program that asks the user to enter a string. The program should then print the following: (a) The total number of ch
    11·1 answer
  • Which of the following is not a true statement? a. Data flow diagrams and flowcharts are difficult to prepare and revise using s
    10·1 answer
  • The difference between the Basic Image Editing Software and Advance Image Editing Software.
    14·1 answer
  • Tipos de lenguajes relacionados con c++?
    7·1 answer
  • I WILL MARK IT BRAINLIEST FOR SURE ☺️❤️
    13·1 answer
  • Word wrap is the same as __________ return and means you let the ______________ control when it will go to a new line.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!