1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
9

Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal

servers from the public network.
Computers and Technology
1 answer:
Ivahew [28]3 years ago
4 0

Answer:

telnet

Explanation:

<h2><u>Fill in the blanks </u></h2>

Terminal emulation, especially the unprotected <u>telnet </u>protocol, should be blocked from any access to all internal servers from the public network.

You might be interested in
Given a one dimensional array arr, what is the correct way ofgetting the number of elements in arr
SVETLANKA909090 [29]

Answer:

The answer is option 1 arr.length.

Explanation:

In java arr.length gives the correct number of elements in the array.The length is function is only applicable for arrays.

The length() method is applicable for strings.

arr.length-1 will give 1 element less.

There is no .size for arrays in java.

So we conclude that arr.length is correct way of getting the number of elements in one dimensional array arr.

3 0
4 years ago
If you could make another device "smart" and have
konstantin123 [22]

Answer:

I would 100% make myself a SmartToaster (Trademark Pending)

Explanation:

A simple explanation would be <em>I like toast</em>

7 0
3 years ago
You've been asked to set up a temporary Internet cafe for a conference your company is hosting. You have ten laptops to use in y
kolbaska11 [484]

Answer: Cable Locks

Explanation:

  • The cable locks is one of the type of secure device that helps in physically secure the various types of laptops and computer system.
  • The cable lock helps the devices and the confidential information to prevent from theft and it is also known as the versatile security system.  
  • The cable lock is basically warp up in the form of metal cable and we usually insert the this cable lock into the laptop device slot in the system.  

  According to the given question, The cable lock is typically used in the laptop devices that protect and physically secure from the hacking purpose and it is used in the various types of deices such as printers, electronic devices and the laptops.  

7 0
3 years ago
1. Controlling Redundancy 2. Restricting Unauthorized Access 3. Providing Persistent Storage for Program Objects 4. Providing St
Dominik [7]

Answer:

Are all jobs of a DBMS (Database Management System).

Explanation:

DBMS or Database Management System is a software tool that is used to manage databases. Popular examples include MS SQL Server, Oracle and MySql. DBMSs can range from command line tools to fully featured programs.

DBMS's main job is to provide a interface for managing database, and also provide efficient and quick results of queries.

DBMSs also provide ways to connect your application to the database through APIs, so that a programmer can provide persistence to the application data.

4 0
4 years ago
What is the long tube on a microscope called​
tatyana61 [14]

Answer:

I believe you are referring to the <u>Eyepeice.</u>

Explanation:

3 0
3 years ago
Other questions:
  • In setting up a small office network, the network administrator decides to assign private IP addresses dynamically to workstatio
    12·1 answer
  • From the Start screen, you can A. access recently opened Excel workbooks. B. create a document from a template. C. create new bl
    12·2 answers
  • Which is the main reason why IT professionals need to pursue continuing education and self-directed learning?
    6·2 answers
  • Name two common methods for performing dependency injection.
    15·1 answer
  • For C programming language, what does it mean when you have an exclamation mark after an equal sign? ie:
    5·1 answer
  • Hey so if an instagram account has an email attached to it but a person no longer has access to that email, how do they get back
    10·1 answer
  • Which of the following is the Boolean logical operator for AND in C#?
    12·1 answer
  • Language is Python
    15·1 answer
  • can people be nice and just r;p with me once im getting sad because everyone is rude about it im not a creep im really nice and
    6·1 answer
  • Public class Billing {
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!