1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
3 years ago
9

Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. H

owever, you receive a security message from the operating system stating that this service is blocked on your workstation. What could be the probable cause? O The IP address of the service is blocked by an intrusion detection system (IDS) O The service is blocked by the Internet Service Provider (ISP) O The proxy firewall on the network is blocking the service. O The host-based firewall settings are blocking the service. Submit Refer to the exhibit. Which of the following networking device is being shown in the middle in red color? Gataway AV Anispyware Email'Antispam filering Routing capetivities FS Wob searty OuSBandwidth anagement O UTM appliance Switch Hub Modem Router Submit
Computers and Technology
1 answer:
Sindrei [870]3 years ago
7 0

Answer:

The host-based firewall settings are blocking the service

Explanation:

Host-based firewall settings can be configured on each workstation. The firewall can be provided by the operating system itself, or it can be a standalone software package that provides security features and functionality for the device's network connection. If this firewall contains incorrect settings, legitimate services can be blocked, and if so, a message will usually notify the user of such a breach. In these cases, the firewall settings need to be adjusted to make the desired service work.

You might be interested in
Subscribe to my you tube channel to get all your questions answered
vredina [299]

kaaaaaaaaaaaaaaaaa

aaa

4 0
3 years ago
For a new version of processor, suppose the capacitive load remains, how much more energy will the processor consume if we incre
xxMikexx [17]

Answer:

72.80 % more energy will be consumed.

Explanation:

First of all, let us have a look at the formula of energy for a processor.

E = CV^2f

Where, E is the energy

C is the capacitance

V is the voltage and

f is the clock rate.

Let E_1 be the energy of older processor.

C_1 be the capacitance of older processor.

V_1 be the voltage of older processor

f_1 be the capacitance of older processor

So, E_1 = C_1V_1^2f_1 ....... (1)

and

Let E_2 be the energy of newer processor.

C_2 be the capacitance of newer processor.

V_2 be the voltage of newer processor

f_2 be the capacitance of newer processor

E_2 = C_2V_2^2f_2 ....... (2)

Dividing equation (2) with equation (1):

\dfrac{E_2}{E_1} = \dfrac{C_2V_2^2f_2}{C_1V_1^2f_1}

As per given statement:

C_1=C_2

V_2=1.2\times V_1

f_2=1.2\times f_1

Putting the values above:

\dfrac{E_2}{E_1} = \dfrac{C_1\times (1.2V_1)^2\times 1.2f_1}{C_1V_1^2f_1}\\\Rightarrow \dfrac{E_2}{E_1} = \dfrac{(1.2)^2\times 1.2}{1}\\\Rightarrow \dfrac{E_2}{E_1} = 1.728\\\Rightarrow \bold{E_2 = 1.728 \times E_1}

Energy consumed by newer processor is <em>1.728 </em>times the energy consumed by older processor.

OR

<em>72.80 %</em> more energy will be consumed by the newer processor.

4 0
2 years ago
Web analytical packages can obtain the following information when someone visits a website, except Group of answer choices name
il63 [147K]

Answer:

name and address of web visitors.

Explanation:

A website refers to the collective name used to describe series of web pages linked together with the same domain name.

Web analytical packages are software features that are typically used for tracking the identity of a computer system by placing or adding cookies to the computer when it's used to visit a particular website. Thus, it's only used for tracking the identity of a computer but not the computer users.

This ultimately implies that, web analytical packages can obtain the geographic location, Internet connection type, and navigation source information when someone visits a website, but it cannot obtain the name and address of web visitors or users.

3 0
2 years ago
Conner has located a research source that is sponsored by a pharmaceutical company. Based on the sponsorship, Conner must be car
gogolik [260]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer is:

Conner has located a research source that is sponsored by a pharmaceutical company. Based on the sponsorship, Conner must be careful that the information is not <u>Biased.</u>

<u></u>

When you evaluate and use information from multiple sources, you need to evaluate the information that it must be error-free and not biased and it should be accurate information as you needed.

As in this example, Conner needs to research that the information should not be biased because the information or research source is sponsored by a pharmaceutical company and there is chances of biasedness. So, Conner must be careful that information is not biased.

6 0
2 years ago
Mr. Yang is a doctor who regards video games as an effective means of staying fit. What type of game would he recommend to his p
LUCKY_DIMON [66]

wii sports, just dance, etc.

Explanation:

3 0
2 years ago
Other questions:
  • How will a packet tracer environment be affected if a heater is added to a container named branch office and turned on?
    5·1 answer
  • As a ______________ you must be able to show that you know what to do to keep food safe
    15·1 answer
  • Write HTML code for inserting an image "cricket.jpeg" in size 500 width and 400 height.
    12·1 answer
  • For C++ ONLY please,
    14·1 answer
  • Use Spreadsheet Functions and Formulas
    6·1 answer
  • How do you think Beyoncé choreography has/will influence the future of dance?
    9·2 answers
  • In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniqu
    13·1 answer
  • _______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi
    12·1 answer
  • true Or False 1. Computer Time is located in Start Menu, b. Ms Word is developed by Adobe Corporation c. Ms-Excel is Presentatio
    9·1 answer
  • What is a phone made out of dna
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!