1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Komok [63]
4 years ago
14

A law office has been leasing dark fiber from a local telecommunications company to connect a remote office to company headquart

ers. The telecommunications company has decided to discontinue its dark fiber product and is offering an MPLS connection, which the law office feels is too expensive. Which of the following is the BEST solution for the law office?
A. Remote access VPNB. VLANC. VPN concentratorD. Site-to-site VPN
Computers and Technology
1 answer:
mina [271]4 years ago
8 0

Answer:

D. Site-to-site VPN

Explanation:

This type of network basically allows <u>multiple offices in different locations</u> to establish secure connections with each other over a public network such as the Internet. A Site-to-site VPN allows computers from one location to share resources with the rest inside the network. An example of a company that would use this connection, is a growing corporation that has a lot of offices around the world.

The advantage against a remote VPN connection, is that you don't need to install a VPN client software in each terminal connected to the network.

You might be interested in
The Math class provides a static method, max, that accepts two int arguments and returns the value of the larger one. Two int va
Dimas [21]

Answer:

int result=max(population1,population2);

printf("%d",result);

Explanation:

in above result variable holds the largest value of two variables population1 and population2.Printf displays that largest value.

int result=max(population1,population2);

in above expression , right hand side we are calling max function and on the left hand side we are saving the return value of the function in result variable

8 0
3 years ago
Half of the integers stored in the array data are positive, and half are negative. Determine the
jonny [76]

Answer:

Check the explanation

Explanation:

Below is the approx assembly code for above `for loop` :-

1). mov ecx, 0

2). loop_start :

3).    cmp ecx, ARRAY_LENGTH

4).    jge loop_end

5).    mv temp_a, array[ecx]

6).    cmp temp_a, 0

7).    branch on nge

8).        mv array[ecx], temp_a*2

9).   add ecx, 1

10).   jmp loop_start

11). loop_end :

Assumptions :-

*ARRAY_LENGTH is register with value 1000000

*temp_a is a register

Frequency of statements :-

1) will be executed one time

3) will be executed 1000000 times

4) will be executed 1000000 times

5) will be executed 1000000 times

6) will be executed 1000000 times

7) `nge` will be executed 1000000 times, branch will be executed 500000 times

8) will be executed 500000 times

9) will be executed 1000000 times

10) will be executed 1000000 times

Cost of statements :-

1) 10 ns

3) 10ns + 10ns + 10ns [for two register accesses and one cmp]

4) 10ns [for jge ]

5) 10ns + 100ns + 10ns [10ns for register access `ecx`, 100ns for memory access `array[ecx]`, 10ns for mv]

6) 10ns + 10ns [10ns for register_access `temp_a`, 10ns for mv]

7) 10ns for nge, 10ns for branch

8) 30ns + 110ns + 10ns

10ns + 10ns + 10ns for temp_a*2 [10ns for moving 2 into a register, 10ns for multiplication],

110ns for array[ecx],

10ns for mv

9) 10ns for add, 10ns for `ecx` register access

10) 10ns for jmp

Total time taken = sum of (frequency x cost) of all the statements

1) 10*1

3) 30 * 1000000

4) 10 * 1000000

5) 120 * 1000000

6) 20 * 1000000

7) (10 * 500000) + (10 * 1000000)

8) 150 * 500000

9) 20 * 1000000

10) 10 * 1000000

Sum up all the above costs, you will get the answer.

It will equate to 0.175 seconds

7 0
3 years ago
What should you do with a wireless-capable laptop if you connect a lan cable to it?
marusya05 [52]
A local-area network (LAN<span>)  cable is used in LAN networks to connect several computers or other networking devices.</span>
If you connect a LAN cable to a wireless-capable laptop you should turn the wireless capability off to maximize security, because through the LAN cable viruses can be transmitted, than can harm your computer.

6 0
3 years ago
Read 2 more answers
Which of the following is NOT a team based technique? 1. Joint application development 2. Rapid application development 3. Agile
Aleonysh [2.5K]

Answer: Option (4) is correct.

Explanation:

Object-oriented analysis is referred to as an approach in technical world which is popular for analyzing and also designing an app, system, or organization by applying OOPs or object-oriented programming, also making use of visual modeling in order to cater better stakeholder communication and commodity quality.

7 0
3 years ago
What subnet mask or CIDR notation would be required to maximize the host counts while still meeting the following requirements:
PolarNik [594]

Answer:

192.168.228.0 255.255.255.224

Explanation:

192.168.228.0 255.255.255.128

subnet mask: defines the host and the network part of a ip

CIDR notation : is the shortened form for subnet mask that uses the number of host bits for defining the host and the network part of a ip

For example: 192.168.228.0 255.255.255.128 has CIDR equivalent of 192.168.228.0\25

To have atleast 20 hosts

20 ≤ (2^x) -2

x ≈5

with 5 host bits, we have 2^5-2 = 30 hosts per subnet

and 2^3 = 8 subnets

To get the subnet mask, we have 3 network bits

1110000 to base 10 = 2^7 + 2^6 +2^5= 224

192.168.228.0 255.255.255.224

5 0
3 years ago
Other questions:
  • In hunter-gather societies most hunting was done by
    9·2 answers
  • What must you do first in order to change the font type size and colour of a particular text
    13·2 answers
  • Brooke is trying to save enough money in the next fifteen months to purchase a plane ticket to Australia. Every month Brooke sav
    9·1 answer
  • Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation
    14·1 answer
  • Write code to complete PrintFactorial()'s recursive case. Sample output if userVal is 5:5! = 5 * 4 * 3 * 2 * 1 = 120
    8·1 answer
  • Which steps do you follow to create a graph?
    5·2 answers
  • Simple geometry can compute the height of an object from the the object's shadow length and shadow angle using the formula: tan(
    12·1 answer
  • Comments should Your answer: rephrase the code it explains in English be insightful and explain what the instruction's intention
    15·1 answer
  • 1 Which one of the following is a transmission
    9·1 answer
  • A class researching the world’s population would like to include a graph that shows historical changes. They have information fr
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!