1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maksim231197 [3]
3 years ago
7

What name is given to the process or mechanism of granting or denying use of a resource typically applied to users or generic ne

twork traffic?
Computers and Technology
1 answer:
bearhunter [10]3 years ago
4 0

Answer:

Access control

Explanation:

A computer network connects two or more computer devices to communicate and share resources. When computers or workstations in a network are connected, data can be directly transferred from a source to a target workstation.

In most cases in an enterprise network, there is a need to restrict access to certain information or resources, so access control protocols are used to secure sensitive information from unauthorized view.

You might be interested in
To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to
ioda

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

5 0
3 years ago
Read 2 more answers
Jacek has just started a new job as a sales clerk, and his first task is to create a new sales invoice. Which Microsoft software
g100num [7]

Answer:

Microsoft Excel

Explanation:

Microsoft Excel is a Microsoft application package. It is a spreadsheet application used to analyse and manipulate data. It has columns which are referred to fields and rows also known as records.There are various features in excel that used to create statistical and graphical esctasies and data presentations.

It can be used to create template for CVs/resumes, Bank draft, receipts and invoice etc.

5 0
3 years ago
What are the assignable addresses for the 12th subnet with the network address of 220.100.100.0 and the number of needed subnets
bogdanovich [222]

Answer:

C. 220.100.100.45 to 220.100.100.46

Explanation:

The Classless IP subnetting of 220.100.100.0 begins from the fourth octet of the IP address. To get 45 subnet mask, it uses 6 bits from the fourth octet, which approximately give 64 subnets, while the remaining 2 bits are used for host IP addressing.

The useable host IP addresses are gotten from the formula '2^{n}-2', with n=2 bits.

useable host IP addresses = 2^2 - 2 = 2 addresses per subnet.

While the 12th subnet is 12 x 2^2 = 44.

This means that the 12th subnet mask starts with 220.100.100.44 (as the network address) and ends with 220.100.100.47 as broadcast IP address, while '.45' and '.46' are the assignable addresses of the subnet.

5 0
3 years ago
A computer would do a better job than a human at solving lengthy, complex math problems. True False
Alborosie

Answer:

I would say true

Explanation:

Humans, by contrast, can master many things, from tying our shoes to cooking an omelet to solving complex math equations. The best AI hardly comes close to the incredible creativity and design of any human, and it’s an open question whether AI can ever become what its prophets claim. Second, when we make AI, we are basically copying our Creator.

8 0
3 years ago
Read 2 more answers
7.4 code practice question 1 edhesive
Semmy [17]

Answer:

7.4 Code Practice: Question 1

def GPAcalc(g):

if g == "a" or g == "A":

return 4

elif g == "B" or g == "b":

return 3

elif g == "C" or g == "c":

return 2

elif g == "D" or g == "d":

return 1

elif g == "F" or g == "f":

return 0

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Building relationships during your career exploration is called
    9·2 answers
  • Free points! your welcome
    9·2 answers
  • You can use the Ignore All button to ignore the current and all future occurrences of a flagged word. True or False
    5·1 answer
  • Why did it take fewer 1-inch tiles than 1-centimeter tiles to measure the length of the cookie cutter?​
    9·1 answer
  • The two major types of system software programs are utility programs and the ________. Select one: A. user interface B. supervis
    13·1 answer
  • Write a program that accepts two integers from the user and perform one of the four arithmetic operations based on user’s choice
    11·1 answer
  • [If you were the queen of the world .... What would you change ?]
    14·1 answer
  • Complete the sentence.
    12·2 answers
  • Classes that depend on field names from parent classes are said to be ____ because they are prone to errors.Group of answer choi
    14·1 answer
  • T/F static development is the process of constructing the programs and code modules that serve as the building blocks of the inf
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!