1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artemon [7]
3 years ago
10

Unspecified a. typical IPv6 prefix used to indicate the network portion of the address. /64 b. IPv6 address represented as ::/12

8 (compressed form) and cannot be assigned to an interface Unique local c. Unique, internet-routable IPv6 address (dynamic or static) Loopback d. Used to communicate with other devices only on the same IPv6 subnet.

Computers and Technology
1 answer:
Aleks [24]3 years ago
6 0

Answer:

The answer to this question can be defined as follows:

Explanation:

In the given statements there are some mistype errors so, in the explanation section, we define the question with their suitable answer.

In choice A:

The Internet Protocol version 6 (IPv6) Prefix Length is being used to identify however many bits are already in the network part of its Global Unicast IPv6 address. It uses the number 64 for employed to recognize the network part of the very first 64 bits, that's why in Option A answer is "/64".

In choice B:

An IP address is used to represent 8 classes, in which each representing 16 bits, in the representation IP address it uses:: that is unspecified, that's why in Option B answer is "Unspecified".

In choice C:

The global unicast is a single connection on each sender and receiver, it specified from each network address, through one position upon its network to the other, that's why in Option C answer is "global unicast".

In choice D:

The link-local is used to communicate with other devices with the same IPv6 subnet, that's why in Option D answer is "link-local".

Please find the attachment of the question:

You might be interested in
Imported data that maintains a refreshable link to its external source is called ____ data.
olga2289 [7]
<span>Imported data that maintains a refreshable link to its external source is called Linked data.</span>
3 0
3 years ago
The fast food restaurant Chipotle pulled its app from Apple's app store when customer demand caused the firm's servers to crash.
Ad libitum [116K]

Answer:

A. AWS

Explanation:

Amazon Web Services AWS -

It is one of the subsidiary of the Amazon , which enables various functions like , API's , on - demand cloud computing platform , on the metered pay - as - you - go basis .

It helps to have a virtual computing services at any time and helps to provide all the services a real computer can offer , with the similar efficiency .

One of the service is the Amazon Elastic Compute Cloud .

The technology is very convenient and efficient in its service and hence is used by various people , in companies , restaurants etc.

Hence , from the given scenario of the question ,

The correct answer is A. Amazon Web Services AWS .

8 0
3 years ago
Match each of the following terms to its definition: I. web-based II. open source III. project management IV. personal informati
11111nata11111 [884]

Answer:

A. Personal information manager.

B. Web-based.

C. Project management.

D. Proprietary.

E. Open source.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Simply stated, it is a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into the following categories;

A. Personal information manager: software used to keep track of appointments. It can be used to schedule and manage schedules easily.

B. Web-based: software that is hosted on a website. It works based on cloud computing services and as such requires the use of internet for use at all times.

C. Project management: software used to track tasks and coordinate resources.

D. Proprietary: software which must be purchased. It also known as a closed-source software and can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

E. Open source: software code that is freely available. It is typically published as a free software that may be downloaded on various platforms by the end users.

6 0
3 years ago
In 200 words or more, please describe the Cyber Security Enhancement Act. Include when it was implemented and what it's purpose
makvit [3.9K]

Answer:

The summary below was written by the Congressional Research Service, which is a nonpartisan division of the Library of Congress.

12/18/2014--Public Law. (This measure has not been amended since it was passed by the Senate on December 11, 2014. The summary of that version is repeated here.)

Cybersecurity Enhancement Act of 2014 - Title I: Public-Private Collaboration on Cybersecurity - (Sec. 101) Amends the National Institute of Standards and Technology Act to permit the Secretary of Commerce, acting through the Director of the National Institute of Standards and Technology (NIST), to facilitate and support the development of a voluntary, consensus-based, industry-led set of standards and procedures to cost-effectively reduce cyber risks to critical infrastructure.

Requires the Director, in carrying out such activities, to: (1) coordinate regularly with, and incorporate the industry expertise of, relevant private sector personnel and entities, critical infrastructure owners and operators, sector coordinating councils, Information Sharing and Analysis Centers, and other relevant industry organizations; (2) consult with the heads of agencies with national security responsibilities, sector-specific agencies, state and local governments, governments of other nations, and international organizations; (3) identify a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, that may be voluntarily adopted by owners and operators of critical infrastructure to help identify, assess, and manage cyber risks; and (4) include methodologies to mitigate impacts on business confidentiality, protect individual privacy and civil liberties, incorporate voluntary consensus standards and industry best practices, align with international standards, and prevent duplication of regulatory processes.

Prohibits the Director from prescribing a specific solution or requiring that products or services be designed or manufactured in a particular manner.

Prohibits information provided to NIST for purposes of developing cyber risk standards from being used by federal, state, tribal, or local agencies to regulate the activity of any entity.

Directs the Comptroller General (GAO) to submit biennial reports over a specified period concerning NIST's progress in facilitating the development of such standards and procedures. Requires such reports to address the extent to which such standards: (1) are voluntary and led by industry representatives, (2) have been promoted by federal agencies and adopted by sectors of critical infrastructure, and (3) have protected against cyber threats. Instructs the Comptroller General to include in such reports an assessment of the reasons behind decisions of sectors to adopt or not adopt such standards.

Title II: Cybersecurity Research and Development - (Sec. 201) Directs the following agencies, working through the National Science and Technology Council and the Networking and Information Technology Research and Development Program, to develop, and update every four years, a federal cybersecurity research and development strategic plan:

Explanation:

4 0
3 years ago
write pseudocode to represent the logic of a program that allows the user to enter a value for one edge of a cube. The program c
PilotLPTM [1.2K]

Answer:

prompt("Enter a value for one edge of a cube")

Store user's value into edgeCube

area = 6 * (edgeCube * edgeCube)

volume = edgeCube * edgeCube * edgeCube

print("One side of the cube is: " + edgecube);

print("The area is: " + area)

print("The volume is: " + volume)

8 0
3 years ago
Other questions:
  • In Linux, the most popular remote access tool is OpenSSH. Which software performs the same remote command line (CLI) access from
    7·1 answer
  • What action makes RAM on your computer disappear?
    12·2 answers
  • Consider the following code: x = 17 y = 5 print (x % y) What is output?
    10·1 answer
  • pDevices used to prevent data from being written to a disk can connect to a computer through FireWire, SATA, PATA, and SCSI cont
    10·1 answer
  • A computer has a pipeline with four stages. Each stage takes the same time to do its
    8·1 answer
  • Jeremy has created a document that has images and a chart. The chart has to be updated manually, and double-clicking on the char
    15·1 answer
  • What can be the maximum possible length of an identifier 3163 79 can be of any length​
    5·1 answer
  • Think back on the Font Tester App. Can you think of an example of another app or feature of an app which would use a loop to con
    14·1 answer
  • What do earthquakes and tsunamis have in common?
    13·1 answer
  • When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achie
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!