1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivolga24 [154]
3 years ago
15

Allowing every communication is a bad idea from a security standpoint as well as a productivity one.TrueFalse

Computers and Technology
1 answer:
s344n2d4d5 [400]3 years ago
4 0

Answer:

The answer to this question is True.

Explanation:

If we allow every communication this will not be a great idea if we want better security and better productivity.

There will be a lot of spam communications so the productivity and the security will also degrade because of that.

So if we want better productivity and security we have to allow a certain number of connections.

Hence the answer to this question is True.

You might be interested in
Kelly is preparing for a speech that she will deliver in front of her language arts class. She wants to survey her classmates to
Hitman42 [59]
What is the speech on???

8 0
3 years ago
Read 2 more answers
Which of the following is NOT a computer peripheral?
Marianna [84]

Answer:CPU stands for the central processing unit. CPU is not a peripheral device.

Explanation:

CPU stands for the central processing unit. CPU is not a peripheral device.

7 0
1 year ago
How does communication resolve problems​
Deffense [45]

Answer:

One major benefit effective communication has in resolving a conflict is the resultant reduction in anxiety, whether within a family or in the workplace. ... Using effective verbal – and nonverbal – communications further contributes to a successful resolution of conflict, either between individuals or within a group.

8 0
3 years ago
Read 2 more answers
Which of the following is the largest measurement for the weight of a bag of dog food?
jasenka [17]

Answer:

approximately 5 lbs but no sure weight.

6 0
3 years ago
Read 2 more answers
Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addresses are contained in
mr Goodwill [35]

Answer:

Layer 2 destination address = 00-00-0c-94-36-ab

Layer 2 source address = 00-00-0c-94-36-bb

Layer 3 destination address = 172.16.20.200

Layer 3 source address = 172.16.10.200

Explanation:

To properly understand the given answer, let us define some terms used in the narrative of the question:

Subnet: The sub network or as popularly called subnet  is a logical division of the internet protocol of a network into many different and smaller network. It is typically used to create partitions or subdivisions of large networks into bits.

PDU: The PDU can be said to be an abbreviation for the word power distribution unit or protocol data unit.  It can also be refereed to as an IT device that possess many output ports or terminals. They are mostly used to distribute or transmit power or data to other operating devices with the telecommunication system.

Now referring back to the question asked and the image attached below, we can see that host a and b send their signal through subnet teachers while host c and d send their signal through subnet students thus,

Layer 2 destination address = 00-00-0c-94-36-ab

Layer 2 source address = 00-00-0c-94-36-bb

Layer 3 destination address = 172.16.20.200

Layer 3 source address = 172.16.10.200 are the correct destination.

4 0
3 years ago
Other questions:
  • The _______ number system allows digital devices to represent virtually any number simply by using 0s and 1s.â
    14·1 answer
  • What is a URN (include example)
    13·1 answer
  • You are in charge of designing a menu tree for navigating 1,250 books in a digital library. Present an argument of whether the m
    12·1 answer
  • After machine language, what is the next most basic type of programming language, which still uses many length strings of numera
    5·1 answer
  • The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
    9·2 answers
  • Theodor is researching computer programming. He thinks that this career has a great employment outlook, so he'd like to learn if
    9·2 answers
  • Convert infix to postfix
    9·1 answer
  • Where does the list of incoming mail appear in gmail
    13·2 answers
  • What is the use of consonant in QBASIC ? Answer me in short and easy answer.​
    14·1 answer
  • Write A Code In Python
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!