1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
3 years ago
15

What are the two basic windows 8 settings for network security?

Computers and Technology
1 answer:
maks197457 [2]3 years ago
7 0

The two basic windows 8 setting for network security are Public and private network. The private network settings mean that you can link home group and make remote desktop connections. Public network settings entail the greatest privacy. You should make sure file or device sharing is disabled for having data copy.

<span> </span>

 

You might be interested in
You tried to access an external html page, which can not be opened on the device for preview. open the page in dreamweaver to pr
Snowcat [4.5K]
<span>You tried to access an external html page, which can not be opened on the device for preview. open the page in dreamweaver to preview the page on the device. </span><span>Real-Time Preview is a new feature in this version.  The developers didn't offer an option to turn it off in Preferences.  So, the best thing to do is to Right-Click on your document tab (or a file in your Files Panel) and select Open in Browser.  Then, choose your preferred browser. As a reminder, don't use F12.</span>
4 0
4 years ago
1.
natka813 [3]
Its gonna be about 39%.
6 0
3 years ago
This assignment is based on Exercise 8.4 from your textbook. Each of the following Python functions is supposed to check whether
Svetradugi [14.3K]

Explanation:

#1 is wrong because if the first character is not lowercase, it stops and returns false, ignoring all the other characters. It can be fixed by removing the else: statement and moving the return False statement outside of the loop.

This is efficient; if one lowercase character is encountered, the function 'knows enough' and can return true. Only if no lowercase is encountered it has to loop all the way to the end.

You can try this out on repl.it.

Many of the others functions have problems in them. #4 looks OK.

4 0
3 years ago
What two statements about IPv6 addresses are true? This task contains the radio buttons and checkboxes for options. The shortcut
Oliga [24]

Answer:

A and C

Explanation:

Option A:

In IPv6 there is a rule to reduce an IPv6 address when there are two or more consecutive segments of zeros just one time. This rule says that you can change the consecutive zeros for “::”  

Here is an example

How to reduce the following IPv6 address?

ff02:0000:0000:0000:0000:0000:0000:d500

Ans: ff02::d500

Example 2:

2001:ed02:0000:0000:cf14:0000:0000:de95

Incorrect Answer -> 2001:ed02::cf14::de95  

Since the rule says that you can apply “::” just one time, you need to do it for a per of zero segments, so the correct answer is:

Correct Answer -> 2001:ed02::cf14:0:0:de95

Or

2001:ed02:0:0:cf14::de95

Option C:

Since in IPv6 there are 2^{128} available addresses which means 340.282.366.920.938.463.463.374.607.431.768.211.456 (too many addresses), there is no need of NAT solution, so each device can have its own IP address by the same interface to have access through the internet if needed. If not, you can block the access through internet by the firewall.

4 0
4 years ago
Which of the following is not true of hardware VPNs?A) should be the first choice for fast-growing networks.B) can handle more t
vfiekz [6]

Answer:

C) have more security vulnerabilities than software

Explanation:

Hardware VPN is a computer term that described a separate tool that serves the functions of a virtual private network. It has its own component and an internal processing unit.

However, some of the characteristics of Hardware VPN is the following:

1. It is expensive compared to software VPN

2. It is generally faster

3. It requires more than a beginner to handle

4. With an in-built firewall, it is generally more secure compared to a software VPN.

Hence, in this case, the correct answer is option C.

3 0
4 years ago
Other questions:
  • 1. How do you answer questions that require you to draw inferences? (1 point)
    7·2 answers
  • A user is trying to delete a file located on an NTFS volume on his Windows 8 computer but is unable to do so. Why is this?
    6·1 answer
  • What's the problem with this code ?
    14·1 answer
  • When you are using inprivate browsing, the "inprivate is turned on" page displays in the browser window, the inprivate label is
    14·1 answer
  • Describe an algorithm that, given n integers in range 0 to k, preprocesses its input and then answers any query about how many o
    15·1 answer
  • What is the smallest colorable area on a display device
    10·1 answer
  • I need help with this plz question 2 and 3 asap
    7·1 answer
  • Which audio media can be directly sent to the subscribers through an RSS feed?
    6·1 answer
  • What will be the code in CSS, to set
    13·1 answer
  • Select three advantages of cloud computing.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!