1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stolb23 [73]
3 years ago
13

What is the correct term for a set of established guidelines for actions (which may be designated by individuals, teams, functio

ns, or capabilities) under various specified conditions?
Computers and Technology
1 answer:
serg [7]3 years ago
5 0

Answer: Protocol

Explanation: Protocol is the standard that is used in the communication and electronic devices for the communication. Through the mean of the these guidelines the communication is done by the sending and receiving of the data.

This works for the both wired networking and wireless communication which functions under the certain conditions.Examples-TCP(Transmission control protocol), FTP(File transfer protocol) etc.

You might be interested in
Write and test a program that computes the area of a circle. This program should request a number representing a radius as input
Alla [95]

The program that computes the area of a circle is represented as follows:

x = int(input("Write the length of the radius of the circle: "))

area = 3.14 * x**2

print(area)

The code is written in python

<h3>Code explanation:</h3>
  • The first line of code ask the user to input the length of the radius. The variable x is used to store the user's input.
  • The variable "area" is used to store the arithmetic manipulation of area of a circle.
  • Then, we print the variable "area". This will print the actual area of the circle with the particular radius you inputted.

learn more on python program: brainly.com/question/16398286?referrer=searchResults

6 0
2 years ago
What is the significance of the following terms A A L U control unit in the CPU​
WARRIOR [948]

Answer:

Explanation:

The function of ALU is to perform arithmetic operations(add,subtract, multiply,division) as well as logical operations(compare values).

The function of CU is to control and coordinate the activities of the computer.

8 0
3 years ago
Write a statement that defines an ifstream object named inputFile and opens a file named "Friends.txt".
Simora [160]

Answer:

ifstream inputFile;

inputFile.open("Friends.txt");

Explanation:

Though, the programming language is not stated, questions like this are often from C++.

The first statement defines the ifstream object using the following syntax.

ifstream [object_name]

In this case, the object name is inputFile

So, the syntax becomes

ifstream inputFile;

The next line opens a file using the following syntax.

[object_name].open("Filename")

Here, object_name is inputFile and filename is Friends.txt

So, the open statement becomes

inputFile.open("Friends.txt")

5 0
3 years ago
Explain what a honeypot is. In your explanation, give at least one advantage and one disadvantage of deploying a honeypot on a c
tatuchka [14]

Answer:

A honeypot is a computer network set up to act as a decoy to track, deflect, or research trying to obtain unwanted access to the information system.

Explanation:

A honeypot is a device or device network designed to imitate possible cyber-attack targets. It can be utilized to detect or deflect assaults from a legitimate military target. It may also be used to collect knowledge on how cybercrime works.

<u>Advantage:- </u>

  • Data Value:- One of the challenges faced by the research community is to obtain meaning from big data. Companies hold large quantities of data daily including firewall logs, device logs, and warnings for vulnerability scanning.
  • Resources:- The problem facing most protection systems is resource shortages or even the depletion of resources. Power saturation is when a protection asset can no longer work since it is overloaded by its assets.
  • Simplicity :- I find simplicity to be the biggest single strength of honeypots. No flashy techniques are to be created, no stamp computer systems to be managed, no rule units to be misconfigured.

<u>Disadvantage:-  </u>

That honeypot doesn't replace any safety mechanisms; they just operate with your overall security infrastructure and improve it.

4 0
4 years ago
I don't know what to do, anyone there?​
s2008m [1.1K]
I’m here, hello. . . . . . .
3 0
3 years ago
Other questions:
  • An effective password can help prevent
    11·2 answers
  • Joshua is creating his résumé, in which section will he add projects and trainings he was involved in?
    10·1 answer
  • Jeremy is designing a website for a florist. He intends to discuss the web design with his client. Which tool should Jeremy use
    6·1 answer
  • Routing in Practice (30 points). For each of the statements below, decide which it is true or false, and briefly justify your an
    13·1 answer
  • A document that summarizes your employment history and qualifications
    9·1 answer
  • Formulate it as a tree search problem.
    15·1 answer
  • Read the scenario and then choose which type of
    12·2 answers
  • In binary, if there is a 1 in the 1s place the number is always
    9·1 answer
  • Question 22 of 25
    10·1 answer
  • A computer hardware feature that is vital to the effective operation of a multiprogramming operating system is:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!