Um can you be more descriptive
Answer:
=F5*$F$12+F5
Explanation:
If we want to increment the salaries in the cell F5, we must multiply the cell F5 by cell F12, and then we must sum that result.
If we want to drag the formula from the cell F5 to F10, we must use the dollar symbol $ to apply the same percent in our formula.
For example:
F12 = 5% = 0.05
F5 = 10,000
=F5*$F$12+F5
=10,000×0.05+10,000 = 10,500
B.) phishing
Definition of phishing:
Try to obtain financial or official information from internet users, usually sent as an email to look like it is from a legitimate company
Answer:
"Application programming interface(API)" is the correct answer for the above question.
Explanation:
- API is an interface which is used to call the different software in the currently developing software by the developer to inbuilt some task of that software.
- The full of this is the Application programming interface. It is an interface or guidelines which are used to tell the other software, that how a particular service is performed.
- The above concept is asked by the above question. so the answer is API.
Complete Question:
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?
a) Bastion Host
b) Screened subnet
c) Screened host
d) Screened
Answer:
b) Screened subnet
Explanation:
In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.
Screened subnet firewall architecture is designed to host servers that offer public services.
In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.
<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>
1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.
2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.
3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.
<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>