1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
5

The ________ identifies staff reaction and response times as well as inefficiencies or previously unidentified vulnerabilities.

All members of the staff involved in operations or procedures participate in the test.
Computers and Technology
1 answer:
Paraphin [41]3 years ago
7 0

Answer:

simulation test

Explanation:

You might be interested in
When double quotes are used to assign values to string variables, the PHP interpreter must check the entire string to see if it
NikAS [45]

Answer:

Interpolation string.

Explanation:

The proces of adding the variable in middle the string.The interpolation  Replace the value of the Variable when the string data is processed .In the Interpolation process  the variable is permitted with string containing double quotes.In the interpolation string  the interpreter check the entirely string that  the variable in middle the string.

Following is the example of interpolation string in Php

$n1 = "RAM";

echo "hello $name"; // output

Output:

hello RAM

6 0
3 years ago
A web browser sends a request to the web server using what
goldenfox [79]
Web browsers and servers communicate via TCP/IP.  HTTP protocol is the standard application protocol that supports the responses.
3 0
3 years ago
A(n) ________________ is a software tool for specifying the content and format for a database report.
Alex_Xolod [135]
A report generator is a software tool for specifying the content and format for a database report. It is a program where it takes data from a database and use it in producing a file that can be understood by humans. These databases include XML stream, OpenCover, PartCover and the like.
7 0
3 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Write an algorithm to settle the following question:
Vesnalui [34]

Answer:

<u>algorithm</u>

original = float(raw_input("Enter initial balance: "))

interest = float(raw_input("Enter promised return: "))

expenses = float(raw_input("Enter monthly expenses: "))

interest = interest / 100 / 12

month = 0

balance = original

if balance * interest - expenses >= 0:

print "You don't need to worry."

else:

while balance + balance * interest - expenses >= 0: # negation of the if condition

balance = balance + interest * balance # in one month

balance = balance - expenses

month = month + 1

print month, balance

print month / 12, "years and", month % 12, "months"

6 0
3 years ago
Other questions:
  • Device management is the process of managing
    14·1 answer
  • Text that has equal left and right margins is said to be
    14·2 answers
  • In the United States there are more women than men, but women are referred to as a minority group? Why are they considered a min
    8·2 answers
  • Which is true of ASCII and Unicode?
    7·1 answer
  • When you sign in to your Microsoft account with another Windows device, your settings will appear very differently than they do
    7·1 answer
  • HELP PLX ITS PYTHON BTW!!!
    8·1 answer
  • How long will it take to transfer 1GB data on USB 2.0, on USB 3.0
    7·1 answer
  • Evaluate the arithmetic expression 234 + 567​
    10·1 answer
  • Which of the following are drivers of machine learning growth?
    15·1 answer
  • Bob The Penguin is a real you-tuber, and he plays Mine-craft. Who is his owner?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!