1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
3 years ago
11

Which firewall monitors traffic from the DMZ to the LAN?

Computers and Technology
1 answer:
Ksenya-84 [330]3 years ago
3 0

Answer:

a diddoser

Explanation:

You might be interested in
Green Field county stadium is planning to conduct a cricket match between two teams A and B. A large crowd is expected in the st
PtichkaEL [24]

Answer:

RS422-A or RS-485

Explanation:

Mode Name: RS422-A

Well, this is the electrical interface. The microprocessor covers the logics to electrical signals, and these electrical signals are then transmitted over a long distance, which is less than 4000 feet through RS422-A. And this is a half-duplex mode with the multidrop receiver and one transmitter at a time, in master-slave format. A receiver is a slave and the transmitter is a master. And there can only be one transmitter at a time. Here, a PC collects the videos from all cameras, through a unified system, and this PC is connected to numerous receivers which are the Screens. Parallel transmission cannot be done over a single line, and it's noisy as well, and hence we stick to serial mode. and here half-duplex as one at a time need to deliver, and not both. Hence, RS422-A is the first mode. which is a half-duplex serial transmission mode.

Reason 1:

It's noiseless

Reason 2:

The number of receivers can be as high as 10.

As the second alternative option:

Mode Name: RS-485

This is even better and allows receivers as high in number as 32, and hence is better than RS-422A. The maximum distance allowed is around 4000 feet, and the rest is the same as RS-422A. it also supports half-duplex.

Reason 1: It's less noisy and even better than RS422-A

Reason 2: number of receivers, and as high as 32 are allowed.

Remember, however, Ethernet is a low distance network, though it also supports collision detection, and multiple access/ carrier detection or CSMA/CD. However, for this question requirement RS-422A and RS-485 network interface will work fine. In the case of ethernet, we have an Ethernet Interface card, which works as an Ethernet network interface. However, Ethernet is a short distance, and will not work here.

6 0
3 years ago
Print("Weight on Earth?")
Lynna [10]

Answer:

weightEarth = float(input("Enter weight on earth: "))

weightMoon = weightEarth/6

print("Weight on moon:", weightMoon)

Explanation:

You have to convert the string input into a float in order to do calculations with it.

5 0
3 years ago
To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
NARA [144]
The answer is B, Both Jill and Karl are correct.
7 0
3 years ago
Clunker Motors Inc. is recalling all vehicles in its Extravagant line from model years 1999-2002 as well all vehicles in its Guz
Soloha48 [4]

Answer:

boolean recalled;

((modelYear>=1999 && modelYear<=2002 && modelName=="Extravagant") || (modelYear>=2004 && modelYear<=2007 && modelName=="Guzzler")) ? recalled = true : recalled =false

Explanation:

Using a combination of comparison operators and logical operators, the conditions stated in the question is captured in the code snippet with the boolean variable recalled also declared. Since we are not allowed to use the if statement, we have used the conditional or ternary operator that checks if a condition is true executes the statment that follows the question mark else it executes the statement after the full colon.

3 0
3 years ago
Which form of cryptanalysis focuses on weaknesses in software, the protocol, or the encryption algorithm?
Mrrafil [7]

The form of cryptanalysis that would focus on the weakness of software as well as the protocol as well as the encryption algorithm would be the Statistical attack. Hope this is the right answer and would then be of help.

7 0
4 years ago
Other questions:
  • What are the verison of ip user nearly limitless ip address?
    14·1 answer
  • The * key on the number keypad is used for _____.
    5·2 answers
  • In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial insti
    7·1 answer
  • Explain briefly why one should be very cautious when using a Wi-Fi hotspot.
    6·2 answers
  • Xavier would like to change the sort options for his contacts. In which tab will he find the Arrangement command group?
    6·1 answer
  • The L-exclusion problem is a variant of the starvation-free mutual exclusion problem. We make two changes: as many as L threads
    15·1 answer
  • ¿Cómo afecta negativamente a las relaciones familiares el uso de la tecnología?
    7·1 answer
  • How did the invention of the printing press affect society?
    5·1 answer
  • You have studied graphic design, advanced math, and programming, and you
    13·1 answer
  • Which of the following choices is evidence that present-day vertebrates shared common ancestors?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!