1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WINSTONCH [101]
3 years ago
8

What should you do to help prepare yourself for the delivery of your presentation? you can chose more then one

Computers and Technology
1 answer:
Lubov Fominskaja [6]3 years ago
4 0
1 makes sense for somewhere you haven't been before. 2 could be interesting, but it's a bit superfluous if not required. 3 is the most important and essential. Some teachers don't want presenters to look at the board/read their slides word for word when they present, so it might be a good idea to have note cards instead.

Hope this helps!
You might be interested in
_____ is the operation of setting a variable to a value.
Helen [10]

Answer:

Assignment is the operation of a variable to a value

3 0
3 years ago
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
4 years ago
Jacob holds a Computer Hacking Forensic Investigator (CHFI) certification. Which of the following responsibilities should Jacob
nadya68 [22]

Answer:

the answers too the questions are B. identify intruder footprints,

D. Director of security, and B. Nist framework

Explanation:

3 0
2 years ago
Read 2 more answers
Write a computer program to tell if the number is even or odd please
vovikov84 [41]
There you go :) Written in C# you can add using tags yourself I believe

3 0
3 years ago
Joel has left his computer unattended while answering a phone call . A TV repairer in his house tries to surf through the applic
Triss [41]
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
5 0
3 years ago
Other questions:
  • The init() command initializes the task queue and scheduler data structures. run Next Task() MUST run to completion whatever tas
    9·1 answer
  • In gaming, "rendering" refers to:
    12·2 answers
  • IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client has very sensitive d
    7·1 answer
  • Contemporary Information Systems are interfacing with customers andsuppliers using:A. Electronic commerceB. CRMC. SCMD. all of t
    9·1 answer
  • All living organisms make up the (4 points)
    8·1 answer
  • Why would businesses apply cell protection to spreadsheet entries? Provide one specific example.
    10·1 answer
  • mta software development fundamentals You are creating an application that accepts input and displays a response to the user. Yo
    10·1 answer
  • You can use this keyboard shortcut to toggle the visibility of the command line. If for some reason your command line is hidden
    7·1 answer
  • What read a page on website​
    15·1 answer
  • GRAND THEFT AUTO 5 LOLLL
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!