1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Xelga [282]
4 years ago
7

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being abl

e to recover from temporary service problems or from natural disasters.
a.True.
b.False.
Computers and Technology
1 answer:
iVinArrow [24]4 years ago
7 0

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters is True.

a.True.

<u>Explanation:</u>

As network administrator he or she is responsible for both prevent from hacker and restore network from disaster with minimum down time. Network administrator has monitor network traffics and packets and do a period check on malware, spyware and ransom ware protection.

As network administrator should ready made tools or purchase to handle the network traffic to avoid network disaster.

Network administrator update firewall patches and upgrades virus signature files at period intervals. Network administrator also takes necessary advice from firewall hardware appliance from supplier and takes necessary steps o handle situation then and there.

You might be interested in
What is another name for “low-angle lighting”?
Sliva [168]
Another name for low-angle lighting is under-lighting.
4 0
3 years ago
6
Mama L [17]

Answer:

=IF(D3>50; E3; F3) and =IF(A1>60;"Pass";"Fail") are valid IF formulas.

Explanation:

P.S - The exact question is -

To find - Select the correct answer from each drop-down menu. Which IF formulas are valid? _____ and _____ are valid IF formulas.

FIRST BLANK

=IF(D3>50; E3; F3)

=IF(D3>50);( E3; F3)

=IF(10<5;23);("Incorrect")

SECOND BLANK

=IF(A1>60;"Pass";"Fail")

=IF(A1>60); ("Pass"; "Fail")

=IF(A1>60; ("Pass"; "Fail"))

Solution -

An IF structure is built following this pattern:

IF(TEST;IF TRUE;IF FALSE)

So,

The correct option is -

=IF(D3>50; E3; F3) and =IF(A1>60;"Pass";"Fail") are valid IF formulas.

7 0
3 years ago
It's the same drop-down answers for both.
tia_tia [17]

Answer:

First, medium: can see all the subject but maintain the focus in him

Second, close-up: To se the facial expressions and emotions

5 0
3 years ago
What's the drawback of using Screened Subnet (DMZ)?
lesantik [10]

It's more expensive, it's more difficult to configure and maintain and it can be more difficult to troubleshoot

4 0
4 years ago
Create a new Java project/class called ChangeUp. Create an empty int array of size 6. Create a method called populateArray that
-Dominant- [34]
<h2>Answer:</h2><h2></h2>

//import the Random and Scanner classes

import java.util.Random;

import java.util.Scanner;

//Begin class definition

public class ChangeUp {

   

   //Begin the main method

  public static void main(String args[]) {

       //Initialize the empty array of 6 elements

      int [] numbers = new int [6];

       

       //Call to the populateArray method

       populateArray(numbers);

       

       

   } //End of main method

   

   

   //Method to populate the array and print out the populated array

   //Parameter arr is the array to be populated

   public static void populateArray(int [] arr){

       

       //Create object of the Random class to generate the random index

       Random rand = new Random();

       

       //Create object of the Scanner class to read user's inputs

       Scanner input = new Scanner(System.in);

       

       //Initialize a counter variable to control the while loop

       int i = 0;

       

       //Begin the while loop. This loop runs as many times as the number of elements in the array - 6 in this case.

       while(i < arr.length){

           

           //generate random number using the Random object (rand) created above, and store in an int variable (randomNumber)

           int randomNumber = rand.nextInt(6);

       

           //(Optional) Print out a line for formatting purposes

           System.out.println();

           

           //prompt user to enter a value

           System.out.println("Enter a value " + (i + 1));

           

           //Receive the user input using the Scanner object(input) created earlier.

           //Store input in an int variable (inputNumber)

           int inputNumber = input.nextInt();

           

           

           //Store the value entered by the user in the array at the index specified by the random number

           arr[randomNumber] = inputNumber;

           

           

           //increment the counter by 1

          i++;

           

       }

       

       

       //(Optional) Print out a line for formatting purposes

       System.out.println();

       

       //(Optional) Print out a description text

      System.out.println("The populated array is : ");

       

       //Print out the array content using enhanced for loop

       //separating each element by a space

       for(int x: arr){

           System.out.print(x + " ");

       }

   

       

  } //End of populateArray method

   

   

   

} //End of class definition

<h2>Explanation:</h2>

The code above is written in Java. It contains comments explaining the lines of the code.

This source code together with a sample output has been attached to this response.

Download java
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
0d7446bcb6b48f78b8adbfa3da89789c.png
3 0
3 years ago
Other questions:
  • How many megabytes of data can a factory made audio cd hold?
    13·1 answer
  • SOMEONE PLEASE HELP ASAP!!
    14·2 answers
  • Janelle is shopping for jeans from Express. She clicks on a style she likes. The site quickly presents her with a close-up view
    5·1 answer
  • . One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
    11·1 answer
  • Gregory Yob is associated with which of these games?
    7·2 answers
  • Anusha wants to use her computer,rather than handwriting the information on her notepad,to analyze her monthly expenses to make
    14·1 answer
  • You are in the middle of a big project at work. all of your work files are on a server at the office. you want to be able to acc
    14·1 answer
  • marianne needs to create a version of her slide presentation that does not include all the slides and will be used for a particu
    9·1 answer
  • How do you loop a makebeat in earsketch
    11·1 answer
  • Select the function of keypunches that were used as one of the earliest input devices. A. It was used to control the cursor on t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!