1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vika [28.1K]
3 years ago
11

Which of the following statements is true regarding Wireshark?

Computers and Technology
1 answer:
melisa1 [442]3 years ago
5 0

I would go with A. Wireshark is probably the most widely used packet capture and analysis software in the world.

Wireshark is a pretty handy tool that is used to capture and analyze network traffic. It is used by techies and sys admins to troubleshoot network protocols and services that are normally exposed over networks. It is the best way to see whether protocols like DNS and DHCP are doing the “right” thing. It simply helps you understand network traffic analysis and how communication takes place.

You might be interested in
What traits make an effective leaader
Airida [17]
Being able to be a strong leader 

a great thinker 
great sportsmanship
great at judging fairly 
a great person overall

4 0
3 years ago
Read 2 more answers
Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
Sindrei [870]

Answer:

Cloud Computing        

Explanation:

Cloud Computing is basically an infrastructure to deliver various computing resources and services  to the users online (via Internet). These resources include networks, applications, servers, databases, software, storage etc.

These services are mostly utilized by organizations for recovery and backup of data, using virtual hardware and other computing resources such as desktops, memory etc. Cloud computing is also used for developing software, for securing data by providing with access control and for storing bulk of data.

The benefits of cloud computing are as following:

Because of cloud computing the customers do not have to buy hardware or install software on their computer which might be very costly to maintain and update. Servers and data centers are provided by cloud service providers and experts are available for managing the services and resources.

These services are scalable and can be adjusted as per the users requirements.

Cloud computing offers a variety of protocols, tools, and access controls that improve security and protects confidential data, applications, and networks against security threats and attacks. It also provides with data backup, disaster recovery.

5 0
3 years ago
Explain Software licensing
lbvjy [14]

Answer:

Software Licensing is pretty much allowing another company to use your own product.

Explanation:

<u>For Example:</u>

<u>Company A</u> is working on a face swap application which requires a facial recognition software in order to work. They can either build one from scratch (which can take months) or they can pay someone who already has one in order to be able to use it.

<u>Company B</u> owns a facial recognition software and are asked by Company A to license their software to them. Company A pays Company B, they then draft up a contract for Company A allowing them to use the facial recognition app.

Software licenses are either proprietary, free, or open source. Proprietary is the one used in the example above.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
Feliz [49]

Answer:

While trying to minimize project cost, project manager Ben realized that adjusting the schedule is not completely serving the purpose. What else can ben do to minimize project cost?

In addition to adjusting the schedule, Ben can adjust Everything. For example, the Ben can hire people on contract to reduce costs

7 0
3 years ago
Read 2 more answers
I need help pls, in this code if add row for example :
tankabanditka [31]
I thing is going project experiment everyone make plans and
3 0
4 years ago
Other questions:
  • which resource do programmers sometimes have to refer to and use during planning the logical steps of the solution
    15·2 answers
  • Write a Python script to input time in minutes , convert and print into hours and minutes.
    7·1 answer
  • Memory management is concerned with __________.
    14·1 answer
  • Which describes how media and networks interact
    12·1 answer
  • For this exercise, you are given a phrase. Return the number of time the word “dog” appears in the phrase.
    7·1 answer
  • What are reserved words in C programming?
    9·1 answer
  • Your grandmother was an established artist and left you several original paintings after she died. Which of these statements is
    11·1 answer
  • What is the first phase in which a software program is usable enough to test?
    14·1 answer
  • Which of the following statements is FALSE?
    10·2 answers
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!