1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ddd [48]
3 years ago
6

Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a

network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, anAn IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message.
A) True
B) False
Computers and Technology
1 answer:
Evgesh-ka [11]3 years ago
5 0

Answer:

b) False.

Explanation:

Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, anAn IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message., is a FALSE statement.

You might be interested in
java class What is the output of the following JAVA program (Java assumes public if no access modifier is given)? class Test { p
Natasha2012 [34]

Answer:

The answer to the given question is it will produce an "error"  

Explanation:

In the given java program it will produce an error because in java we do not use double quote("""") for message printing. We use a single quote("") for message printing. In the given program if we use a single quote(""). so it will give output that is "dogood:dogood".

The correct program to this question is can be given as:

Program:

public class Test  //define a class test.

{

   public static void main(String[] args)  //define main method

   {

       Test obj = new Test();   //create class object  

       obj.start(); //calling function

   }  

   void start()  //define function start.  

   {

       String stra = "do";   //define variable and assign value.

       String strb = method(stra);  //define variable and pass stra variable in method() function as a parameter.

       System.out.print(":"+stra + strb); //print value.  

   }

   String method(String stra)  //define function method  

   {  

       stra = stra + "good";   //add value

       System.out.print(stra);  //print value of stra

       return"good";  //return value

   }

}

Output:

dogood:dogood

6 0
3 years ago
Employees keep track of their worked schedule on a _____. task time sheet salary work shift
Kay [80]
Timesheet.

Bane of my existence. 
6 0
2 years ago
Read 2 more answers
When introducing a database into an organization, the database approach creates a more controlled and structured information flo
Karolina [17]

Answer:

a.cultural

Explanation:

Cultural impact generally refers to resistance to change in DBMS.It msu be assessed carefully. The Database management system is likely to have effect on functions,people and interactions.For example:- New roles might be given to already existing persons,new people might be hired.

8 0
3 years ago
Please elp i will give you brainelst answer the question and answer please!!!!!!!!!!!!!!!!
vaieri [72.5K]

Answer:

I'd so like one of the Presidents.

Explanation:

research some facts. make sure to use your resources. Put some facts on who their vice president was a stuff

3 0
3 years ago
Which of the following is not a goal of a persuasive speaking?
Usimov [2.4K]
A persuasive speech<span> is a specific type of </span>speech<span> in which the speaker has a goal of convincing the audience to accept his or her point of view. The </span>speech<span> is arranged in such a way as to hopefully cause the audience to accept all or part of the expressed view.</span>
7 0
3 years ago
Read 2 more answers
Other questions:
  • Describe the general process of creating a DataFlow Diagram (DFD)
    7·1 answer
  • Write code for a function with the following prototype: /* Addition that saturates to TMin or TMax */ int saturating_add(int x,
    12·1 answer
  • An expression involving byte, int, and literal numbers is promoted to which of these?
    12·1 answer
  • The scheme function (mult2-diff Ist) should take one argument, a list of numbers, and results in multiplying each number in the
    11·1 answer
  • What is a disadvantage of shopping online?A.Harder to compare prices than in storesB.A higher risk of financial data theftC.More
    6·2 answers
  • Which option on the Format tab is used to modify particular portions of the chart?
    12·1 answer
  • What is human data,
    8·1 answer
  • How will Artificial Intelligence change the way we do things? .......C-Claim:
    10·1 answer
  • In C, a switch construct can have ________ number of default case(s). *
    14·1 answer
  • Which part of the ethernet address is assigned to vendors to identify the equipment?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!