1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr-060686 [28]
4 years ago
8

​with a _____, users provide an example of the data requested.

Computers and Technology
1 answer:
AnnyKZ [126]4 years ago
4 0
You would use a database to hold information in the servers.
You might be interested in
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
4 years ago
Pls help now the question is very hard someone help me pls​
satela [25.4K]

Answer:

The answers are "Option a, Option b, Option d, and Option c".

Explanation:

  • The Traceroute utilizes the "Internet Control Message Protocol" for transmit and receive echo-request and echo-reply messages. This is most often used in the echo packets of specified interval to live (TTL) quantities.
  • The Transport layer will be the next but is usually directly linked with the same name layer in the OSI model. Functions involve message fragmentation, acknowledgment, traffic management, session parallelization, error detection, as well as message rearranging.
  • Leaders generally fully involve one or even more workers in design buildings.
  • 67 was its UDP port number which is used as the port number of a database. So although UDP port number 68 is being used by the client.
4 0
3 years ago
"When a large data file needs to be processed in ascending or descending order based on a particular field, the most efficient a
Alona [7]

Answer:

Yes

Explanation:

For example, We need to write down the names of student in a school for survey purposes, rather than tell everyone to write their names on a sheet of paper and submit, we can instruct that names be written according to their classes and then written on the class sheets alphabetically.

Logically names will be written according to the classes from Class 1 - 10, then on the class sheet alphabetically from A - Z. its better represented that way for easy understanding and better collation and interpretation of data.

7 0
4 years ago
Which Cisco IOS command is used to disable a device from performing naming lookups?
Ilia_Sergeevich [38]

Answer:

No ip dns server.

Explanation:

The DNS stands for domain name services. It can be statically or dynamically configured to a workstation from the DHCP request. It resolves the ip address of a server to it's name, so a client is not burdened by memorizing the ip address of every website.

In the cisco ios,  the "NO" command is used to negate other commands, so when a "no ip dns server" is used configured on a device, it stops every website name lookups.

3 0
4 years ago
What is the treaty of paris
vova2212 [387]

The Treaty of Paris, signed in Paris by representatives of King George III of Great Britain and representatives of the United States of America on September 3, 1783, ended the American Revolutionary War. Hope this helps :)

5 0
3 years ago
Read 2 more answers
Other questions:
  • WILL GIVE BRAINLIEST! An ________________ is a list of steps needed to answer a problem or finish a task. When the code is execu
    14·2 answers
  • In the dewey decimal sysytem, the call number 800 notes which section
    10·1 answer
  • Complete the statement below with the correct term.
    5·1 answer
  • A developer needs to create a visualforce page that displays case data. The page will be used by both support reps and support m
    10·1 answer
  • Consider sending a 2400-byte datagram into a link that has an mtu of 700 bytes. suppose the original datagram is stamped with th
    10·1 answer
  • What should you do in order to have access to the header and footer tools? Open the View tab. Open the Page Setup dialog box. Op
    6·1 answer
  • Help on What i should say to my IT school lady? Read all three pages
    10·1 answer
  • We _____to separate the code in sub programs from the main code<br><br> Please help!!
    10·2 answers
  • Name at least 3 different portable computer devices that can be purchased
    15·2 answers
  • A(n) _____ is an organization's management support system that combines many databases to improve management decision making.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!