Answer:

Explanation:
The statements are logically equivalent if they have the same truth tables. So let´s use truth tables in order to determine if they are logically equivalent or not:
The picture that I attached you shows the truth table for each case. As you can see in the highlight columns:

They are logically equivalent because they have exactly the same truth values between each other. Hence, we can conclude that they are logically equivalent.
Answer:
B. NIDS
Explanation:
From the question we are informed about A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. The BEST device to meet these requirements is NIDS. Network intrusion detection system known as "NIDS" can be regarded as a system that can attempt in detection of hacking activities as well as denial of attack on computer network. It can monitor network traffic and can as well detect malicious activities through identification of suspicious patterns in any incoming packet.
The amount of data that can be stored in the storage unit.
Answer:
b. connect two or more network segments that use different data link protocols
Explanation:
A switch is an analog device that allows to interconnect networks, it is possibly one of the devices with a higher level of scalability. It is important to clarify that a Switch does not only provide connectivity with other networks, nor does it provide connectivity with the Internet, for this purpose a router is necessary.
Answer:
The answer to this question is "Confidentiality".
Explanation:
The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.
So the answer to this question is Confidentiality.