1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
10

You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use?

Computers and Technology
1 answer:
sweet-ann [11.9K]3 years ago
4 0

Answer: NTP ( Network time protocol)

Explanation:

Network time protocol is the time server which basically works in the TCP and IP network. It rely on the UDP ( User data-gram protocol) at port 123.

NTP server is the dedicated network time protocol devices which basically use for synchronize the network.

It is basically design to synchronize the clock in the computer and across the internet network and local area network. NTP server basically maintain the quality of the reference clock time.

You might be interested in
David has created a lot of styles and now his Quick Style Gallery contains styles he no longer uses.
shusha [124]

Answer:

Right-click the style in the Quick Styles Gallery, and select the Remove from Quick Style Gallery option.

Explanation:

3 0
4 years ago
What are the chief contributions of philosophy to artificial intelligence?
olga nikolaevna [1]

Answer

Hi,

The chief contribution of philosophy to artificial intelligence is the knowledge of the connections between the two and the understanding of the shared concept.

Explanation

Philosophy and Artificial intelligence has a close scientific connection because they both share concepts such as action, consciousness, epistemology and free will. From the artificial intelligence perspective, theories in philosophy are important in AI as long as they provide the basis of the designs, reasons and plan. The concepts shared in AI con tribute to the realization of the philosophy of artificial intelligence.

Hope this Helps!

5 0
3 years ago
What is the point of having bullets points in a text box
Ludmilka [50]
You should have bullets in a text box in case you have a list of stuff. For example:

Computer Parts

.Tower

.Monitor

. Mouse

.Printer


3 0
3 years ago
Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?
Nat2105 [25]

Answer:

The certification developed by the SANS is GIAC certification .In this there are 3 certification GSEC,GISF and GCED .The description of these certification is given below .

Explanation:

The GIAC certification course is providing the knowledge of the security like cryptography ,networkig knowledge etc .

GSEC:The GSEC Certification is the certification of the security.It simply means this certification certified about the security risk in the computer system .

GISF: This certification gives the knowledge of the networking as well as the security in the computer system also it gives the knowledge of the cryptography.

GCED :This certification is also providing the knowledge of security as well as networking.

Difference between GIAC and  InfoSec certifications is given below

  • The SANS certification is giving the knowledge about the security risk as well as cryptography by the professional where as the InfoSec certifications providing the knowledge of the hacking by the professional .
  • The SANS is including the certification of  GIAC certification where as the InfoSec certifications is including the  CISSP and SSCP certification .
4 0
3 years ago
The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet:
vodka [1.7K]
The answer is Cybercrime.  <span>The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet is called Cybercrime.  </span><span>Common types of </span>cybercrime<span> involve hacking, online scams and fraud, identity theft, etc.</span>
7 0
4 years ago
Other questions:
  • Artemisia gentileschi used directional line brilliantly in her painting judith decapitating holofernes to draw our attention to
    12·1 answer
  • SOMEONE PLEASE HELP ASAP!!
    14·2 answers
  • Which of the following is true regarding Moore’s Law? A.) explained the growth in computing capabilities between 1965 and 1995 B
    14·1 answer
  • What are examples of people who own the copyrights of their property? Check all that apply.
    10·2 answers
  • Which item is most likely to be a standard part?
    14·1 answer
  • Mack has started with his first photographic assignment for a magazine. He has clicked around thirty images and uploaded them on
    10·1 answer
  • 1. In the Entity-Relationship Model, relationships can have attributes.
    11·1 answer
  • What are the five generations of computer software​
    13·1 answer
  • Which of these agents of education empowers the other..........
    15·2 answers
  • a) consider the binary number 11010010. what is the base-4 representation of (11010010)2? (there is a way to do this without con
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!