Answer: A. target audience for the brochure.
Before even starting the design of the brochure, Amanda needs to get information on who the target audience are going to be. Amanda will need to conduct a quick research on what the audience of their community likes and does not like. By understanding the target audience, Amanda will be able to get an idea of what design, colors, and format she would make that will attract the attention of their audience.
Answer:
There could be a collision if a hidden node problem occurs.
Explanation:
CSMA/CA(carrier sense multiple access/ collision avoidance) is a multiple access method in wireless networking, that allows multiple node to transmit. Collision avoidance of this method is based on preventing signal loss or downtime as a result of collision of transmitting multi signals.
If a node at step 4(transmit frame) sends the first frame, the node still needs to send a RTS(request to send) and to receive a Clear to send (CTS) from the WAP, the is to mitigate the issue of hidden node problem as all frame are treated as unit, so other listening nodes, not detected would seek to connect and transmit as well.
Answer:
Use the default-information originate command.
Explanation:
A network administrator customizes a fixed path on a channel's edge router for creating any last recourse gateway that is the router connecting to the online / ISP. So, they using the usual command source to customize the edge router to connect this path instantly using RIP.
That's why the following answer is correct according to the scenario.
The amount of money added to the product by the seller, difference between the cost price and selling price
Answer: Botnet
Explanation:
Botnet is the process when a hacker user uses multiple guest computer to crack a password. Basically, hackers use botnet for performing the distributed denial of services attack in the network.
It also steal the data and allowed attacker to approach its connection and access its device.
Botnet word is the combination of robot and network and botnet can be controlled by using the command and control software.