1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
4 years ago
7

Port Address Translation assigns non-routing local addresses to the computer systems in the local area network and uses ISP-assi

gned addresses to communicate with the Internet, on a one-to-one basis.True / False.
Computers and Technology
1 answer:
nadezda [96]4 years ago
3 0

Answer:

The answer is "False"

Explanation:

It is an extension of domain controller conversion, which allows multiple computers to connect with internet addresses on some kind of LAN. PAT's goal is to keep the IP addresses.

  • NAT converts device IP addresses within the same LAN into a single Address. It connects the device to the Internet also uses this address.
  • It links the router to a DSL modem, cable modem, line T1 or even a dial-up modem, that's why this statement is false.
You might be interested in
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
The following program calculates yearly and monthly salary given an hourly wage. The program assumes a work-hours-per-week of 40
irina [24]

Answer:

The program implemented in Python is as follows:

hourly=float(input("Hourly Wage: "))

print("Annual Rate: "+str(hourly * 40 * 50))

print("Monthly Rate: "+str(round((hourly * 40 * 50/12),2)))

Explanation:

The question is incomplete as the missing code is not given. However, I've written the program from scratch in python.

This prompts the program user for the hourly Wage;

hourly=float(input("Hourly Wage: "))

This calculates and prints the annual rate

print("Annual Rate: "+str(hourly * 40 * 50))

This calculates and prints the monthly rate

print("Monthly Rate: "+str(round((hourly * 40 * 50/12),2)))

<u>Note:</u>

<em>The annual rate is calculated by multiplying the hourly wage to number of hours per week (40) to number of weeks per year (50)</em>

<em />

<em>The monthly rate is calculated by </em>annual\ rate/12<em />

5 0
3 years ago
Which of the following types of software is most applicable to the promotion of new products through advertising?
LenaWriter [7]

It cannot be database programs because database programs can not

store and organize data.

create graphics.

communicate data.

alleviate information overload.

It cannot be spreadsheets because a spreadsheet or worksheet is a file made of rows and columns that help sort data, arrange data easily, and calculate numerical data. What makes a spreadsheet software program unique is its ability to calculate values using mathematical formulas and the data in cells.

It cannot be word processing tools because a word processor is software or a device that allows users to create, edit, and print documents. It enables you to write text, store it electronically, display it on a screen, modify it by entering commands and characters from the keyboard, and print it.

Therefore the answer is C. Web design programs.

Hope this helps.

8 0
4 years ago
Read 2 more answers
There are built-in Styles to format your document and make changes to your document with just one click of a button.
Dmitriy789 [7]
False

i’m sure of it !!
6 0
3 years ago
Read 2 more answers
All the concrete classes in the java collections framework implement _____________. the cloneable interface the comparable inter
liubo4ka [24]
Since java.util.PriorityQueue doesn't use the Cloneable interface, I think it's safe to say that Serializable interfaces are implemented in all instances.
8 0
3 years ago
Other questions:
  • Variables used for output are associated with what controls on a form?​
    5·1 answer
  • You are the system administrator for a medium-sized Active Directory domain. Currently, the environment supports many different
    7·1 answer
  • What is the real meaning of hack and crack?
    6·1 answer
  • Which of the following best describes information techonolgy (IT)?
    6·1 answer
  • in a deisgn project, what two types of graphics or images is the digital artist respondsible for creating?
    11·1 answer
  • Give a recursive algorithm to compute the sum of the cubes of the first n positive integers. The input to the algorithm is a pos
    5·1 answer
  • Which function in Excel tells how many
    6·1 answer
  • Hi good morning how are you all
    12·2 answers
  • While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
    15·1 answer
  • someone please do this for and send a screeshot or picture please its really important for my examsss :D​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!