1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisabon 2012 [21]
4 years ago
14

A(n) ____________ is a private data network that creates secure connections over regular internet lines.

Computers and Technology
1 answer:
Setler79 [48]4 years ago
5 0
VPN is the correct answer
You might be interested in
Distinguish the functional requirements an engineer would have to specify for a taxi dispatch system.
AveGali [126]
The requirements are mainly written in a feature style notation, using some state charts, context diagrams and other techniques to describe certain parts of the system. See, for example, Software Requirements - Styles and Techniques [Lauesen00].
The functional requirements are divided into four sections. The three modules in figure 1 are developed by separate groups, each responsible for unit testing. All requirements for the taxi, central and communication link component are written in a feature style notation. In addition, a special part of the taxi component is the positioning system. This is dealt with separately since there are special requirements present on this component. The functional requirements consist of four sections: Taxi (3.1), Central (3.2), Communication link (3.3) and Positioning system (3.4). 
6 0
3 years ago
what could a company do if it was using a commercial wan and a vulnerability appered thst allowed attackers
Radda [10]

Answer:

The answer is below

Explanation :

If a company was using a commercial WAN and a vulnerability appeared that allowed attackers find routing information and therefore be able to eavesdrop on corporate transmissions "It is expected that such a company should try to formulate and establish Virtual Private Networks between corporate sites.

This will ultimately lead to intercepted transmissions to be unreadable. Though such means have been seen as time-consuming."

4 0
3 years ago
write a java program using a do while loop to prompt the user to enter a password. The user should be prompted to enter the pass
Alex787 [66]
We can import Scanner from Java.utils.Scanner to pull in text entered in the console.

public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
String password = "";
do {
System.out.print("Enter your password: ");
password = sc.nextLine();
if(!password.equals("pals") {
System.out.println(\nIncorrect Password. Try again.");
}
} while(!password.equals("pals");
3 0
3 years ago
The _____ requirements are associated with the efficiency, maintainability, portability, reliability, reusability, testability,
melamori03 [73]

Answer: Non-functional

Explanation:

Non-functional requirement(NFR) are the the requirements that evaluates operation of any particular system.It consist of several factors for judging the system such as security, reliability, quality, utility, maintainability etc.These parameters depicts about how a system will perform the tasks.

Other options are incorrect because function requires are used for depicting about specific and certain function in system. Performance requirements deal with the parameter of operation execution.

Correctness and standard requirement are measure for correcting system and general needs in a system respectively.

7 0
3 years ago
Read 2 more answers
What is the purpose behind the Three Phase Commit? It improves upon the two phased commit by requiring that locks be acquired at
Ray Of Light [21]
The answer is a) It improves upon the two-phased commit by requiring that locks be acquired at the start of a transaction.

Reason: The 3PC is an extension or you can say developed from 2PC that avoids blocking of an operation. It just ensures that first n sites have intended to commit a transaction that means it acquires commits or locks before the start of any transaction to avoid any blocking.

Option b) is wrong as it does not allow coordination, it just let all the other sites do their transaction if any other site is blocked, so no coordination is there between sites that they will wait till their coordinator is corrected.

Option c) is wrong as lock operations are shared between other connections as when their coordinator fails, the new coordinator agrees to the old coordinator that they had shared locks before and they can start their transaction.

Option d) is wrong as option a) is correct.

If you like the answer, please upvote.
4 0
3 years ago
Other questions:
  • The checksum doesn't compute for a packet sent at the Internet Protocol (IP) level. What will happen to the data?
    14·1 answer
  • Within the Chart Design tab, which section is used to change the data of a previously created chart?
    12·1 answer
  • Use the _______ command to combine the selected cells and center them. merge across center across selection merge cells merge an
    7·1 answer
  • To what would you compare the transport layer?
    14·1 answer
  • What is 8 hours, 5 minutes, 22 seconds minus (-) 7 hours, 24 minutes, 37 seconds?
    6·1 answer
  • Which statement describes one drive?
    6·1 answer
  • Fill in the blanks: The _____ is useful for predicting future results. A. mean. B.median. C.mode
    15·1 answer
  • You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What i
    12·1 answer
  • If a user wants to change one small section of the formatting of a document and leave the rest the same, which
    5·1 answer
  • In a relational database, information is organized into tables in which each row represents a(n ) ________. Group of answer choi
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!