1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisabon 2012 [21]
4 years ago
14

A(n) ____________ is a private data network that creates secure connections over regular internet lines.

Computers and Technology
1 answer:
Setler79 [48]4 years ago
5 0
VPN is the correct answer
You might be interested in
. An exception is an error that occurs during the execution of a program at run-time that disrupts the normal fow of the Java pr
In-s [12.5K]

Answer: True

Explanation:Exception error ,which is also known as the fatal error that arises when there is the program execution going-on and the error occurs suddenly to stop the processing, resulting in the abortion of the execution.This erruptional error is responsible for disturbing the execution flow as well as there are chances of the data getting lost or deleted automatically.

5 0
4 years ago
A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address
lord [1]

Answer:

For this wild card mask 0.0.15.255 the ACE IP address will be 172.16.47.254

Explanation:

ACL is the access control list that is used to enlist the ip addresses that allowed or restricted to access the network. ACE is an IP address from the list ACL that has all rules and regulations related to access of network. The ACE could be in the range of IP address in ACL. ACL can be calculated with the help of initial IP address adding with wild card mask.

So

Initial IP address is = 172.16.32.0

Wild card mask =0.0.15.255

by adding above values we can find the last IP address of ACL.

after addition

Final IP address is = 172.16.47.255

The options that are available with question, Only option between the range is  172.16.47.254. So we can say that This is the only ACE IP address in options.

7 0
3 years ago
Convert each of the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement. Each of t
asambeis [7]

011110 is the following base 10 & base 2 numbers in signed magnitude, one’s complement and two’s complement.

c)011110

<u>Explanation:</u>

Converting 10 base signed number as two complements. In computer signed is maintain in registered.

But computer needs all values in bits. In hardware it is considered as on or off methods. ASCII values are converted into bits and executed by CPU.

All values which been entered in computer are taken respective ASCII values and converted to bits. Normally sign symbol are maintained as registered flag which can be know if end user knows assembly programming languages.

Assembly language by which direct interacted with machine languages and faster in executions.

7 0
3 years ago
When entering a function or formula in a cell, which of the first character you must type?
lions [1.4K]
When entering a function or formula in a cell, which of the first character you must type =
3 0
4 years ago
Read 2 more answers
The application that a user is currently working in is considered the __________, or foreground application, whereas the other a
Salsk061 [2.6K]
<span>is a Linux-based operating system for mobile phones such as smartphones and tablet computers. </span>
8 0
3 years ago
Other questions:
  • What are the benefits of using presentations to organize and deliver information?
    8·1 answer
  • Tanya purchases a new pair of shoes for $45. The cashier asks her to pay $48. Which of these explains the difference in price?
    7·1 answer
  • When you don't have enough room to stop, you may _______ to avoid what's in front of you. A. speed up B. steer away C. brake
    7·2 answers
  • Nick won a $1,000 lottery prize. He can't decide what he should spend the money on. For some time now, he has been planning to b
    5·1 answer
  • Using data from the BITS database, define a view named TopLevelClient. It consists of the number, name, address, balance, and cr
    9·1 answer
  • A manager keeps a record of daily each transaction in input.txt. Each line contains three items: The invoice number, the cash am
    5·1 answer
  • How would I add a play again function to this code in python?
    9·1 answer
  • For all of you who listen to podcasts, when do you usually find time to do so?​
    13·1 answer
  • Describe in detail what each step would look like if you ran into a software error.
    7·1 answer
  • In the program below, which two variables have the same scope?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!