1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivan
4 years ago
11

The security administrator for Corp.com wants to provide wireless access for employees as well as guests. Multiple wireless acce

ss points and separate networks for internal users and guests are required. Which of the following should separate each network? (Choose all that apply.)(a)Channels(b)Physical security(c)Security protocols(d)SSIDs
Computers and Technology
1 answer:
Reil [10]4 years ago
7 0

SSIDs should separate each network.

(d)SSIDs

<u>Explanation:</u>

In an organization or corporation office, End user is office staff he or she can access to different SSIDS, Where restrictions access can be configured at firewall level.

So if any guest he or she will ask to connect different SSIDS so that guest will not enter to internal networks. Where guest is connected to only on restricted area network such as internet etc.  Due to this if guest pc is attacked by virus it can prevented by attacking the same to internal office network.

You might be interested in
Im on Edge 2021 and i did an assignment that says, "Processing." The assignment won't give me a grade and says it is overdue. wh
lora16 [44]

Answer:

you could send a email to your teacher to fix the problem

Explanation:

3 0
3 years ago
Producing goods only enough to meet the basic needs of the family is called
kramer

Answer:

Subsistence production

4 0
3 years ago
An employee was watching Jessica, an IT employee, typing in many different confusing terms. Jessica explained that she needed to
zzz [600]

Answer:

Programming and Software Development

Explanation:

8 0
3 years ago
Read 2 more answers
Write a program that will take a file named Celsius.dat that contains a list of temperatures in Celsius (one per line), and will
dedylja [7]

Answer:

celciusFile=open("celcius.dat","r")

fahrenheitFile=open("fahrenheit.dat","w")

# Iterate over each line in the file

for line in celciusFile.readlines():

# Calculate the  fahrenheit

   fahrenheit = 9.0 / 5.0 * float(line) + 32

#write the  Fahrenheit values to the  Fahrenheit file

   fahrenheitFile.write("%.1f\n" % fahrenheit)

# Release used resources

celciusFile.close()

fahrenheitFile.close()

Explanation:

<em></em>

<em>celciusFile=open("celcius.dat","r") </em>

<em>fahrenheitFile=open("fahrenheit.dat","w") </em>

open the Celsius file in the read mode and assign it to a variable.

open the  Fahrenheit file in the write mode and assign it to a variable.

read mode means you can only use/read the content in the file but cannot alter it.

write mode means you can write new data to the file.

<em> </em>

<em />

  • <em># Iterate over each line in the file </em>

<em>for line in celciusFile.readlines(): </em>

The values contained in the Celsius file are collected.

  • <em># Calculate the  fahrenheit </em>

<em>    fahrenheit = 9.0 / 5.0 * float(line) + 32 </em>

The values are then converted to Fahrenheit.

  • <em>#write the  Fahrenheit values to the  Fahrenheit file</em>

<em>    fahrenheitFile.write("%.1f\n" % fahrenheit) </em>

The Fahrenheit values are written to the  Fahrenheit file

<em>%.1f</em><em>  is used to specify the number of digits after decimal. and </em><em>\n </em><em>adds a new line.</em>

<em />

  • <em># Release used resources </em>

<em>celciusFile.close() </em>

<em>fahrenheitFile.close() </em>

All files are closed

<em />

5 0
3 years ago
After selecting the heading and opening the Style dialog box, Jemima now wants to open the Modify Style dialog box. How does she
julsineya [31]

b

i did it amd got a 100

nvm

3 0
3 years ago
Other questions:
  • Syntax refers to what aspect of language? sounds of words order of words meanings of words
    12·1 answer
  • Online Book Merchants offers premium customers 1 free book with every purchase of 5 or more books and offers 2 free books with e
    5·1 answer
  • Which of the following programs can open a bitmap file?
    11·2 answers
  • What is jcl language on the mainframe?
    10·1 answer
  • In a penetration test, a ________ team consists of IT staff who defend against the penetration testers. They are generally aware
    14·1 answer
  • Which of the following operating systems includes a virtual assistant?<br> Group of answer choices
    8·1 answer
  • A specific packet journey, from your computer to a remote server, end-to-end across multiple networks, has the following link ba
    9·1 answer
  • when you sent email your email can be set to automatically keep a copy where do you find these copies​
    13·1 answer
  • What do the last two steps in the cyclical design process most likely involve
    6·1 answer
  • What tool allows you to search external competitive intelligence research?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!