1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Citrus2011 [14]
4 years ago
8

Maurice has just purchased his first computer, which contains a preinstalled suite of basic software applications. He receives a

file with the extension ".docx" in an email and double-clicks on it. This file will most likely _____.
A. convert itself into a different file type that his computer will recognize with one of its preinstalled software applications
B. open in a default software application
C. open a dialogue box containing several different preinstalled software applications to choose from
D. open a dialogue box containing several new software applications to download from the Internet
Computers and Technology
2 answers:
Oksanka [162]4 years ago
5 0
This file will most likely _____.

A. convert itself into a different file type that his computer will recognize with one of its preinstalled software applications
dsp734 years ago
3 0

The correct answer is B

B- open in a default software application.

Have a good day and good luck.


You might be interested in
How exactly do I answer questions?
pshichka [43]

Answer:

If you mean this website, click the add answer button on the question

Explanation:

8 0
2 years ago
The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent messag
Scorpion4ik [409]

Answer: destination unreachable

time exceeded

Explanation:

You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.

The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:

• destination unreachable

• time exceeded

4 0
3 years ago
En cual programa puedo hacer un mapa mental
mojhsa [17]
Hay aplicaciones especializadas para la creación de mapas mentales . Pero la herramienta más simple podría ser un papel y algunas plumas . El segundo sencillo cuando no tiene instalado el software podría ser la creación de un mapa mental en MS Word
3 0
3 years ago
Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping
tresset_1 [31]

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

6 0
4 years ago
If a fire should break out in your building, which of the following actions is NOT recommended?
quester [9]

C) Scream and run

you need to remain calm and carefully exit the building making sure you have everybody with you

6 0
4 years ago
Read 2 more answers
Other questions:
  • If the Update Automatically option is chosen in the Date and Time dialog box, _____. the date will automatically change each tim
    7·1 answer
  • Which of the following statements about these signs is true?
    13·1 answer
  • When is it most appropriate to quote from an e-mail message in a response?
    9·2 answers
  • Which of the following is an automated or manual file that stores information about data elements and data characteristics such
    6·1 answer
  • Select the correct answer.
    9·1 answer
  • Used for monitoring web activity by users to make sure that sensitive information won't leave the building.
    7·1 answer
  • Why does it say error on that last line of code
    15·2 answers
  • PLEASE ANSWER
    6·1 answer
  • Cookie Snooping
    14·1 answer
  • What type of storage drive contains multiple spinning platters?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!