Answer:
Examine the sources cited by the website
Explanation:
Due to the ability for everyone to create a website, and that there are no governing standards on the quality of information given on websites, it is important when conducting research to ensure that the sources on the web are up to date, accurate, and provide an objective view
Therefore, it is important to go through and examine the website critically using the the following criteria
1) The website coverage
2) The currency of the website's information
3) Weather the website is objective or not
4) The identity of the author of the website and the ability to contact the author
5) The accuracy of the information contained in the website
Answer:
Landscape or vertical page orientation
Explanation:
In landscape he can mange the number of cell that are required to print on A4 page size.
On landscape orientation of the page we can add more columns of the sheet. That is the reason, we should choose landscape or horizontal page orientation to adjust all columns on the single page.
Answer:
B. Intrusion Detection Software (IDS)
Explanation:
An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.
Answer:
Broadcast message
Explanation:
The network models like OSI and TCP/IP suites have standard layers and protocols that governs the communication of end devices in a network.
The TCP/IP suite model has four layers which are application, transport, internet and network access layers. The network access does the work of both the data-link and physical layer of the OSI model.
When the packet is encapsulated in a data-link header and trailer, and needs to be sent to another unknown host, a broadcast message is sent to all the computers in the network to retrieve the remote host address for a unicast transmission to take place.