The answers are too long. I have compiled them in Word and attached them below.
Answer:
Following are the solution to the given choices:
Explanation:
Given:
double currentBalance[91];//defining a double array
In point a:
The name of the array is= currentBalance.
In point b:
91 double values could be saved in the array. It requires 8bytes to hold a double that if the array size is 91*8 = 728
In point c:
Each element's data type is double.
In point d:
The array index range of values is between 0 and 90 (every array index starts from 0 and ends in N-1, here N=91).
In point e:
To access first element use currentBalance[0], for middle currentBalance[91/2] , for last currentBalance[90]
The answer is
SSIDSSID which in full stands for Service
Set Identifier is used to identify a network. It ensures that clients are able
to locate a WLAN in which they are attached to. In Layman’s terms, it’s the
username or the primary name in a WiFi setup in which a user joins and is connected
to.
Answer:
True
Explanation:
There are four paths in this network. A is an immediate predecessor of C and of D. B is also an immediate predecessor of C and of D. C and D are both immediate predecessors of E. Given the above scenario
Answer and Explanation:
The requirements to be considered while determining the firewalls' features and locations are:
- The reason so as to why to implement a firewall
- Traffic inspection type required to be accomplished.
- Best OS, i.e., Operating System suitable for the work need.
- The method to fir firewall into the topology (network).
- Making decision whether the firm is more suitable for software solution or application.
Some of the importants steps to be taken for the firewalls to remain effective:-
-
Use of strong password.
- according to the usage, tweak the settings of the firewall.
- Enable auto update for firewall.
- Maintain consistency in settings throughout the network.
- addition of multiple layers to the security and computer system.
- Application of encryption (128 bit WEP).
- Analysis of the traffic both outbound and inbound and taking appropriate measures.
- Always check for leaks and ports.