1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena-2011 [213]
2 years ago
6

Directions

Computers and Technology
1 answer:
DanielleElmas [232]2 years ago
3 0

Answer:

is he project for me

Explanation:

You might be interested in
Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
Luden [163]

Answer:

The packet is dropped

Explanation:

To see why we need to understand the ACL or Access-control list that is a list of permissions that specify which users can access or modify certain things in a system. Because the source IP  doesn't have any parameter and is just a plain IP and packet the Cisco firewall will drop the packet based on the ACL rules, in other words, the Cisco firewall doesn't have any parameter that allows it to verify the permission-level of the sender, therefore, the packet will drop.  

7 0
3 years ago
In which table is the input and the corresponding output of a Boolean function listed? How is the output of the NAND gate determ
Mice21 [21]

Blank 1 is OR

Blank 2 is AND

3 0
3 years ago
What does “int” means in php code
hram777 [196]

Answer:

integer

Explanation:

7 0
3 years ago
Which type of appliance can host several functions, such as antimalware, firewall, content filter, and proxy server
navik [9.2K]

Answer:

Web Security Appliance (WSA)

7 0
3 years ago
What does an arrow after a command indicate
Ainat [17]

Answer:

the command still has to be carried out.

3 0
2 years ago
Read 2 more answers
Other questions:
  • When you move or size a control in the Form Designer, Visual Studio automatically adjusts the ________________ that specify the
    9·1 answer
  • 8. A pattern of being late for work or for appointments is usually
    12·1 answer
  • The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer sy
    14·1 answer
  • Which screen should be open to customize or personalize a desktop background?
    15·2 answers
  • Write the algorithm and draw a flowchart to display the greatest number among any two different numbers....
    5·1 answer
  • Expectation on Information Technology Fundamental​
    12·1 answer
  • I'm showing my friends brainly. Answer with anything so they can see how fast I can get answers.
    10·2 answers
  • Please could you help me
    6·2 answers
  • What is pollution?
    14·2 answers
  • You have a technical interview for a new position in digital media. One of the questions you are asked is this: “A client asks y
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!