1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
13

Network does not provide security to us​

Computers and Technology
1 answer:
Zinaida [17]3 years ago
3 0

Answer:

<u>May this answer be helpful for you </u>

Explanation:

<u>1.False. </u>

<u>1.False. 2.Network security has many policies which ensure the secure surfing of the internet. </u>

<u>1.False. 2.Network security has many policies which ensure the secure surfing of the internet. 3.The policies do not allow unauthorized access. 4.Thus, network does provide security to us.</u>

You might be interested in
Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two
s2008m [1.1K]

Answer:

Network.

Explanation:

The Transmission Control Protocol/Internet Protocol (TCP/IP) model is a standard networking protocol which allows network devices such as routers, switches, and host computers to interconnect and communicate with one another over a network. The Transmission Control Protocol/Internet Protocol (TCP/IP) model comprises of four (4) layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

The network layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes.

Basically, this layer known as network layer is the fourth layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model and it is typically responsible for the transmission of packets from one network device to another.

4 0
3 years ago
I need a quick way to see all hardware connected to my computer.
timofeeve [1]
Look it up..............
7 0
3 years ago
7. Explain the steps for formatting a shape ?
alisha [4.7K]

Answer:

To begin, select the shapes you want to format. To select more than one, press and hold the Shift key. When you select one or more shapes, a new Drawing Tools tab appears. Here, you can select Shape Fill to fill the selected shapes with a solid color, gradient, texture, or picture.

Explanation:

3 0
3 years ago
I want to find Web pages that deal with the ethical aspects of genetic engineering. I also want to limit my results to education
ankoles [38]

Answer:

"ethical aspects of genetic engineering" AND site:.edu

Explanation:

Google search defines the following operators:

" "  --> search for the exact phrase between <em>quotes</em>.

site: --> search for specific <em>sites </em><em>or domains </em>by adding "site:" in front.

AND --> Limit  results to include both statements joined with <em>AND</em>.

In a generic way:

" <em>exact phrase to search</em> " AND site: <em>domain</em>

In this example:

" ethical aspects of genetic engineering " AND site:.edu

7 0
3 years ago
Johnny just set up a TCP connection with a web server in Chicago, Illinois, claiming he is coming in with a source IP address th
wariber [46]

Answer:

Assuming that the distance from Chicago Illinois to Copenhagen Denmark is 4200 miles and the speed of light is 186,400 miles per second;

The time difference 10 milliseconds in the session log and the calculated time of 22.5 milliseconds.

Explanation:

The TCP three way handshake connection time is determined by the distance between the connecting hosts and the speed of the link.

If the distance between the hosts is 4200 miles and the link speed is an assumed speed of light 186,400 miles per second, the TCP session time is;

Time = distance/ speed

Time = 4200 / 186400

Time = 0.0225 seconds. = 22.5 milliseconds

But Johnny's TCP session time is 10 milliseconds, therefore Johnny is lying about the source IP address from Copenhagen Denmark.

7 0
3 years ago
Other questions:
  • Need 2.5 Code Practice Answers
    14·2 answers
  • While inserting images, the Picture command is usually used to insert photos from a digital camera, and the Clip Art command is
    7·2 answers
  • Someone claims that the big O notation does not make sense at all, and they give the following example. An algorithm A that proc
    15·1 answer
  • What is the printout for the first statement in the main method?
    13·1 answer
  • Https://intro.edhesive.com/courses/17288/assignments/2313298?module_item_id=4864185
    9·1 answer
  • The seven basic parts of a computer are
    10·2 answers
  • Identify the type of error described
    6·1 answer
  • What is Ce stands for?
    8·1 answer
  • If you answer these questions correctly I will mark you BRAINLIST.
    7·1 answer
  • Which term refers to a shorthand method for identifying network and host bits in an ip address?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!