1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saw5 [17]
3 years ago
8

NEED HELP WILL MARK BRAINLIEST 25 POINTS FOR ANSWER

Computers and Technology
2 answers:
Nataly [62]3 years ago
7 0

Answer:

relationship

Explanation:

dalvyx [7]3 years ago
7 0

Answer:

I agree the should be C)relationship

Explanation:

edg 2021

You might be interested in
I’ll mark brainliest if correct
aliya0001 [1]

Answer:

I believe the answer is B

Explanation:

5 0
3 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
AysviL [449]

Complete Question:

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Group of answer choices:

A. True.

B. False.

Answer:

A. True.

Explanation:

A proxy server is an example of non-security devices with security features because it acts as a hub or gateway between a user and the internet. Therefore, when a user request for resources through a website, the proxy server acts as an intermediary between them and the web server providing such resources.

ACL is an acronym for access control list and it comprises of rules that grant or deny access to resources on a network.

A firewall is a network security system which prevents unauthorized access on a private network by monitoring, controlling and filtering inbound and outbound network traffic (packets) based on a set of security rules.

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

<em>Hence, Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices. </em>

3 0
3 years ago
What is the promotion and advertising stage of a product or service called?
Eddi Din [679]

Answer:

Marketing

Explanation:

8 0
4 years ago
What is the most complex part of a PC?
rjkz [21]

Answer:

From a hardware standpoint, the CPU is most likely the main component. From a software standpoint, macOS and Windows are complex software systems.

Explanation:

6 0
3 years ago
Illustrate that the system is in a safe state by demonstrating an order in which the threads may complete.If a request from thre
Kamila [148]

Answer:

a. safe sequence is T2 , T3, T0, T1, T4.

b. As request(T4) = Available, so the request can be granted immediately

c. As request(T2) < Available, so the request can be granted immediately

d. As request(T3) < Available, so the request can be granted immediately.

Explanation:

It will require matrix

[i, j] = Max [i, j] – Allocation [i, j]

A B C D

T0 3 3 3 2

T1 2 1 3 0

T2 0 1 2 0

T3 2 2 2 2

T4 3 4 5 4

Available = (2 2 2 4)

1. Need(T2) < Available so, T2 can take all resources

Available = (2 2 2 4) + (2 4 1 3) (Allocation of T2) = (4 6 3 7)

2. Need(T3)<Available so, T3 will go next

Available = (4 6 3 7) + (4 1 1 0) = (8 7 4 7)

Like wise next T0, T1, T4 will get resources.

So safe sequence is T2 , T3, T0, T1, T4.

(Note, there may be more than one safe sequence).

Solution b.

Request from T4 is (2 2 2 4) and Available is (2 2 2 4)

As request(T4) = Available, so the request can be granted immediately.

Solution c.

Request from T2 is (0 1 1 0) and Available is (2 2 2 4)

As request(T2) < Available, so the request can be granted immediately.

Solution d.

Request from T3 is (2 2 1 2) and Available is (2 2 2 4)

As request(T3) < Available, so the request can be granted immediately.

5 0
3 years ago
Other questions:
  • How did the invention of the printing press lead eventually to an increase in the diversity of religious expression?
    7·1 answer
  • HURRY UP !!!!!!’<br> Each packet is addressed to the recipient's .
    8·1 answer
  • Can some one help sorry I just so confused on this and I keep failing it I just need the help So choose the best answers
    12·1 answer
  • Users at UC need to be able to quickly create a Resource record from the Project record's Chatter feed How should the App Builde
    10·1 answer
  • When backing up a database, what is added to the file name?<br> On g metrix
    9·1 answer
  • पुजवय<br>शब्दस्य<br>विरूदायक​
    7·1 answer
  • Which of these is a negative effect of computer technology's role in creating
    9·1 answer
  • Why are iterators useful?
    8·1 answer
  • So I tried asking for help with my code on stackoverflow but the people there were very condescending and mean plus my questions
    7·1 answer
  • Who is katie and why is she deleting my answers
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!