1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mamont248 [21]
3 years ago
8

Please help with this

Computers and Technology
1 answer:
dolphi86 [110]3 years ago
8 0

Answer:

Horizontal lines chart/graph

You might be interested in
A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall
emmainna [20.7K]

Answer:Document the reason for the request, Follow the company’s approval process for the implementation

Explanation:

The port 20 and 21 are used for the FTP connection, so before opening port 20 and 21 it is necessary to abide by the company data security policy which includes documenting the reason for the request and following company's approval process for its implementation.

8 0
3 years ago
Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne
vovikov84 [41]

Answer:

Randy should deploy SSH to allow the sales department to connect to the company network securely over cellular data signal.

Explanation:

Option A is the correct answer because SSH means Secure Shell. And Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Any network service can be secured with SSH

Option B is not correct because VPN mean virtual private network. And what VPN does is to extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Option C is not correct because IMEI means International Mobile Equipment Identity and is a number that is use to uniquel identify 3GPP and iDEN mobile phones, as well as some satellite phones.

Option D is not correct because POP3 is an example of email protocol. Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline.

4 0
3 years ago
Es el conjunto de manifestaciones materiales, intelectuales y espirituales que distinguen a un pueblo a)Civilización b)Cultura c
GREYUIT [131]

Answer:

a)Civilización

Explanation:

3 0
3 years ago
_________________________ are people, places, and materials, either printed or non-printed, that can provide answers to inquirie
GalinKa [24]

Answer:

Information/knowledge resources

Explanation:

The process of looking for answers to questions that will lead to improved knowledge about a subject is known as an inquiry. The theories of enquiry includes abduction, induction, and deduction

An inquiry can provide the reasoning behind observation by making use of the theories of inquiry and sources that provide answers (information) about the (interrelated) events of the inquiry

Therefore, information and knowledge resources are the people, materials, and places, which can be in the printed, verbal, appearance form that have the capacity to proffer answers to inquiries

6 0
3 years ago
What is the best way to pay for college?
Virty [35]

Answer:

I think it would be Federal student loans if I am sure sorry if you get it wrong.

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Declare a character variable letterStart. Write a statement to read a letter from the user into letterStart, followed by stateme
    12·1 answer
  • A small company has hired you to take over its IT needs. The company currently has seven on-site employees and 12 remote employe
    12·1 answer
  • What is an activity that can help you enhance the appearance of your computer’s desktop?
    13·1 answer
  • A(n) _______________ is a collection of configuration and security settings that an administrator has created in order to apply
    14·1 answer
  • Which of the following is true of how the Internet has responded to the increasing number of devices now using the network?
    7·1 answer
  • Consider the classes below: public class TestA { public static void main(String[] args) { int x = 2; int y = 20 int counter = 0;
    8·1 answer
  • @anthonydboss23<br><br> it’s goldielove6 <br><br> .....this is not a question everyone ignore this
    11·2 answers
  • Given the char variable c, write an expression that is true if and only if the value of c is not the space character .
    7·1 answer
  • Difference between ancient and modern mode of information <br> transmission
    12·1 answer
  • Can someone please explain to me how the points work when you ask a question? Worth 30 points I think, I still don't know how th
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!