1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adoni [48]
3 years ago
12

Example of Not a computer characteristics example

Computers and Technology
1 answer:
Allushta [10]3 years ago
5 0

Answer:

A book

A non electronic

Explanation:

You might be interested in
a limited-access expressway. A)allows vehicles to enter or exit only at certain place.B) does not permit trucks or buses.C)has n
zepelin [54]
Hello babe I just wanted to say hello
3 0
3 years ago
Is a display, or monitor, considered a piece of computer hardware
9966 [12]
Yes. The monitor is considered as a piece of Computer Hardware. Computer hardware is what you can physically touch, like the keyboard, mouse, monitor, disk drive, and so on.

I hope this answers your question.

Thank you,
Otaku
3 0
3 years ago
Write a C++ line of code to declare a variable of type “double” that signifies the average of student grades, then initialize th
mamaluj [8]

The line of code required to assign a value of 50.00 to a variable of double data type in C++ can be written thus :

  • double average_student_grade = 50.00;

The declaration follows the format :

  • Data type
  • Variable name
  • Value

The data type which is first stated, the double data type are floating point (have decimals) numbers which have 64 bit precison(a precison of 15 decimal digits) as opposed to floats which have 32 bit precison (a precison of 7 decimal digits).

The variable name is the name to hold the value of average grade. This name depends on the preference of the programmer. However. It is advisable that variable names are relatable.

Therefore, variable declaration in C++ may follow the format data type then variable name then value.

Learn more :brainly.com/question/12908743

4 0
2 years ago
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have b
PilotLPTM [1.2K]

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>

8 0
3 years ago
Which three IP addresses may be pinged by the Test Management Network feature in the ESXi hosts DCUI
Sholpan [36]

Answer:

Primary DNS server

Secondary DNS server

Default gateway

Explanation:

The following tests are performed by ESXi:

  • Pings the subnet gateway that is stated.
  • Pings the primary DNS server that is stated.
  • Pings the secondary DNS server that is stated.
  • Ensure that the hostname of the ESXi host is resolved by it.

Based on the above, the three IP addresses may be pinged by the Test Management Network feature in the ESXi hosts DCUI are are therefore the following:

  • Primary DNS server
  • Secondary DNS server
  • Default gateway
5 0
3 years ago
Other questions:
  • A good website design combines which of the following elements? (select all that apply) powerful web server hardware components
    9·2 answers
  • The _____ is the area in Microsoft Excel where you can perform file commands such as Save, Open, and Print
    15·1 answer
  • Which ergonomic principle helps to maintain good posture?
    7·2 answers
  • Site won't let me log in and is glitching? Is rainly down?
    15·2 answers
  • How do you get past a firewall ?
    15·1 answer
  • Next, Jamal wants to copy text from a Word document to the slide he just added. He outlines the steps to complete his task. Step
    15·2 answers
  • Does any body know how to bypass easy anti cheat on crossout
    7·1 answer
  • Does the security burden fall primarily on the user? On
    10·1 answer
  • Question 5 / 15
    11·2 answers
  • Budgeting for a Computer
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!