1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
3 years ago
8

Need answer ASAP plz

Computers and Technology
1 answer:
Natalka [10]3 years ago
6 0

Answer:

i can't read a single word on there i'll come back to it if you can zoom in a little

Explanation:

You might be interested in
For an external usb hard drive attached to a computer, which is more suitable: a writethrough cache or a block cache
Charra [1.4K]

Disk access is way slower than memory access. Caching is a technique to improve the disk access time.  Block cache is a caching technique which reduces disk accesses time.  Here a portion of disk is bought to cache for reading and a modified blocks are first changed in cache but reflected in the disk at one go.  On the other hand with write through caching each modified block is written to cache and at the same time it is written to the disk.  Write- through caching requires more disk I/O so they can have a negative effect on the performance. 

6 0
3 years ago
Read 2 more answers
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
What is the output of the following code snippet? double income = 45000; double cutoff = 55000; double minIncome = 30000; if (mi
MissTica

Answer:

Income requirement is met.

Explanation:

(minIncome > income) will evaluate to false

(cutOff < income) will evaluate to false

the else portion will be executed which is "Income requirement is met"

7 0
3 years ago
Define the method object inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids.Sample output for the g
topjm [15]

Answer:

class PersonInfo:

   def __init__(self):

       self.num_kids = 0

   def inc_num_kids(self):

       self.num_kids += 1

person1 = PersonInfo()

print('Kids:', person1.num_kids)

person1.inc_num_kids()

print('New baby, kids now:', person1.num_kids)

Explanation:

Line 1 of the code, we define the class PersonInfo. Line 3 of the code is the function that will increment the member data num_kids.

4 0
3 years ago
The numeric keys on a keyboard or calculator are referred to as a:
Anna [14]

Numeric Keypad is the answer

6 0
3 years ago
Other questions:
  • Why are resources limited? Why can't we get everything all the time?
    12·1 answer
  • Which of the following filenames is acceptable on both Windows and Mac<br> operating systems?
    9·1 answer
  • When configuring a vpn server to automatically assign ​ip addresses to remote clients, how many ip addresses are in a single poo
    10·1 answer
  • How do I attach a file on the computer?
    13·1 answer
  • The World Wide Web (WWW) is a network of links on the Internet to documents containing text, graphics, video, and sound, but doe
    10·1 answer
  • Be my friend plzzzzzzz
    7·2 answers
  • Write a program that will find the smallest, largest, and average values in a collection of N numbers. Get the value of N before
    13·1 answer
  • What key should i press to leave the cell as it orginally was
    9·1 answer
  • Which data type is also called a binary object?
    9·2 answers
  • A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!