1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bazaltina [42]
2 years ago
5

PLEASE HELP I mainly only need the answer for 4.

Computers and Technology
1 answer:
Ede4ka [16]2 years ago
6 0

Answer:

it is asking for https response

You might be interested in
Plugging in a cable is a good troubleshooting technique. <br> True or false
natali 33 [55]

Answer:

false

Explanation:

that does nothing

6 0
3 years ago
Megan owns a small neighborhood coffee shop, and she has fifteen employees who work as baristas. All of the employees have the s
nlexa [21]

Answer:

she gives 10 dollars an hour

Explanation:

no

4 0
2 years ago
What option is available on a Host A record to tell the system how long the record should remain in the database after it was cr
lapo4ka [179]

Answer:

Time to live.    

Explanation:

The Time to Live is used for the purpose of the expiration table in the rows dynamically.The Time to live is represented in the time limit to stay in the database the Time to live It is no longer possible to fetch the data that has passed its closing timeout value also it is not displayed in the store metrics.

The Time to live is available on the host in the log informing the system how long the record will stay in the database after it has been generated or last modified.

8 0
3 years ago
A vlan ________.
tensa zangetsu [6.8K]

A vlan can span multiple interconnected switches.

<h3>What is a vlan?</h3>

A virtual LAN (VLAN) is a logical overlay network that groups together a subset of devices that share a physical LAN, isolating the traffic for each group.

A LAN is a group of computers or other devices in the same place -- e.g., the same building or campus -- that share the same physical network.

Each virtual switch, or VLAN, is simply a number assigned to each switch port.

For example, the two switch ports in the red mini-switch might be assigned to VLAN #10 . The two ports in the orange mini-switch might be assigned to VLAN #20 .

VLANs can be used for different groups of users, departments, functions, etc., without needing to be in the same geographical area.

VLANs can help reduce IT cost, improve network security and performance, provide easier management, as well as ensuring network flexibility.

To learn more about vlan, refer

https://brainly.in/question/2890503

#SPJ4

6 0
1 year ago
There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi
torisob [31]

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

6 0
3 years ago
Other questions:
  • Determine the number of bytes necessary to store an uncompressed binary image of size 4000 × 3000 pixels.
    9·1 answer
  • in what way do rules and laws created to address public problems affect individuals groups and business
    13·1 answer
  • How much does a Canon PowerShot G7X cost in America?
    14·1 answer
  • You can add envelopes to existing documents. <br> a. True <br> b. False
    10·1 answer
  • The syntax for multiplication function is ____________.
    8·1 answer
  • If a secret key is to be used as a _________ for conventional encryption a single number must be generated.
    13·1 answer
  • At an open or uncontrolled intersection, yield if ____.
    15·2 answers
  • What is the name given to a collection of related fields such as ID number,name and address?
    12·1 answer
  • The force required to slide an object is equal to _____.
    13·1 answer
  • Would my phone still work if I snapped it in half?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!