1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dalvyx [7]
3 years ago
11

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a d

evice connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation, not other devices. Which feature should you configure
Computers and Technology
1 answer:
Alecsey [184]3 years ago
6 0

Answer:

Promiscuous mode

Explanation:

You might be interested in
Accessing calendars, contact information, email, files and folders, instant messaging, presentations, and task lists over the in
Illusion [34]
The answer is Cloud Computing.  It access calendars, contact information, email, files and folders, instant messaging, presentations, and task lists over the internet. This means, if you have a device and an internet connection, you can have your "office" anywhere, anytime.
4 0
3 years ago
Read 2 more answers
A typical pda includes a(n) _____.
Ratling [72]
A.External Monitor.Hope I helped.
5 0
3 years ago
Read 2 more answers
If totalMonths has a string value of "13", what does the code that follows display?var years = parseInt ( totalMonths / 12 );var
TEA [102]

Answer:

The answer to this question is "Option a".

Explanation:

The description of the JavaScript code as follows:

  • In the code, there is two variable defined that are "years and months". The years convert string value in number and calculate years and holds value in years variable and months variable calculate the moths and holds value in months variable.
  • Then we use conditional statements in this statement we use two if blocks. In first if block we check that years variable value is equal to 0. if this condition is true. it will print months in the alert box.
  • In second if block we check that if months variable value is equal to 0. if this condition is true. it will print years in the alert box.
  • In else block, we use an alert box that prints years and months.

6 0
3 years ago
Describe how to deploy a website and make it as secure as possible while reducing its resources used
erastova [34]

Answer:

Explanation:

in order to deploy a website, you use these 5 steps, the first step is the preparation step, the second step is to set up DNS record, in step 3 a live testing is set up, in step 4 you set up email accounts while in step 5, you back up and now go live.

in order to secure your website from any threat, malware it hacker it it is necessary to use HTTPS. HTTPS, protects the websites integrity. it also provides data protection as data encryption provides such security. parameterized queries can also be used.

5 0
3 years ago
Explain what qualifies a device to be called a computerized system​
Karolina [17]

Answer; A peripheral is a “device that is used to put information into or get information out of the computer.”[1]

There are three different types of peripherals:

Input, used to interact with, or send data to the computer (mouse, keyboards, etc.)

Output, which provides output to the user from the computer (monitors, printers, etc.)

Storage, which stores data processed by the computer (hard drives, flash drives, etc.)

Explanation:

7 0
3 years ago
Other questions:
  • In the Happy Valley School System, children are classified by age as follows: less than 2, ineligible 2, toddler 3-5, early chil
    6·1 answer
  • Perform online or offline research to learn more about film elements. Then, write a short report on the essentials of filmmaking
    13·1 answer
  • What does it mean to have liability for a company?
    6·1 answer
  • Ssume the following variables contain the values shown: numberRed = 100 numberBlue = 200 numberGreen = 300 wordRed = "Wagon" wor
    5·1 answer
  • You are the CISO of a company and you need to create logging policies. Please review NIST SP800-92, specifically sections 4–3 th
    12·1 answer
  • A __________ is an information system that produces all kind of reports and interprets information so it can be used by concerne
    6·1 answer
  • Which of the following would be considered a subtopic for a mind map?
    8·1 answer
  • How scientist and technology beliefs society
    14·1 answer
  • CS160 Computer Science I In class Lab 10
    15·1 answer
  • WHY DO YOU DElete EVERY QUESTIONS THAT IS ASKED! Im a freaking guy, yes and i wont followers for my channel so leave me alone!
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!