1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mote1985 [20]
3 years ago
11

Heeeeeeeeeeeeeeeeeeelp plz

Computers and Technology
1 answer:
kodGreya [7K]3 years ago
4 0

Answer:

It is the very first one

Explanation:

Because if you take the first letter of each word besides and it is right.

You might be interested in
A voice engineer is setting up a Cisco 2951 Integrated Services Router with Cisco Unified Communications Manager Express. To ena
o-na [289]

Answer:

voice service voip

Explanation:

Voice over Internet Protocol feature allows users to make voice calls by making use of a broadband internet connection. The Voice engineer is setting up a Cisco 2951 Integrated Services Router with Cisco Unified Communications Manager Express, which happens to fall under broadband internet connection and hence the command the engineer will enter must be a voice service voip.

8 0
3 years ago
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
defon

Answer:

The correct answer to the following question will be Option C (Firewall monitoring).

Explanation:

Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.

Usually, management of the firewalls should include:

  • Monitoring the firewall file.
  • Management of the firewall statute.
  • Monitoring the design of the firewall.

Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.

Therefore, Option C is the right answer.

4 0
3 years ago
In Java please,
Bogdan [553]

Answer:

  1. import java.util.Scanner;
  2. public class Main {
  3.    public static void main(String[] args) {
  4.        Scanner input = new Scanner(System.in);
  5.        System.out.print("Enter meal total: $");
  6.        double meal = input.nextDouble();
  7.        double finalAmount = meal + meal *0.09;
  8.        if(finalAmount * 0.15 > 8){
  9.            finalAmount = finalAmount + 8;
  10.        }else{
  11.            finalAmount = finalAmount + finalAmount * 0.15;
  12.        }
  13.        System.out.println("Final amount: $" + finalAmount);
  14.    }
  15. }

Explanation:

Firstly, create a Scanner object and print user to input total meal (Line 5-7). Next, add the 9% tax to the meal total (Line 8). Use an if statement to check if the finalAmount multiplied by the 15% of tips is bigger than 8 (Line 10), if so, only add 8 to the final amount (Line 11). If not, add 15% tips to final amount (Line 12). At last, print out the final amount (Line 15).

8 0
3 years ago
In ________, an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instr
xxMikexx [17]
The answer is:  "drive-by hacking" .
____________________________________________
 
      "In<span> <u> drive-by hacking </u></span>, <span>an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instructions to it without having to enter the home, office, or organization that owns the network."
_______________________________________________________________</span>
5 0
3 years ago
Categorize the e-publications as a means of networking or as a storehouse of resources
stealth61 [152]

Answer:

 The answer is "E-book, E-portfolio, and website ".

Explanation:

e-publications define as a method of connectivity are sites online besides the un-mail community newsgroup blog. It defines as a category of means, which storehouse with resource base are E-book, E-portfolio, and website.

  • On the website, it can be classified as both connectivity and storage facility of information.  
  • On the website when network security like yahoo website only as a storage area of resource development website to access or download PDF files.
8 0
4 years ago
Other questions:
  • Make the correct match.
    11·1 answer
  • Which of the following statements about the OSI is FALSE?A. The OSI model encourages modular design in networking.B. Each protoc
    8·1 answer
  • This network passes data most of the time, but sometimes for reasons unknown to the junior network engineer in charge of monitor
    14·1 answer
  • On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance
    10·1 answer
  • The seven basic internal components found in a computer tower
    9·1 answer
  • While speech recognition can operate without any confi guration, you can train it to more accurately recognize your voice. true
    5·1 answer
  • Your boss wants you to configure his laptop so that he can access the company network when he is on the road. You suggest a VPN
    11·1 answer
  • Which feature allows users to see all suggestions for edits to a document at once?
    7·2 answers
  • Susan is a network monitoring technician working on a firewall for her company’s network. In the process to determine an open po
    8·1 answer
  • Which automatic startup option should you choose when windows' startup fails immediately after installing a new driver but befor
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!