Answer:
voice service voip
Explanation:
Voice over Internet Protocol feature allows users to make voice calls by making use of a broadband internet connection. The Voice engineer is setting up a Cisco 2951 Integrated Services Router with Cisco Unified Communications Manager Express, which happens to fall under broadband internet connection and hence the command the engineer will enter must be a voice service voip.
Answer:
The correct answer to the following question will be Option C (Firewall monitoring).
Explanation:
Firewall monitoring would be the analysis of essential firewall parameters that play a key role throughout the effective operation of firewalls.
Usually, management of the firewalls should include:
- Monitoring the firewall file.
- Management of the firewall statute.
- Monitoring the design of the firewall.
Firewall security control is shown if the user uses Wire-shark to track relevant incoming and outgoing traffic.
Therefore, Option C is the right answer.
Answer:
- import java.util.Scanner;
- public class Main {
-
- public static void main(String[] args) {
- Scanner input = new Scanner(System.in);
- System.out.print("Enter meal total: $");
- double meal = input.nextDouble();
- double finalAmount = meal + meal *0.09;
-
- if(finalAmount * 0.15 > 8){
- finalAmount = finalAmount + 8;
- }else{
- finalAmount = finalAmount + finalAmount * 0.15;
- }
- System.out.println("Final amount: $" + finalAmount);
- }
- }
Explanation:
Firstly, create a Scanner object and print user to input total meal (Line 5-7). Next, add the 9% tax to the meal total (Line 8). Use an if statement to check if the finalAmount multiplied by the 15% of tips is bigger than 8 (Line 10), if so, only add 8 to the final amount (Line 11). If not, add 15% tips to final amount (Line 12). At last, print out the final amount (Line 15).
The answer is: "drive-by hacking" .
____________________________________________
"In<span> <u> drive-by hacking </u></span>, <span>an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instructions to it without having to enter the home, office, or organization that owns the network."
_______________________________________________________________</span>
Answer:
The answer is "E-book, E-portfolio, and website
".
Explanation:
e-publications define as a method of connectivity are sites online besides the un-mail community newsgroup blog. It defines as a category of means, which storehouse with resource base are E-book, E-portfolio, and website.
- On the website, it can be classified as both connectivity and storage facility of information.
- On the website when network security like yahoo website only as a storage area of resource development website to access or download PDF files.