1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
9

What specific information would you need to obtain from an ISP or cloud service provider whose hosting services you wanted to us

e?
Computers and Technology
1 answer:
dimaraw [331]3 years ago
4 0
Account Information , IP addresses , DNS server names , and file and directory instructions .
You might be interested in
A Turing machine with doubly infinite tape (TMDIT) is similar to an ordinary Turing machine except that its tape is infinite to
umka2103 [35]

Answer and Explanation:

A TM with doubly infinite tape can simulate an ordinary TM. It marks the left-hand end of the input to detect and prevent the head from moving off of that end. To simulate the doubly infinite tape TM by an ordinary TM, we show how to simulate it with a 2-tape TM, which was already shown to be equivalent in power to an ordinary

TM. The first tape of the 2-tape TM is written with the input string, and the second tape is blank. We cut the tape of the doubly infinite tape TM into two parts, at the starting cell of the input string. The portion with the input string and all the blank spaces to its right appears on the first tape of the 2-tape TM. The portion to the left of the input string appears on the second tape, in reverse order.

3 0
3 years ago
Why do you want to work from our company?​
leonid [27]

Answer:

Hwhat

Explanation:

5 0
3 years ago
Read 2 more answers
In implementing Security Life Cycle:__________
Dvinal [7]

Answer:

b) one needs to follow through all phases, assessment, design, deploy and manage security

Explanation:

The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form

At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step

Therefore according to the given options, the second option is correct

7 0
3 years ago
(Language is in Java)
Gre4nikov [31]

import java.util.Scanner;

public class InchesToFeetInteractive

{

public static void main(String[] args) {

   Scanner scan = new Scanner(System.in);

   final int INCHES_IN_FOOT = 12;

   int inches = scan.nextInt();

   int feet;

   int inchesLeft;

   feet = inches / INCHES_IN_FOOT;

   inchesLeft = inches % INCHES_IN_FOOT;

   System.out.println(inches + " inches is " +

   feet + " feet and " + inchesLeft + " inches");

   }

}

We import the Scanner class and then initialize a new Scanner named scan. We then get an integer representation of inches from the user and calculate the feet and inches from the value entered by the user.

7 0
3 years ago
How do network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS) differ?an NIDS focuses more
balandron [24]

Answer:

a. NIDS focuses more on analyzing incoming traffic, while an HIDS monitors valuable OS files

Explanation:

Intrusion detection system is used in analyzing, detecting, and raising alarm on suspicious network activities used by hackers to access unauthorized sites. Network intrusion detection system is meant to work in real-time, so as to analyze incoming traffic. Packets moving across the network are evaluated for threats.

Host intrusion detection system work within the operating system of the device to evaluate the history of system files that could contain threats, or unusual file permission changes, and then raise an alarm.

3 0
3 years ago
Other questions:
  • You have recently implemented a new WAN technology to connect a remote branch office to your headquarters. While making VoIP cal
    15·1 answer
  • Can Any body Define what is search engine in a simple language quick please​
    14·1 answer
  • Title text boxes on every slide must be the same format.<br><br> A) True<br> B) False
    8·2 answers
  • Lionel wants to find images of colonies of Emperor penguins to use for a school project. Which of the following phrases should h
    15·1 answer
  • A STUDENT can take many COURSES and a COURSE can have more than one STUDENT enrolled in the course. In this case, both the "stud
    5·1 answer
  • Information about a computer file, not the actual data that is contained in the file, is called ______
    8·2 answers
  • When saving a PowerPoint presentation as a show which object will not be saved with the presentation
    13·2 answers
  • As discussed in the video, parallax measurements allow us to calculate distances to stars for which parallax is detectable. Supp
    14·1 answer
  • You would use the _______ conditional formatting options when analyzing a worksheet in which you want to highlight the highest o
    13·1 answer
  • Your manager has requested you keep a timesheet showing how many hours you work each day and what projects you work on during th
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!