1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
3 years ago
6

1) You are working with an organization as a network manager. The organization has

Computers and Technology
1 answer:
pantera1 [17]3 years ago
7 0

Answer:

Explanation:

a. In this specific scenario, the best option would most likely be a site-to-site VPN. This would allow each office to be independently connected to the internet and at the same time be connected to each other securely and efficiently. There should be unnoticeable or no delay at all between the two offices and sensitive files will be completely secure. Therefore, the two offices can easily transfer data securely between one another without fear of the data being intercepted.

b.  The same VPN network would work on the head office, but instead we can implement firewall restrictions to the head office network itself. These restrictions would prevent any or all incoming connections that are trying to request data from the local head office network. This would allow the head office to continue working without worry of unwanted intruders in their network.

You might be interested in
Write an example method that overrides the operator to create a new book whose title is a concatenation of the titles of two boo
Anastasy [175]

next time m8 mmmmmdsaasd

5 0
3 years ago
What is thesql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a
alexira [117]

Answer:

The answer is below

Explanation:

The the sql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a grand total for all product sales is:

SELECT S.CUS_CODE, T.TM_MONTH, S.P_CODE,

SUM(S.SALE_UNITS*S.SALE_PRICE) AS "TOTSALES"

FROM DWDAYSALESFACT AS S INNER JOIN DWTIME AS T ON S.TM_ID =

T.TM_ID

GROUP BY S.CUS_CODE,T.TM_MONTH,S.P_CODE WITH ROLLUP;

4 0
3 years ago
Write two example use of relationships ICT
Yakvenalex [24]

Answer:

Read it all before you write if this isn't what you searching for I'm sorry...:(

A relationship, in the context of databases, is a situation that exists between two relational database tables when one table has a foreign key that references the primary key of the other table. Relationships allow relational databases to split and store data in different tables, while linking disparate data items.

For example, in a bank database a CUSTOMER_MASTER table stores customer data with a primary key column named CUSTOMER_ID; it also stores customer data in an ACCOUNTS_MASTER table, which holds information about various bank accounts and associated customers. To link these two tables and determine customer and bank account information, a corresponding CUSTOMER_ID column must be inserted in the ACCOUNTS_MASTER table, referencing existing customer IDs from the CUSTOMER_MASTER table. In this case, the ACCOUNTS_MASTER table’s CUSTOMER_ID column is a foreign key that references a column with the same name in the CUSTOMER_MASTER table. This is an example of a relationship between the two tables.

3 0
3 years ago
create 2 text field web form where 1 field allows the user to specify the text spring to search for and the other field allows t
mixas84 [53]

Answer:

<?php

$error = '';

$string = "This is a sample string. Hello World";

if(isset($_POST["modify_str"])){

$show_form = false;

extract($_POST);

// check that user entered some value

if(empty($string_search)){

$error += 'Please fill out the string to be searched for <br>';

$show_form = true;

}

// check that user entered some value

if(empty($string_replace)){

$error += "Please fill out the string/word to be replaced for <br>";

$show_form = true;

}

// if user has entered some value, then replace it in the string using the str_replace function and print the string after modification

if (!$show_form){

$string = str_replace($string_search, $string_replace, $string);

echo "String after modification: <br>";

echo $string;

}

}

else

{

$show_form = true;

}

if($show_form)

{

?>

Please select any word to search for and replace for in the following string <br>

<?php echo $string; ?>

<br> <br>

<form action="" method="post">

<label for="string_search"> String to search for: </label>

<input type="text" name="string_search" id="string_search" required="required" /> <br> <br>

<label for="string_replace"> Replace with: </label>

<input type="text" name="string_replace" id="string_replace" required="required" /> <br> <br>

<input type="submit" id="modify_str" name="modify_str" value="Modify String"/>

</form>

<?php

}

?>

Explanation:

The program was written with php.

It is designed such that it can create 2 text field web form where 1 field allows the user to specify the text spring to search for and the other field allows the user to specify the replacement string.

See answer for the program code.

6 0
3 years ago
Write a program in Java to display the given pattern.
Elina [12.6K]

Answer:

class Main {  

 public static void main(String args[]) {

   for(int i=0; i<6;i++) {

       for(int j=0;j<i+1;j++) {

           System.out.printf("%d ",2*i+1+2*j);

       }

       System.out.println();

   }

 }

}

Explanation:

You will need two nested loops for sure.

For the exact assignments of variables, many flavors of the solution exist, this is just one possible option.

3 0
3 years ago
Other questions:
  • The design activity key question, "how will this system interact with other systems..." is part of which design activity?​
    7·1 answer
  • Write a class called Counter that represents a simple tally counter, which might be used to count people as they enter a room. T
    9·1 answer
  • What is the generic term for a mode or method of malware infection?
    8·1 answer
  • Suppose that x = 1565.683, y = 85.78, and z = 123.982. What is the output of the following statements? cout &lt;&lt; fixed &lt;&
    8·1 answer
  • You cannot legally install macOS on a PC that originally came with Windows<br> True or false
    13·2 answers
  • The school tie is made from a piece of fabric measuring 135cm long by 9cm wide. The fabric is supplied in a roll that is 90mm wi
    14·1 answer
  • What is a frame injection attack in a wireless network?
    13·2 answers
  • I need a C++ program to ask the user to put in different numbers until zero is pressed then the program counts the numbers that
    10·1 answer
  • Write a method named removeDuplicates that accepts as a parameter a List of integers, and modifies it by removing any duplicates
    7·1 answer
  • What is the term for delivering an application over the internet called?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!