Answer:
I. Improper cable installation.
II. Interference between the signals on cables close to each other.
III. Improper connection of a network cable to the jack
Explanation:
The standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. Thus, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.
In this scenario, Mark is unable to connect to the internet or to any of the computers on his network, while nearby computers don’t have this problem. Therefore, the three issues which could be causing the problem are;
I. Improper cable installation: this involves not installing the ethernet cable in the correct destination port.
II. Interference between the signals on cables close to each other: interference usually results in the disruption in network signals.
III. Improper connection of a network cable to the jack: the right connectors such as RJ45 should be used.
Answer:
Assembly line.
Explanation:
The interchangeable parts was a game-changing concept for the manufacturing industry during the Industrial Revolution.
It was first introduced by Eli Whitney, also the inventor of the Cotton Gin, and later was perfected by Henry Ford, who was the first to create a continuous moving assembly line. The Interchangeable parts are identical pieces created from a master model and are so similar to each other, that they can fit into any line of production of the same kind.
Thanks to these advances, the manufacturing process across all industries could be now faster, more cost-efficient, and profitable.
Answer: ....
If one load balancer fails, the secondary picks up the failure and becomes active. They have a heartbeat link between them that monitors status. If all load balancers fail (or are accidentally misconfigured), servers down-stream are knocked offline until the problem is resolved, or you manually route around them.
Explanation:
Load balancing is a technique of distributing your requests over a network when your server is maxing out the CPU or disk or database IO rate. The objective of load balancing is optimizing resource use and minimizing response time, thereby avoiding overburden of any one of the resources.
The goal of failover is the ability to continue the work of a particular network component or the whole server, by another, should the first one fail. Failover allows you to perform maintenance of individual servers or nodes, without any interruption of your services.
It is important to note that load balancing and failover systems may not be the same, but they go hand in hand in helping you achieve high availability.
9. C
10. B
Hope this helps!
Answer:
Eve is employing a <u>chosen-ciphertext attack.</u>
Explanation:
Encryption is a strategy employed in the cyber world to allow sensitive and private data to be unreadable in the form of text or make the content of the data inaccessible by intruders. This is imperative to guard data and can only be accessed with the use of a key (password). Whoever has the authorized key could get access to the data thereby making the encrypted data readable in the process called Decryption.
The Ciphertext is a term used to explain data encrypted in the form of text.
When Eve tricked Alice into decrypting a bunch of ciphertexts, she was interested in having the general public key or private key depending on what she wants to get access to which makes it a chosen-ciphertext attack. Usually, these keys are in algorithm formats with long characters. When the chosen-ciphertext is analyzed by Eve, then she could guess the user secret key.