The Correct answer would be C. <span>microphone,mouse,scanner
microphone you talk into to give info (data)
a mouse you use to click on objects to give input
a scanner you input a paper/object
hope this helps!! :)
</span>
Answer:
ngl why would i know this
Explanation:
The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.
<h3>What is the access control list?</h3>
An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.
Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.
Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.
Learn more about the access control list here:
brainly.com/question/13718195
#SPJ4
The
USMT (User State Migration Tool) is designed to assist IT professional migrate
files to the windows OS. An example is a step by step migration of files and
settings from a windows XP environment to windows 8 using USMT. At the end of the day, you will have
used
LoadState a
ScanState to complete this end to end migration. The correct
order is as follows;
<span><span>
1. </span>
Gather Data Using the ScanState Tool</span>
<span>a)
</span>Install USMT
<span>b)
</span>Run ScanState to Create a Migration Store on the
Server
<span>2.
</span>Install Windows
<span>a)
</span>Install Applications
<span>3.
</span>Apply Data Using the LoadState Tool
<span>a) </span>Install the USMT
<span>b) </span> Run LoadState
Answer:
The best way is 2 and the worst is 1
Explanation: