Answer:
The answer is "Fiber Optic Cable".
Explanation:
In the given question options are defined, but in these options, there is some error.
The optical fiber cable is also known as internet wiring, which includes fiber strands inside an isolated housing. It is used to transferring data at a very high speed. This cable is developed for long-range data networking, high-performance connectivity, and multimedia, and other choices are wrong that can be described as follows:
- A modem is used to transmits data over a network, that's why it is wrong.
- Router is used to transport traffic between your computer and the internet, that's why it is wrong.
Answer:
1. active listening 8. an online journal
2. barrier 1. a strategy for showing other people you are interested in what they are saying and that you understand what they are saying and how they feel about it
3. blog 2. anything that interferes with a message being sent or received
4. communication 5. guidelines for courteous electronic communication
5. netiquette 7. the person who creates or composes a message and delivers it either orally or in writing
6. receiver 9.. a personal belief that one should work hard and do a good job
7. sender 3. an online database of Web pages that can be created or edited by anyone (with permission)
8. wiki 6. the person who receives a message
9. work ethic 4. an exchange of information
Explanation:
The answer is as mentioned above. And these are important words from subject Professional Communication. And like when we talk of an exchange of information, we mean communication. And similarly, other words means as being mentioned above.
Answer:
A closed port that can not receive request from authorized users.
Explanation:
Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.
Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.
DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.