1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
poizon [28]
2 years ago
11

Define the terms network, LAN, WAN, and Internet.

Computers and Technology
1 answer:
STatiana [176]2 years ago
3 0

Answer:

1. A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications.

2. A local area network is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.

3. A wide area network is a telecommunications network that extends over a large geographic area for the primary purpose of computer networking.

4.a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

You might be interested in
URLs are the global ______ of resources on the Internet.
adell [148]
I believe the answer might be addresses 
 <span />
4 0
3 years ago
Read 2 more answers
World pade is world processing software true or false​
Evgesh-ka [11]

Answer:

yes

Explanation:

5 0
2 years ago
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
jarptica [38.1K]

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

6 0
3 years ago
Which layer of the OSI model do network administrators typically check first when issues arise?
bazaltina [42]

Answer:

B

Explanation:

Typically I check the physical layer to ensure that the nodes are plugged accordingly.

4 0
1 year ago
When a machine is having issues, an IT Support Specialist has to file an RMA, or Return Merchandise Authorization form, with the
melamori03 [73]

Answer:

The answer is "Option b"

Explanation:

This method is also known as the model is continuously developed, evaluated, applied and enhanced. It enables firms to manage transactions with its all-out returns, they can be used to calculate the final 7 digits of the Online charge level, and the wrong option can be described as follows:

  • In option a, It first find then arranging all the data.  
  • In option c, It provides essential updates and saves into the file.
  • In option d, It is an ideal plan for a lifetime operation.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which statement describes the word "iterative"?
    7·2 answers
  • If you know about 3D printers could you help me fix mine?
    8·1 answer
  • An expression that has correctly paired delimiters is called a(n)
    6·1 answer
  • Write a method so that the main() code below can be replaced by the simpler code that calls method mphAndMinutesToMiles(). Origi
    6·2 answers
  • Write a program that determines a student's letter grade. Allow the user to enter three test scores. The maximum score on each t
    9·1 answer
  • When discussing the data-modeling building blocks, anything (a person, a place, a thing, or an event) about which data are to be
    15·1 answer
  • What is the major benefit Smartphones and tablet computers have had on social media?
    9·1 answer
  • Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,050,
    14·1 answer
  • In one to two sentences, describe how you would add a new slide to your presentation.
    11·2 answers
  • What is the complete path and filename of the file where ports and their associated protocols are defined
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!