1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
12345 [234]
3 years ago
6

Provide 10 points for each question

Computers and Technology
1 answer:
Eddi Din [679]3 years ago
6 0

Answer:

1- Saudi arabia

Explanation:

You might be interested in
Currently James’s company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. How
icang [17]

Answer:

Terminal Access Controller Access Control System (TACACS+)

Explanation:

Terminal Access Controller Access Control System (TACACS+) can be used as an upgrade to RADIUS (Remote Authentication Dial-in User Service) for AAA (Authentication Authorization Accounting) services to connect wireless users to the Windows Active Directory domain.

TACACS+ is a Cisco-based wireless network that uses Transmission Control Protocol (TCP) and provides separate authentication, authorization and accounting services for users in bigger networks.

TACACS+ uses TCP port 49 while RADIUS uses UDP port 1812 and 1813.

3 0
4 years ago
1. How can you help prevent being a target of cyberbullying?
zheka24 [161]
1. stand up for yourself, keep your socials on private and only accept for your close friends and relatives.

2. screenshot and print out evidence, show to a trusted adult and even you can take legal action.
5 0
3 years ago
Read 2 more answers
An app builder has created a report for sales people to view records from the custom object, some users have complained that the
a_sh-v [17]

Answer:

Check sharing rules

Check organization-wide defaults

Check the user s profile for object settings

Explanation:

There is a need for some people to see the total transparency of the records that are meant to be shared with a select group of people. There are certain things that can be done for this. The first one is that the sharing rules should be checked. To whom are the details shared with. The next one is the filters that are used.

These can be reported and changed accordingly. Lastly, the whole organization’s defaults can be checked. This is something that can be done when the previous methods that were done did not work that well. Once some changes are done, the people can check if they already work and if the records can be viewed.

6 0
4 years ago
Derek has an interest in designing video games. What requirements should he fulfill to be a game designer?
dolphi86 [110]
Compooter science :D
3 0
3 years ago
Which term is defined as a spreadsheet file?<br> cell<br> column<br> sheet<br> workbook
joja [24]
The answer for this question is sheet.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Apps are A. small, downloadable software programs that can run on tablet devices or smartphones. B. programs that can be used to
    11·1 answer
  • Select all examples of good keyboarding technique.
    13·2 answers
  • The Loanable Funds Market is built very similar to the Supply &amp; Demand Model. The Loanable Funds Market relates ____________
    14·1 answer
  • You can perform an in-place upgrade to Windows 7 from both Windows XP and Windows Vista
    10·1 answer
  • What is the output?
    6·2 answers
  • Peer collaboration helps develop critical-thinking skills, which is the ability to
    9·2 answers
  • What does this mean?​ pls help me
    12·1 answer
  • Heeeeeeeeeeeeeeeeeeelp plz
    11·1 answer
  • PROGRAM LANGUAGE C
    5·1 answer
  • Jane wants to type a math assignment involving percentages she wants to insert the percent symbol after typing a number which ke
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!