Answer: Well known ports 
Explanation:
 DHCP server transmit the response to the dynamic host configuration server protocol (DHCP) clients. DHCP default port is 67 and its port number is greater than the user data-gram specific port. 
FTP server has its default listen at port 21 and file transition protocol(FTP) uses two transmission control protocol(TCP) connection for communication in the network. FTP passes information in port number 21, which is only used to send control information. 
Well known port are use to identify the service of network on the public internet and private internet network. Therefore, port 21 and 67 are the well known ports. 
  
 
        
             
        
        
        
hey 
I'm going to college for game design.
one of the best languages and the one I'm studying in is c# it is used in unity and many other game engines but there are many more. Just to list a few c++, Java, and many more it is up to you. if you would like more info about this just let me know By the way what game are you planning to make that is one of the most important factors 
Hope this helps 
-scav
 
        
             
        
        
        
OSHA (the Occupational Safety and Health Administration) is a part of the US Department of Labor that establishes, issues, and enforces national workplace safety regulatio…ns. These are designed to make job areas and practices safer for US workers.
        
             
        
        
        
Answer:
Dubbed “El Capitan,” the supercomputer is part of the Exascale Computing Project, a DOE effort to increase computing power so that the department can run highly advanced simulations and modelling of the United States' nuclear arsenal. These simulations help alleviate the need for underground testing.
 
        
             
        
        
        
Answer:
3. WiFi Protected Access 2
Explanation:
Given that Wi-Fi Protected Access 2 often referred to as WAP 2 is a form of computer security or privacy measure to ensure that Wireless networks are furnished with powerful security of data network access control.
 Hence, when a user employed or utilize WPA2. It gives such a user a high degree of maximum certainty of controlling the users that can have access to his wireless network.
Hence, in this case, what is put in place to stop such activity is Wi-Fi Protected Access 2