1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
3 years ago
10

Are there protections for people in terms of what data can be collected by different sites?

Computers and Technology
1 answer:
s2008m [1.1K]3 years ago
8 0
Yes , usually before you sign up for a website or app it will warn you and tell you what the app or website will have access to and what will gained through using the website or app
You might be interested in
What are the disadvantages of a server-based network? -lack of centralized network security - need for a network administrator -
tigry1 [53]

Answer:

The server-based network has some disadvantages such as hardware-accelerated which is affordable. Effective operating system with a network. Requires a dedicated system administrator.

Explanation:

  • When one of the databases drops south all the people are being affected and the whole network can even be downgraded.
  • Costlier to set up and maintain.
  • Expensive: - The expensive server hardware equipment, database software platforms, and network installation can require significant source host and system administrator.
  • Administrating:-  Appears to require continual servicing by the system administrator and admin must behave with the relevant skills to preserve also that network infrastructure tracking is an important requirement.
  • Server Failure: - The complete functionality of the system is hosting events. If the server crashes, the whole system will go away even though all the customers rely solely on the computer.
  • Heavy Traffic:- The server is the infrastructure for managing entire elements of the organization that offer the server overload. Internet traffic will be even more relevant as the customer must start their contact session from boot time to disconnect. System routing must be properly maintained otherwise it tends to lead this same computer as a crowded state or the standard processes will be affected.
5 0
3 years ago
1. It is a requirement to install a routing protocol that monitors the network for routers that have changed their link state. T
Nady [450]

Answer:

1. Open Shortest Path First (OSPF)

2. Border Gateway Protocol (BGP)

3. Routing and Remote Access Service (RRAS)

4. Frame relay

5. Synchronous

6. Virtual

7. Committed Information Rate (CIR)

8. Integrated Services Digital Network (ISDN)

9. Asynchronous Transfer Mode (ATM)

10. Basic Rate Interface (BRI).

8 0
3 years ago
Computer Networks - Queues
lyudmila [28]

Answer:

the average arrival rate \lambda in units of packets/second is 15.24 kbps

the average number of packets w waiting to be serviced in the buffer is 762 bits

Explanation:

Given that:

A single channel with a capacity of 64 kbps.

Average packet waiting time T_w in the buffer = 0.05 second

Average number of packets in residence = 1 packet

Average packet length r = 1000 bits

What are the average arrival rate \lambda in units of packets/second and the average number of packets w waiting to be serviced in the buffer?

The Conservation of Time and Messages ;

E(R) = E(W) + ρ

r = w + ρ

Using Little law ;

r = λ × T_r

w =  λ × T_w

r /  λ = w / λ  +  ρ / λ

T_r =T_w + 1 / μ

T_r = T_w +T_s

where ;

ρ = utilisation fraction of time facility

r = mean number of item in the system waiting to be served

w = mean number of packet waiting to be served

λ = mean number of arrival per second

T_r =mean time an item spent in the system

T_w = mean waiting time

μ = traffic intensity

T_s = mean service time for each arrival

the average arrival rate \lambda in units of packets/second; we have the following.

First let's determine the serving time T_s

the serving time T_s  = \dfrac{1000}{64*1000}

= 0.015625

now; the mean time an item spent in the system T_r = T_w +T_s

where;

T_w = 0.05    (i.e the average packet waiting time)

T_s = 0.015625

T_r =  0.05 + 0.015625

T_r =  0.065625

However; the  mean number of arrival per second λ is;

r = λ × T_r

λ = r /  T_r

λ = 1000 / 0.065625

λ = 15238.09524 bps

λ ≅ 15.24 kbps

Thus;  the average arrival rate \lambda in units of packets/second is 15.24 kbps

b) Determine the average number of packets w waiting to be serviced in the buffer.

mean number of packets  w waiting to be served is calculated using the formula

w =  λ × T_w

where;

T_w = 0.05

w = 15238.09524 × 0.05

w = 761.904762

w ≅ 762 bits

Thus; the average number of packets w waiting to be serviced in the buffer is 762 bits

4 0
3 years ago
What sorts of routine, seemingly unimportant information would help you learn about or break into another company’s network?
tatuchka [14]

Answer and Explanation:

  • Reboot your Computer from which you need to break into.
  • With your remote Ethernet card embedded and the unprotected passageway will mate up in a flash. You likewise need to change the Service Set Identifier (SSID) on your Ethernet card to coordinate SSID on the system's passage. You can decide to physically constrain your DHCP settings to reestablish, however on the off chance that that gives you any trouble.we need to re-boot it.
  • The Third Man ran a sniffer program that caught the majority of the LAN traffic within this organization. It was transmitted through the remote passageway straight into the Third Man's PC. Passwords. Agreements. Email.
4 0
3 years ago
IVD. IIIcelTICISTUSTUSE LIICIULUI 1.12. Which of the two systems do you think will need the largest motor? Explain your answer.​
zhannawk [14.2K]
Transmission motor motor
8 0
3 years ago
Other questions:
  • Choosing firm goals for your business
    7·2 answers
  • Which is the correct formula to add the values in cells A1 and B1?
    11·2 answers
  • You have local administrative rights to your computer running windows 7. you cannot find some of the operating system files on y
    8·1 answer
  • Kim would like to have a simple method for entering data into a database. She should create a _____.
    14·2 answers
  • Match the characteristics to the mobile operating system that it describes.
    11·1 answer
  • Blending two or more colours is called​
    6·1 answer
  • If you can photoshop please text me i need help for my digital media class 7862381441
    9·1 answer
  • Identify when programmers use an Else statement.
    15·2 answers
  • WHATS 5X750 i really dont even know that questiob
    7·2 answers
  • Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ____.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!