1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
taurus [48]
2 years ago
14

1. The running configuration is also known as the _____________ (Select Two) a. Startup config b. Working configuration c. Curre

nt configuration d. Backup configuration
Computers and Technology
1 answer:
Shtirlitz [24]2 years ago
6 0

Answer:

1. The running configuration is also known as the <u><em>b. working configuration</em></u>

<u><em>c. current configuration</em></u>

Explanation:

hopes this help (:

You might be interested in
Randy is concerned about his company’s data security on the Internet. Because cellular signals are not encrypted, he is concerne
vovikov84 [41]

Answer:

Randy should deploy SSH to allow the sales department to connect to the company network securely over cellular data signal.

Explanation:

Option A is the correct answer because SSH means Secure Shell. And Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Any network service can be secured with SSH

Option B is not correct because VPN mean virtual private network. And what VPN does is to extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

Option C is not correct because IMEI means International Mobile Equipment Identity and is a number that is use to uniquel identify 3GPP and iDEN mobile phones, as well as some satellite phones.

Option D is not correct because POP3 is an example of email protocol. Post Office Protocol version 3 (POP3) is a standard mail protocol used to receive emails from a remote server to a local email client. POP3 allows you to download email messages on your local computer and read them even when you are offline.

4 0
3 years ago
Sarah has entered data about football players from team A and team B in a worksheet. She enters names of players from team A wit
deff fn [24]
I believe the answer is freeze pane view

7 0
3 years ago
Read 2 more answers
If a computer reboots itself on its own the computer might have a(n)
MissTica

Answer:

D. Software Problem

Explanation:

It could be that the software is bootlooping which will power on and off until its fixed.

4 0
3 years ago
A leading pharmaceutical company is launching a major transformation of its entire Cloud operations in order to more quickly and
klasskru [66]

This is a great move for the Pharmaceutical company for a number of reasons.

  • The first and perhaps most important advantage is to the company is that costs relating to Information and Technology (IT) Infrastructure will be reduced to the barest minimum. As a start-up, it is important to keep costs as low as possible. Costs are kept low because the organization will not need to pay the added energy and personnel-related costs of maintaining an elaborate IT infrastructure.

  • The advantage of scalability. Scalability in this sense simply means the ability to take on additional workload or adjust to market demand. As the company grows and attracts more clients, it would need to expand beyond the capacity that it had at the onset. Opting for Cloud as a Service (CaaS) gives them this advantage.

  • Another way CaaS can help the client is that they enjoy the advantage of Business Continuity. Business Continuity is the ability to remain in business regardless of disruptions to the business itself at one location. This is because CaaS providers are structured in such a way that they are able to keep their subscribers in operation regardless of any disasters.

Other advantages to this client are:

  1. Ease and access of automatic updates to the system;
  2. Ease of collaboration between internal and external users of the same system.

Learn more about the merits of Cloud as a Service here:

brainly.com/question/24705780

4 0
2 years ago
What function does a security certificate perform
Mrac [35]
A security certificate is used to ensure that your web browser and the server you are connected to have a tamper-free, secure connection. 
7 0
3 years ago
Read 2 more answers
Other questions:
  • Write a recursive method public static String reverse(String str) that computes the reverse of a string. For example, reverse("f
    6·1 answer
  • P3. In Section 4.2 , we noted that the maximum queuing delay is (n–1)D if the switching fabric is n times faster than the input
    8·1 answer
  • Think back over the information presented in the lesson about how you can skillfully use the Internet when doing research. Selec
    14·1 answer
  • On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
    15·1 answer
  • A method that receives a two-dimensional array uses two ____ pairs following the data type in the parameter list of the method h
    11·1 answer
  • 4. Write an appropriate comment for describ-
    11·1 answer
  • How do I modify objects in power point 2016 for an assignment
    11·1 answer
  • Choose all stages of the information processing cycle.
    12·2 answers
  • Imagine you were going to use a dedicated workstation for an animation job rather than a personal PC or the all-purpose PCs you
    5·1 answer
  • How many different textile items would you find at a festival? (please list 5 items)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!