Answer:
a. grep 'b[au]nk$' myLine
Explanation:
grep is a command used for searching a specified pattern in a given text.
Our goal is to match the character sequence - bank or bunk at the end of line in a given line referenced by myLine.
The regular expression for the specified match criterion is:
b[au]nk$
The second character can be either a or u.
$ indicates match at end of line.
So the overall grep command is :
grep 'b[au]nk$' myLine
Answer: Between Layers 2 and 3
Explanation:
In between Layer 2 and Layer 3 the MPLS header is present and is known as Shim header. It is also said to be in 2.5.
Answer:
Explanation:
To develop the model for Creating the supertype/subtype relationship three diffrent types of notation is given bellow accrdig to the diagram attached.
1.Traditional EER (Enhance Entity-Relational) notation
2.Microsoft Visio notation
3.Subtypes Inside supertype note
<em><u>Traditional EER(Enhance Entity-Relational)notation for the international school of technology diagram is attached bellow</u></em>
The diagram consist of the following entity
Room Supertype
Media Entity Type
COURSE entity type
Section weak entity type
Schedule associatiative entity type
<u><em>Microsoft Visio Notation for the international school of technology is ashown in the diagram bellow.</em></u>
The diagram consist of the following entity
Room Supertype
Media Entity Type
Computer entity type
Instructor entity type
Time slot entity type
<u><em>Subtype Inside Supertype note Notation for the international school of technology is shown in the diagram bellow.</em></u>
The diagram consist of the following entity
Room Supertype
Media Entity Type
Computer entity type
Instructor entity type
Time slot entity type
Answer:
You can perform the following two steps
Explanation:
- Have the user press the appropriate function key combination to enable the wireless radio and then attempt to connect to the wireless network (since by mistake he could have disabled it).
- Ask the user to turn on the laptop’s airplane mode and attempt to reconnect to the wireless network (this mode basically what it does is disable adapters and activate it will connect the Wi-Fi network).
Answer:
The correct answer is option (D) Identify the impact on safety of the property
Explanation:
Solution
In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.
Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.
Example of property can be software, equipment, facilities, company’s assets.