Answer:
- limitation and control of network ports, protocols and services.
- Continuous vulnerability assessment and remediation.
Explanation:
The TCP or transmission control protocol is a layer 4 protocol (transport), that reliably transports packets in sequential segments to an application in the destination computer, using the ip address and the port number of the application.
The ICMP sent during the TCP/ip activities, can render the network vulnerable to attacks. limitation and control of the network ports, protocols and services and continuous assessment would mitigate the vulnerability of the TCP/ip model.
If you want more blank white space around the text in a document, you should increase the margin. Correct answer: B
The margin is the area between the main content of a page (in this case that is the text) and the page edges. One-inch page margin is set automatically around each page. However, you can customize or choose predefined margin settings.
Answer:
Explanation:
import java.util.Scanner;
public class KboatTriangleAngle
{
public static void main(String args[]) {
Scanner in = new Scanner(System.in);
System.out.print("Enter first angle: ");
int a1 = in.nextInt();
System.out.print("Enter second angle: ");
int a2 = in.nextInt();
System.out.print("Enter third angle: ");
int a3 = in.nextInt();
int angleSum = a1 + a2 + a3;
if (angleSum == 180 && a1 > 0 && a2 > 0 && a3 > 0) {
if (a1 < 90 && a2 < 90 && a3 < 90) {
System.out.println("Acute-angled Triangle");
}
else if (a1 == 90 || a2 == 90 || a3 == 90) {
System.out.println("Right-angled Triangle");
}
else {
System.out.println("Obtuse-angled Triangle");
}
}
else {
System.out.println("Triangle not possible");
}
}
}
OUTPUT:
Answer:
Explanation:
In the newer versions of windows, there are a variety of sign-in methods, these include facial recognition, fingerprint scanner, username & password, or Microsoft email sign in. The choice is yours at the end of the Out-of-box experience which is the entire setup experience that the consumer has when first preparing the new windows installation on the computer that they have. Some of the options may require additional hardware on your PC such as a fingerprint scanner or a webcam for facial recognition.
Answer:
Following are the program in the Python Programming Language.
#set list type variable and initialize the elements
myPizza = ['Margarita', 'Capsicum and onion', 'Chicken']
#set variable and initialize the elements
frndPizzas = myPizza[:]
#append value in list variable
myPizza.append('Corn')
#append value in list variable
frndPizzas.append('paperica')
#print message
print("My pizzas are:")
#set the for loop and print elements of 1st list
for pizza in myPizza:
print(pizza)
#print message
print("\nFriend's pizzas are:")
#set the for loop and print elements of 2st list
for frndsPizza in frndPizzas:
print(frndsPizza)
<u>Output</u>:
My pizzas are:
Margarita
Capsicum and onion
Chicken Corn
Friend's pizzas are:
Margarita Capsicum and onion Chicken paperica
Explanation:
<u>Following are the description of the program</u>:
- Set a list data type variable that is 'myPizza' and initializes elements in it.
- Set another list data type variable that is 'frndPizzas' and initializes elements in it.
- Append one-one element in both of the list data type variables.
- Set the for loops to print the elements of both list data type variables.