answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lorico [155]
2 years ago
15

Adrian has decided to subscribe to a new internet service. He wants a high-speed connection so he can stream video content smoot

hly. Which access technology should Adrian avoid using?
A:dial-up
B:ISDN
C:cable
Computers and Technology
2 answers:
Scilla [17]2 years ago
8 0

Answer:

A. dial-up

Explanation:

vichka [17]2 years ago
7 0
I believe the answer is A but then again it could be c because if u mess the cable cord up the internet will stop working 
You might be interested in
A(n) ____________________ is a named collection of stored data, instructions, or information and can contain text, images, video
Vanyuwa [196]
The answer in the blank is files for they exist in the computer that are responsible to hold or collect different types of application that could contribute in arranging them in order or showing classifications or simply storing them to put them in one place. This is essential to the computer for they are responsible in putting them in place and showing organization.
7 0
2 years ago
Read 2 more answers
It has been said that the quality of our relationships depends in large part on the quality of our
timurjin [86]

Answer:

people

Explanation:

6 0
1 year ago
Which of the following are recommended techniques for protecting computer files and data? Check all of the boxes that apply.
lara [203]
Hello <span>Pouerietzach


Question: </span><span>Which of the following are recommended techniques for protecting computer files and data? Check all of the boxes that apply.
</span><span>
Answer: A, B, D, E, G

Hope That Helps
-Chris</span>
5 0
2 years ago
Read 2 more answers
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and
gogolik [260]

Answer and explanation:

Authentication:

authentication can be done by using the user id and password, by using social sign in  or by using the biometrics. Authentication means verify the user who they claim they are and to grant them access.  

Authentication works as follows:  

Prompting the user to enter the credentials.  

Send the credentials to the authentication server.  

Match the credentials.  

Authorize the user and grants the acces

External Website security:  

External Website security is important to protect the website from hackers, electronic thieves and to prevent security breach.  

Use of firewall.  

Implement the access control.  

Use of MVC (Model View Controller) to create different view for different type of user.  

Use of encryption.  

Use of SSL certificate.

Use of security plugins.  

Implement tools and techniques for backup and disaster recovery.  

Use of network monitoring team.  

Internal Website security:  

Use of authentication to identify the user identity.  

Use of authorization to provide different user with the specific privileges and access.  

Encrypt or hide sensitive web pages.  

By implementing IT policies.  

Educate the user about the website.  

Remote Access Solution:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway (single tenant or multi-tenant):

VPN(Virtual private network), BGP(Border gateway protocol), hyper-V network can be used to provide the remote access.  

Remote access can be provided by simple configuration. Remote access involves enabling user, managing their access, protecting the assets, use of remote desktop protocol and managing server sessions, remoteApp and personal and pooled desktop.  

Firewall and Basic rules recommendations:  

Firewall is important for managing the traffic and providing external website security.  

Rules to prevent SQL injection and XSS.  

Allow only the specific type of traffic.  

Use access rules for IP security.  

Implement certain IT policies.  

Can implement their own rule.  

Wireless Security:  

Nowadays Wifi is being used in every organization and it prevents the network from malicious and unauthorized access.  

Wireless security can be provided by the use of encryption, decryption, authentication and authorization.  

VLAN configuration:  

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

In the following manner VLAN can be configured for web interface:  

Switching => VLAN => Advanced => VLAN Membership  

Switching => VLAN > Advanced => Port PVID Configuration.  

VLAN web filtering:  

VLAN can be configured between router and firewall, router and gateway, router and switch and by doing so one can filter the web traffic that passes the network.  

Laptop Security Configuration:  

Use of password, VPN and registering the laptop by their MAC address will provide laptop security. Use of security tool for local machine is also a good option. Use of device level authentication by using local username and password is also a good idea.  

Application policy recommendations:  

Application policy includes use of cookies, social media integration, access control, generating notifications and implanting other organization and IT rules.  

Security and privacy policy recommendations:  

It includes the list of security methods to be implemented for traffic filtering, IP spoofing, user authentication and other specific policy for the website.  

Intrusion detection or prevention for systems containing customer data:  

IPS is implemented behind the firewall and it matches the incoming traffic against the security policies. It matches the signature and handles the intrusion if any and generates the log and alerts for the same.  

IDS goal is to identify malicious traffic before it can proceed further into the network. It generates alerts and notification so that the network monitoring team can look after the intrusion.  

Use of anomaly based detection and prevention system is the better choice.

6 0
1 year ago
Write a code segment that uses an enhanced for loop to print all elements of words that end with "ing". As an example, if words
nadezda [96]

Answer:

 public static void main(String[] args) {

   String ing[] = {"ten","fading","post","card","thunder","hinge","trailing","batting"};

   for (String i: ing){

     if (i.endsWith("ing")){

       System.out.println(i);

    }

   }

 }

Explanation:

The for-loop cycles through the entire list and the if-statement makes it so that the string is only printed if it ends with "ing"

6 0
1 year ago
Other questions:
  • What is a ribbon in word
    15·2 answers
  • When preparing a spreadsheet that contains population data for different nations, what is the best way to provide a visual compa
    12·2 answers
  • How frequently should computers containing ehr information be backed up?
    14·1 answer
  • Theresa is a certified teacher. She just had a baby and would like to stay home, but still wants to teach. Which career would be
    11·2 answers
  • Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if
    13·1 answer
  • Mara's presentation included essential information about the company's new safety procedures. She wanted to make
    13·2 answers
  • Given an int variable k, an int array incompletes that has been declared and initialized, an int variable studentID that has bee
    10·1 answer
  • Which of the following is a true statement about cloud computing?
    6·1 answer
  • Write a program that has the following String variables: firstName, middleName, and lastName. Initialize these with your first,
    7·1 answer
  • A colleague sent you an awesome article about using proper ergonomics while sitting at the computer. You don't have time to read
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!