Answer:
- limitation and control of network ports, protocols and services.
- Continuous vulnerability assessment and remediation.
Explanation:
The TCP or transmission control protocol is a layer 4 protocol (transport), that reliably transports packets in sequential segments to an application in the destination computer, using the ip address and the port number of the application.
The ICMP sent during the TCP/ip activities, can render the network vulnerable to attacks. limitation and control of the network ports, protocols and services and continuous assessment would mitigate the vulnerability of the TCP/ip model.
<span>ExpressCard modules and USB adapters are faster and smaller. They are easier to plug into a computer and allow a person to add memory, wired and wireless communications, multimedia, and security features by inserting the small card or adapter into a small slot in the computer.</span>
In java...
public boolean checkSquare(int n){
int actualNumber = n;
int squareRoot = (int)Math.sqrt(n);
int squaredNumber = Math.pow(squareRoot,2);
if(squaredNumber==actualNumber){
return true;
} else {
return false;
}
}
Answer:
I. hatching
II. filter
Explanation:
Sarah is creating an image. She wants to achieve tonal effects with parallel lines by varying their densities and distribution patterns. She will use <u>hatching</u> to do this. She also wants to add special effects on the image. Therefore, she will use <u>filters</u>.
Hatching refers to an art technique in which parallel lines are used to shade by drawing them closely together.
Stippling is an art technique used in the making of patterns by using small dots.
Filters is a technique of changing image characteristics. It is used to change the picture characteristics & to add special effects to an image such as the shade, contrast, tone, brightness etc.
We therefore see that, <u>hatching</u> and <u>filter</u> are the correct answers respectively