answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondor19780726 [428]
2 years ago
7

Var name = prompt("Enter the name to print on your tee-shirt");

Computers and Technology
1 answer:
Vinil7 [7]2 years ago
3 0

Willy Shakespeare has 17 characters. It's higher than 12,so the output will be Too long. Enter a name with fewer than 12 characters.

Letter a.

You might be interested in
Assume that a program uses the named constant PI to represent the value 3.14. The program uses the named constant in several sta
mihalych1998 [28]

Answer:

The advantage for the above condition is as follows:-

Explanation:

  • If a user creates a defined constant variable and assigns a value on its and then uses that variable instead of the value, then it will a great advantage.
  • It is because when there is a needs to change the value of that variable, then it can be done when the user changes the value in one place. There is no needs to change the vale in multiple places.
  • But if there is a value in multiple places instead of a variable and there is no constant variable, then the user needs to change the value in multiple places.
7 0
2 years ago
When configuring a record type, an App Builder can configure the available value of a picklist field for the page layout. Which
Alla [95]

Answer:

Option (B) and (D) i.e., Type and Lead Source is the correct answer.

Explanation:

Because when the user configures the record type, Then, they can help that user to configure the value of the picklist fields for the page layout. So, The type and the lead source opportunity is available for the standard field that configure straightly in the type of record. That's why the following option is correct.

7 0
1 year ago
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and
gogolik [260]

Answer and explanation:

Authentication:

authentication can be done by using the user id and password, by using social sign in  or by using the biometrics. Authentication means verify the user who they claim they are and to grant them access.  

Authentication works as follows:  

Prompting the user to enter the credentials.  

Send the credentials to the authentication server.  

Match the credentials.  

Authorize the user and grants the acces

External Website security:  

External Website security is important to protect the website from hackers, electronic thieves and to prevent security breach.  

Use of firewall.  

Implement the access control.  

Use of MVC (Model View Controller) to create different view for different type of user.  

Use of encryption.  

Use of SSL certificate.

Use of security plugins.  

Implement tools and techniques for backup and disaster recovery.  

Use of network monitoring team.  

Internal Website security:  

Use of authentication to identify the user identity.  

Use of authorization to provide different user with the specific privileges and access.  

Encrypt or hide sensitive web pages.  

By implementing IT policies.  

Educate the user about the website.  

Remote Access Solution:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway (single tenant or multi-tenant):

VPN(Virtual private network), BGP(Border gateway protocol), hyper-V network can be used to provide the remote access.  

Remote access can be provided by simple configuration. Remote access involves enabling user, managing their access, protecting the assets, use of remote desktop protocol and managing server sessions, remoteApp and personal and pooled desktop.  

Firewall and Basic rules recommendations:  

Firewall is important for managing the traffic and providing external website security.  

Rules to prevent SQL injection and XSS.  

Allow only the specific type of traffic.  

Use access rules for IP security.  

Implement certain IT policies.  

Can implement their own rule.  

Wireless Security:  

Nowadays Wifi is being used in every organization and it prevents the network from malicious and unauthorized access.  

Wireless security can be provided by the use of encryption, decryption, authentication and authorization.  

VLAN configuration:  

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

In the following manner VLAN can be configured for web interface:  

Switching => VLAN => Advanced => VLAN Membership  

Switching => VLAN > Advanced => Port PVID Configuration.  

VLAN web filtering:  

VLAN can be configured between router and firewall, router and gateway, router and switch and by doing so one can filter the web traffic that passes the network.  

Laptop Security Configuration:  

Use of password, VPN and registering the laptop by their MAC address will provide laptop security. Use of security tool for local machine is also a good option. Use of device level authentication by using local username and password is also a good idea.  

Application policy recommendations:  

Application policy includes use of cookies, social media integration, access control, generating notifications and implanting other organization and IT rules.  

Security and privacy policy recommendations:  

It includes the list of security methods to be implemented for traffic filtering, IP spoofing, user authentication and other specific policy for the website.  

Intrusion detection or prevention for systems containing customer data:  

IPS is implemented behind the firewall and it matches the incoming traffic against the security policies. It matches the signature and handles the intrusion if any and generates the log and alerts for the same.  

IDS goal is to identify malicious traffic before it can proceed further into the network. It generates alerts and notification so that the network monitoring team can look after the intrusion.  

Use of anomaly based detection and prevention system is the better choice.

6 0
2 years ago
.13 LAB: Library book sorting Two sorted lists have been created, one implemented using a linked list (LinkedListLibrary linkedL
Gre4nikov [31]

Answer:

linkedListOperations = linkedListLibrary.InsertSorted(currNode, linkedListOperations); // this is right

linkedListLibrary.InsertSorted(currNode, linkedListOperations);  // half right, it count how much operation but it doesn't store it anywhere in main.

vectorOperations = vectorLibrary.InsertSorted(tempBook, vectorOperations);  // this is right

vectorLibrary.InsertSorted(tempBook, vectorOperations); // half right, it count how much operation but it doesn't store it anywhere in main.

cout << "Number of linked list operations: " << linkedListOperations << endl;

cout << "Number of vector operations: " << vectorOperations << endl;

Explanation:

The first, you are calling InsertSorted with linkedListLibrary and than you can store the number of operation inside the "linkedListOperations" variable. Then you do the same with vectorLibrary.

7 0
2 years ago
) Consider a router that interconnects four subnets: Subnet 1, Subnet 2, Subnet 3 and Subnet 4. Suppose all of the interfaces in
erik [133]

Answer:

Check the explanation

Explanation:

223.1.17/24 indicates that out of 32-bits of IP address 24 bits have been assigned as subnet part and 8 bits for host id.

The binary representation of 223.1.17 is 11011111 00000001 00010001 00000000

Given that, subnet 1 has 63 interfaces. To represent 63 interfaces, we need 6 bits (64 = 26)

So its addresses can be from 223.1.17.0/26 to 223.1.17.62/26

Subnet 2 has 95 interfaces. 95 interfaces can be accommodated using 7 bits up to 127 host addresses can represented using 7 bits (127 = 27)

and hence, the addresses may be from 223.1.17.63/25 to 223.1.17.157/25

Subnet 3 has 16 interfaces. 4 bits are needed for 16 interfaces (16 = 24)

So the network addresses may range from 223.1.17.158/28 to 223.1.17.173/28

4 0
2 years ago
Other questions:
  • my headphones have a mic and the mic and headset don't work at the same time what do i do to make them work together
    8·2 answers
  • Splunk uses ________ to categorize the type of data being indexed..
    11·2 answers
  • When long labels are required, which of these commands can you use to improve readability of a worksheet?
    14·2 answers
  • What are the arguments for writing efficient programs even though hardware is relatively inexpensive?
    10·1 answer
  • Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual dev
    9·2 answers
  • What kinds of unstructured data or big data might the BITS corporation want to gather in the future? What kind of devices might
    14·1 answer
  • 1. Show that the three security services-confidentiality, integrity, and availabilty- are sufficient to deal with the threats of
    10·1 answer
  • Translate the following MIPS code to C. Assume that the variables f, g, h, i, and j are assigned to registers $s0, $s1, $s2, $s3
    8·1 answer
  • For a class project, Jerome builds a simple circuit with a battery and three light bulbs. On his way to school, Jerome drops his
    9·1 answer
  • Amanda a recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter wher
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!