Answer:
Structured Documents
Explanation:
Structured Documents consist of hierarchy in the files. They may include data files. HTML (Hyper-text markup language) documents and XML (Extensible Markup Language) applications are the examples of Structured Documents.
Answer:
- limitation and control of network ports, protocols and services.
- Continuous vulnerability assessment and remediation.
Explanation:
The TCP or transmission control protocol is a layer 4 protocol (transport), that reliably transports packets in sequential segments to an application in the destination computer, using the ip address and the port number of the application.
The ICMP sent during the TCP/ip activities, can render the network vulnerable to attacks. limitation and control of the network ports, protocols and services and continuous assessment would mitigate the vulnerability of the TCP/ip model.
Answer:
b. False
Explanation:
When Liam went to print his presentation, the boot process established the connection to the printer, sent the presentation to the printer, and let other software know the printer was busy. It is a false statement.
Answer:
Margin of Error=M.E= ± 0.0113
Explanation:
Margin of Error= M.E= ?
Probability that watched network news programs = p = 0.4
α= 95%
Margin of Error =M.E= zₐ/₂√p(1-p)/n
Margin of Error=M.E= ±1.96 √0.4(1-0.4)/7200
Margin of Error=M. E = ±1.96√0.24/7200
Margin of Error=M. E- ±1.96* 0.005773
Margin of Error=M.E= ±0.0113
The Margin of Error is the estimate of how much error is possible as a result of random sampling.