What are type of main protocol?

Answers

Answer 1
There are three main types of network protocols. These include network management protocols, network communication protocols and network security protocols:

Communication protocols include basic data communication tools like TCP/IP and HTTP.
Management protocols maintain and govern the network through protocols such as ICMP and SNMP.
Security protocols include HTTPS, SFTP, and SSL.

Hope this helps

Related Questions

True or false phishing is a type of social engineering

Answers

True being that phishing attacks email and etc

Answer: true

Explanation:

Question 3 of 25 In computer science, what is a developer? A. A person who organizes all the details of a project B. An individual who enjoys arranging meetings C. A person who builds and creates software applications OD. A team member who takes care of all the scheduling SUB​

Answers

Answer:

A person who builds and creates software applications

Explanation:

C++ HELP.
Write a complete program that gets two the lengths of each leg of a right triangle from the user and outputs the length of the hypotenuse. Remember the hypotenuse of a right triangle is obtained by taking the square of each side, adding those values together and taking the square root of the sum. Here is a sample run to illustrate what your output should look like:

Please enter the lengths of the two legs of a right triangle: 1.5 2.0
The hypotenuse of a right triangle with legs 1.5 and 2 is 2.5.

Copy paste your code in the text area and below your code copy paste the output for a sample run with the same inputs as above (1.5 and 2). Your output should exactly match the sample output above.

Answers

A complete program that gets two the lengths of each leg of a right triangle from the user and outputs the length of the hypotenuse is given below:

The Program

// C++ implementation of the approach

#include<bits/stdc++.h>

#include <iostream>

#include <iomanip>

using namespace std;

// Function to return the hypotenuse of the

// right angled triangle

double findHypotenuse(double side1, double side2)

{

   double h = sqrt((side1 * side1) + (side2 * side2));

   return h;

}

// Driver code

int main()

{

   int side1 = 3, side2 = 4;

   cout << fixed << showpoint;

   cout << setprecision(2);

   cout << findHypotenuse(side1, side2);

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Design a class template, Collection, that stores a collection of Objects (in an array), along with the current size of the collection. Provide public functions isEmpty, makeEmpty, insert, remove, and contains. contains(x) returns true if and only if an Object that is equal to x is present in the collection.

Answers

A class template, Collection, that stores a collection of Objects (in an array), along with the current size of the collection is given below:

The Program

using namespace std;

#include <iostream>

#include <iomanip>

#include <stdlib.h>

#include <string.h>

typedef struct _TDataStr

{

char * data;

int size;

} *TDataStr;

typedef struct _TDataStr DataStr;

#define DATA_STR_SIZE (sizeof(struct _TDataStr))

#define TDATA_STR_SIZE (sizeof(TDataStr))

#define MAX_COLLECTION_SIZE (1000)

typedef int (*CompareFuncCallback) ( TDataStr, TDataStr);

typedef

class Collection

{

private:

CompareFuncCallback compareFunc;

DataStr Array[MAX_COLLECTION_SIZE];

int count;

public:

Collection( CompareFuncCallback compareFuncCallback)

{

compareFunc = compareFuncCallback;

count=0;

memset(Array,0,MAX_COLLECTION_SIZE * DATA_STR_SIZE);

}

void SetCompareCallback (CompareFuncCallback compareFuncCallback)

{

compareFunc = compareFuncCallback;

}

int GetCount() { return(count);    }

bool IsEmpty() { return(count==0); }

void Clear()

{

count=0;

memset(Array,0,MAX_COLLECTION_SIZE * DATA_STR_SIZE);

}

int Insert ( TDataStr dataStr)

{

int iReturn=0;

if (count < MAX_COLLECTION_SIZE)

{

Array[count++] = *dataStr; //insertion takes place here

}

else

{

iReturn=-1;

}

return(iReturn);

}

bool IsValidIndex( int iIndexPos)

{

return( (iIndexPos>-1) && (iIndexPos<count) );

}

TDataStr IndexerGetIndexAt(int iIndexPos)

{

TDataStr dataStrReturn = NULL;

if (IsValidIndex(iIndexPos))

{

dataStrReturn = &Array[iIndexPos];

}

return(dataStrReturn);

}

int Remove (int iIndexPos)

{

int iReturn=0;

if (count==0)

{

iReturn=-1;

}

else

{

if (IsValidIndex(iIndexPos))

{

Complete code is in the txt file attached

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

write a function that gives the product of two numbers in c language​

Answers

Program to Multiply Two Numbers
printf("Enter two numbers: "); scanf("%lf %lf", &a, &b); Then, the product of a and b is evaluated and the result is stored in product . product = a * b; Finally, product is displayed on the screen using printf() .

Explanation:

printf("Enter two numbers: "); scanf("%lf %lf", &a, &b);

Then, the product of a and b is evaluated and the result is stored in product.

product = a * b;

Finally, product is displayed on the screen using printf().

printf("Product = %.2lf", product);

Notice that, the result is rounded off to the second decimal place using %.2lf conversion character.

How will "bad" instructions help to select the appropriate language? (1 point)

A. Instructions are not clear on what to do, instructions in the chosen language are too complex, or instructions do not actually accomplish
what they are supposed to.

B. This will increase the output of graphics on the screen.

C. Choosing a high-level language is always the right choice.

D.Language features have no effect on our problem.

Answers

Answer:

a

Explanation:

What type of computer program takes a high-level language and turns it into assembly code?

Answers

Answer: Compilers

Explanation:

Is cpu a computer brain. discuss?​

Answers

yes it is a computer brain

The CPU is the brain of a computer, containing all the circuitry needed to process input, store data, and output results. The CPU is constantly following instructions of computer programs that tell it which data to process and how to process it.

Which of the following statements are true in relation to the GDPR? Select all that apply.

Answers

The true statements are The amount of one currency that can be traded for a unit of another currency is the exchange rate. Many exchange rate floats or constantly change. It is best to travel abroad when the exchange rate gets you more units of a foreign currency. The correct options are A, B, and C.

What is GDPR?

The General Data Protection Regulation (GDPR) is an EU law regulation on data protection and privacy in the European Union and the European Economic Area.

A floating exchange rate is typically determined by the currency's demand and supply. As a result, it shifts.

Furthermore, it is best to travel abroad when the exchange rate provides you with more units of a foreign currency. This implies that the individual will have more money.

The exchange rate is the amount of one currency that can be traded for one unit of another currency.

Many exchange rates float or fluctuate constantly. When the exchange rate gives you more units of a foreign currency, it is best to travel abroad.

Thus, the correct options are A, B, and C.

For more details regarding GDPR, visit:

https://brainly.com/question/27416494

#SPJ1

Your question seems incomplete, the missing part of question is attached below:

The first step in Threat Modeling is to

Answers

Explanation:

Decompose the application

What Is Used To Identify Spelling errors in the document?

Answers

Answer: Spell check

Explanation: Spell check identifies and corrects misspelled words. It also allows you to search a document yourself for words you've misspelled.

In Python, the expression “a ** (b ** c)” is the same as “(a ** b)

Answers

Answer: False

Explanation: When two operators share an operand and the operators have the same precedence, then the expression is evaluated according to the associativity of the operators. For example, since the ** operator has right-to-left associativity, a ** (b ** c) = a ** b ** c. While on the other hand, (a ** b) = a ** b.

What type of software allows users to perform general purpose tasks, like web browsing, typing documents, or gaming?


application software


utility software


system software


antivirus software

Answers

The first one, application
System software !!
!!!!!!!!!!!!

Describe the functional components of computer system

Answers

The different components of computers are as follows:

1. Input Unit: These are very essential parts of computers. These are used by us to feed the input into the computers. For example, a mouse, keyboard, and joystick are the input devices.

2. Output Unit: These output units are used to get output from the computers. When we give input the computer process it and then gives output by the output units.

Ex: Monitor, printer

3. Storage: These are used to store the data in the computers. Examples are hard disk, pen drive, compact disc

4. Central Processing Unit: The CPU is also called as brain of computers. It is responsible for every operation on the computer.

5. Arithmetic logic unit: It processes the arithmetic operations in the computer.

You want to save a file to your desktop so no one will be able to you to make changes what do you use copy or move

Answers

Answer:

Copy

Explanation:

Enter a formula in cell M7 using the VLOOKUP function to find an exact match for the department abbreviation. Look up the department abbreviation (cell M6) using an absolute reference, search the staff table data (the range A6:J13) using an absolute reference, and return the department name (the 2nd column).

Answers

The VLOOKUP function is used in the calculation in cell M7 to get a precise match for the department's abbreviation.

What is VLOOKUP function?

Vertical Lookup is referred to as VLOOKUP. It is a function that instructs Excel to look in a column (the so-called "table array") for a specific value in order to retrieve a value from another column in the same row.

Search the staff table data (the range A6:J13) using an absolute reference, find the department abbreviation (cell M6), and then return the department name (the second column):

M7 = VLOOKUP($M6, $A6, $J13, 2, FALSE)

As inputs, VLOOKUP accepts:

1. The value to match - in this case, we're using an absolute reference for cell M6.

2. The table array range where the value should be found - in this case, we use an absolute reference for the staff table (the range A6:J13)

The column value that will be returned in this case is the department name (2nd column)

Exact match is used in this case rather than an approximate match (FALSE)

The first column of the table's first row, A6:J13, contains the precise value in cell M6 of the VLOOKUP search, which returns the second column value for the matched row and stores it in cell M7.

Learn more about VLOOKUP :

https://brainly.com/question/14567875

#SPJ1

A database management system (DBMS) is important to modern organizations because:

Answers

Answer: It is important for both the generation and maintenance of data, take apple, for example, they use a DBMS to manage any incoming data, organize it, and that DBMS also allows the data to be modified or extracted by other users of the DBMS.

Explanation:

In the space below, explain how you can access the character map in Word 2019 using a complete sentence.

Answers

To access the Character Map and see the characters available for a specific font style, click on the Windows or Start button.

What is character map?

Character Map is a utility that comes with Microsoft Windows operating systems that allows you to view the characters in any installed font, check what keyboard input is used to enter those characters, and copy characters to the clipboard instead of typing them.

Click the Windows or Start button to open the Character Map and see the characters available for a specific font style.

Clicking on the Programs submenu, then the Accessories submenu, then System Tools, and finally the Character Map item under the System Tool bar to showcase the Character Map Application from which protagonists are copied and pasted in Word 2016.

Thus, this way, one can access the character map in Word 2009.

For more details regarding a character map, visit:

https://brainly.com/question/15697415

#SPJ1

Information illegally or do damage is known as in IT

Answers

A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a Hacker.

Who is a Hacker?

A hacker is someone who utilized their knowledge to break into someone else's computers in order to steal information or do harm.

Although the phrase initially referred to a shrewd or knowledgeable coder, it is today more frequently used to describe someone who can access other computers without authorization.

Hacking. In computer science, the term hack implies to use a computer or other technological equipment or system to be able to get an  into an unauthorized system to data owned by another person or organization.

Therefore, based on the above, A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a Hacker.

Learn more about Hacker from

https://brainly.com/question/23294592
#SPJ1

A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a


The fixed cost of $6 million in the Acme problem is evidently not large enough to make Acme abandon the product at the current time. How large would the fixed cost need to be to make the abandon option the best option?

Answers

The fixed cost would have to be greater than 7083 for the option abandoned to be the best one.

How to solve for the size of the fixed cost

We would have to find the expected value that would make ACME to abandon this project at this particular current time.

We have the expected value to be:

value at node after decision -fixed cost <0

using the values that we have in the diagram, we would have:

10800*0.45+5400*0.35+1620*0.2 < the fixed cost

= 4869 +1890 + 324

= 7083

7083  > Fixed cost

From the calculation that we have here, the fixed cost would have to be larger than 7083.

Read more on fixed cost here:

https://brainly.com/question/3636923

#SPJ1

complete question

The fixed cost of $6 million in the Acme problem is evidently not large enough to make Acme abandon the product at the current time. How large would the fixed cost need to be to make the abandon option the

best option? Enter your answer in $1,000s.

in quickbooks which 3 options for customizing invoices can you access via the custome forms styles>invoice template

Answers

in QuickBooks the option for customizing invoices can you access via the custom forms styles and invoice template.

If the user wants to use QuickBooks Online Essentials or Plus.If the user wants to use QuickBooks EasyStart.

How do we do the above custom work?

Start by taking or choosing Custom Form Styles under Your Company from the Gear Icon in the top right corner of the page. Then select Invoice by taking on New Style.

With three tabs for Design, Content, and Emails, our layout page is simple to use and provides all of your options.

Therefore, in QuickBooks the option for customizing invoices can you access via the custom forms styles and invoice template.

If the user wants to use QuickBooks Online Essentials or Plus.If the user wants to use QuickBooks EasyStart.

Learn more about QuickBooks from

https://brainly.com/question/28233687

#SPJ1

Driving defensively will help protect your life and your...
Group of answer choices

driving record

financial record

criminal record

professional record

Answers

The first option: Driving record

50 points and brainlist What is the return type of the String class toUpperCase() method?

int
double
boolean
String
void

Answers

Answer:

Int

Explanation:

3. Write a program that accepts a number of minutes and converts it both to hours
and days. For example, 6,000 minutes equals 100 hours and equals 4.167 days.
Save the program as MinutesConversion.java.

Answers

The program is sequential, and no conditional statement or iteration is required.

What is a program?

A program is a special subset of ordered operations that a computer can perform. The program in the modern computer described by John von Neumann in 1945 contains a one-at-a-time sequence of instructions that the computer follows.

The code for the given situation can be written as:

import java.util.*;

public class Main{

public static void main(String[] args) {

double mins;

Scanner input = new Scanner(System.in);

mins = input.nextDouble();

System.out.println(mins/60+" hours or "+mins/1440+" days");

}

}

Thus, the equivalent number of hours as well as number of days will be printed.

For more details regarding programming language, visit:

https://brainly.com/question/23959041

#SPJ1

Which BEST describes the fifth-generation, or present-day computer? A. the CPU was used for the first time, computers could be owned by the general public, and a GUI was used B. used operating systems, keyboards and monitors for the first time, and integrated circuits were used to supply electricity C. uses artificial intelligence so that the computers become reasonably intelligent all on their own D. high-level programming languages, magnetic tape and disks for storage, and used small transistors to supply electricity

Answers

The statement which best describes the fifth-generation, or present-day computer is that: C. uses artificial intelligence so that the computers become reasonably intelligent all on their own.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

KeyboardNetworkMonitor screenMouseHard-disk drive

What is AI?

AI is an abbreviation for Artificial Intelligence and it can be defined as a subfield in computer science that deals with the use of advanced computer algorithms and technology to develop an intelligent, smart computer-controlled robot with the abilities to proffer solutions to very complex problems by using human intelligence.

Based on historical records and information, we can reasonably infer and logically deduce that the statement which best describes the fifth-generation, or present-day computer is that it uses artificial intelligence so that the computers become reasonably intelligent all on their own.

Read more on Artificial Intelligence here: brainly.com/question/25523571

#SPJ1

You replace an internal drive that is only used to backup data on a computer. Before you
install the case cover, you power on the computer and observe the disk drive lights are not
blinking. You suspect it may not be receiving power, but cannot find the power supply tester.
How can you quickly verify whether power is being supplied to the disk drive?

Answers

The way to quickly verify whether power is being supplied to the disk drive is through the use of a multimeter.

How do you check your power supply?

There are different ways to know  if power is entering your system. A person can be able to check the power supply on their computer by removing the side panel that pertains to its case.

Note that when a person bought any kind of rebuilt computer, you are able to likely check the power supply with the use of the computer's manual or by asking or contacting the manufacturer.

Therefore, based on the above, The way to quickly verify whether power is being supplied to the disk drive is through the use of a multimeter.

Learn more about multimeter from

https://brainly.com/question/5135212
#SPJ1

If a review of a system reveals an increased sensitivity or criticality associated with information aggregates, then the system security objectives:

Answers

If a review of a system reveals an increased sensitivity or criticality associated with information aggregates, then the system security objectives option c: should be increased.

What is system security objectives?

Information security is one that has three primary goals, namely

ConfidentialityIntegrity, Availability.

It is nearly often mentioned in relation to the security of computer networks and systems.

System security refers to the measures that a company takes to protect its networks and resources from disruption, interference, as well as malicious intrusion.

Therefore, If a review of a system reveals an increased sensitivity or criticality associated with information aggregates, then the system security objectives option c: should be increased.

Learn more about system security from

https://brainly.com/question/14638168


#SPJ1

If a review of a system reveals an increased sensitivity or criticality associated with information aggregates, then the system security objectives:

Should remain the same

Should be lowered

Should be increased

Should be reevaluated

Write a while loop that divides userNumber by 9, assigns userNumber with the quotient, and outputs the updated userNumber, followed by a newline. The loop iterates until userNumber is less than or equal to 0.

Answers

The loop that divides user number by 9 is assign and the loop is said to be java while loop.

What is java loop?

Java loop is a statement which has controlled by a flow statement that allows code which has to be executed continuosly which has been based on a condition which is boolean. The while loop is said to be repeating according to statement.

Java loop comes in use when we required a continuosly execute statements in blocks. The while loop is said to be repeating according to statement. In case when Iterations statement has not been fixed , in such case while loop is recommended to use.

Therefore, The loop that divides user number by 9 is assign and the loop is said to be java while loop.

Learn more about java loop here:

https://brainly.com/question/14577420

#SPJ1

Assume that an int variable age has been declared and already given a value. Assume further that the user has just been presented with the following menu:

S: hangar steak, red potatoes, asparagus
T: whole trout, long rice, brussel sprouts
B: cheddar cheeseburger, steak fries, cole slaw
(Yes, this menu really IS a menu!)
Write some code that reads the String (S or T or B) that the user types in into a String variable choice that has already been declared and prints out a recommended accompanying drink as follows: if the value of age is 21 or lower, the recommendation is "vegetable juice" for steak, "cranberry juice" for trout, and "soda" for the burger. Otherwise, the recommendations are "cabernet", "chardonnay", and "IPA" for steak, trout, and burger respectively. Regardless of the value of age, your code should print "invalid menu selection" if the character read into choice was not S or T or B.
ASSUME the availability of a variable, stdin, that references a Scanner object associated with standard input.
Instructor Notes:
Hint:

Use .equals for String comparison, e.g.
if (choice.equals("B")) instead of
if (choice == "B") // BAD

You might want to skip this one and do section 3.6 (which covers String comparison) beforehand.

Answers

Using the knowledge of computational language in C++ it is possible to write a code that assume that an int variable age has been declared and already given a value

Writting the code:

#include<stdio.h>

#include<conio.h>

int main()

{

//variables to rad choice and age

char choice;

int age;

//read age and choice

printf("\tEnter your age: ");

scanf("%d", &age);

//fflush the keyboard buffer before reading choice

fflush(stdin);

printf("\tEnter your choice: ");

scanf("%c", &choice);

//print the invalid message if the choice is otherthan the S,T,B

if(choice!='S' && choice !='T' && choice !='B')

{

printf("Invalid menu choice");

getch();

}

else if (age <22)

{

if (choice =='S')

{

printf("\tvegetable juice");

}

else if (choice =='T')

{

printf("\tcranberry juice");

}

else if (choice == 'B')

{

printf("\tsoda");

}

}

else

{

if (choice == 'S')

{

printf("\tcabernet");

}

else if (choice =='T')

{

printf("\tchardonnay");

}

else if (choice == 'B')

{

printf("\tIPA");

}

}

//pause the console output until user press any key on keyboard

getch();

}

See more about C++ at brainly.com/question/19705654

#SPJ1

what of the following calculations would evaluate to 12

Answers

Based on the above, the option that is a calculations that would evaluate to 12 is option a: 3 * ((6 + 2) /2).

What exactly are calculations in math?

The act of Performing basic math operations and facts, as well as counting as well as grouping objects.

Math calculation skills is one that is made up of the capacity to count, group, as well as the act to compute basic mathematical facts and procedures.

Note that:

3 * ((6 + 2) /2)

= 3 x ((8) /2)

= 3 x 4

=12

Therefore, based on the above, Based on the above, the option that is a calculations that would evaluate to 12 is option a: 3 * ((6 + 2) /2).

Learn more about math calculations from

https://brainly.com/question/25678139

#SPJ1

Q.

Which of the following calculations would evaluate to 12?

answer choices

3 * ((6 + 2) /2)

(3 * 6 + 2) /2

3 * 6 + 2 /2

(3 * 6) + 2 /2

Other Questions
Lindsey and Eduardo are waiting for an elevator on the ground floor. First, Lindsey boards an elevator and starts going up at a rate of 130 meters per minute. A few moments later, when Lindsey's elevator has traveled 190 meters, Eduardo boards an express elevator and starts going up at a rate of 240 meters per minute. In how long will Eduardo pass Lindsey? Show your steps for full credit. Show your answer on a number line and in interval notation 8 2m 4 < 16 given line m graphed on the grid shown which of the following would be the slope of a line perpendicular to m how do i mark people brainlest Based on the table above, which of the following statements are true? There are twice as many part-time employees against the workplace safety policy than full-time employees against the workplace safety policy. There are more employees for the workplace safety policy than against the workplace safety policy. There is an equal number of part-time employees and full-time employees. There are more part-time employees against the workplace safety policy than for the workplace safety policy. Jamie, a boy scout, has practiced tying a particular kind of knot dozens of times, and he does it quickly and efficiently. But when he tries to explain how to do it to a younger member of his troop, he cant put it into words, he can only show the other boy how to do it. Jamies knowledge of knot tying is an example of. Trashia's bedroom is 11 feet by 11 feet. She has chosen a carpet which costs $33.05 per square yard. This includes installation. Determine the cost to carpet her room. Use the dimensional analysis method (use units in your calculations). Which sources are reliable? Check all that apply. A.an article discussing mineral resources written by the United States Geological Survey B.a blog discussing sources of alternate energy written by a high school student an advertisement for guided hikes and tours in Camping magazine C.a study describing clinical trials of a new medication in the Journal of Medicinal Chemistry D.an entry about common uses of metals in an encyclopedia that can be edited by the general public How many ways are there to divide a red bracelet, a yellow bracelet, a green bracelet, and a black bracelet among $4$ people if each person can receive any number of bracelets, including $0$? Each bracelet must be given to someone. How does the fabrication of a thermoplastic polymer differ from the processing of a thermosetting polymer? what are the benefits of the modern trade systems look Which is the most clear and precise sentence explaining what to do before submitting new content to a webmaster? In order to have more efficient supply chains, when the world becomes your market, what term has been used to describe how intermediaries are often critical to facilitate effective commerce?. A woman is 43 years old, and her daughter is 15 years old. How many years willit be before the woman's age is just twice her daughter's? You are planning to place your money in safe government securities, which currently offer a 4% riskless rate of return. Before making this investment, an entrepreneur approaches you and asks you to purchase her new business venture, fastdrop, a delivery service for legal documents that would produce a single cash inflow of $80,000 at the end of the year. You have determined that 6% is an appropriate risk premium for this investment. How much would you be willing to pay for fast drop?. A good person influences to the entire society. During photosynthesis, where do sugars like glucose eventually form in a plant cell?Choose 1 answer:(Choice A)Chloroplast; thylakoid membrane(Choice B)Mitochondrion; stroma(Choice C)Chloroplast; grana(Choice D)Chloroplast; stroma How many kilograms of HF are needed to completely react with 7.01 kg of UO2? PleSeee help ASAP now Tysm Calculate the energy of blue light(425nm). What is the energy of a mole of blue photons?