a core authentication server is exposed to the internet and is connected to sensitive services. what are some measures you can take to secure the server and prevent it from getting compromised by a hacker? select all that apply.

Answers

Answer 1

The measures you can take to secure the server and prevent it from getting compromised by a hacker are the use of option b, c and d:

Secure firewall Access Control Lists (ACLs) Bastion hostsWhat is core authentication?

The process of confirming a user's identification is called authentication. The process of deciding whether a user has access to a resource is known as authorization.

Secure or Discreet Firewall: A safe firewall configuration should forbid connections to systems and networks that are not trusted.

Bastion Hosts: What is allowed to run on Bastion hosts is restricted and carefully hardened. Bastion hosts are typically assumed to be exposed to the internet, thus extra care is taken to harden and lock them down to reduce the likelihood of compromise.

Then the Lists of access controls (ACLs). To secure sensitive services without compromising the convenience of the entire business, secure configurations, such ACLs, could be enabled on selected bastion hosts.

Learn more about core authentication from

https://brainly.com/question/17093485
#SPJ1

See options below

Decker service

Secure firewall

Access Control Lists (ACLs)

Bastion hosts


Related Questions

how did roman eat hunt and live to be live

Answers

Answer:

The Romans ate mainly with their fingers and so the food was cut into bite size pieces.

Write a program that will monitor the weather and road conditions of the Flat Bridge in St. Catherine
and display a warning sign accordingly. Accept values for the type of weather (Rainy or Dry) and the
condition of the road (Flooded or Wet). If the weather is rainy, then if the road is flooded, display “Road
flooded...please detour”, otherwise display “Road wet...drive with caution”. If it is not rainy (i.e. dry),
display “Safe journey...drive with care”. In addition to the IPO, pseudocode OR flowchart please do trace table and PYTHON Code

Answers

A program that will monitor the weather and road conditions of the Flat Bridge in St. Catherine and display a warning sign accordingly is given below:

The Program

Program code ( main . py ) -

# read weather and road type

weather = input ( " Enter the weather type ( Rainy | Dry ) : " )

road = input ( ' Enter the road type ( Flooded | Wet ) : ' )

# check if it is rainy

if 'rainy' = = weather.lower():

   # road is flooded

   if 'flooded' == road.lower():

       print('Road flooded…please detour')

  else:  # not flooded

       print('Road wet…drive with caution')

else:  # dry weather

  print('Safe journey…drive with care')

Sample Output-

Enter the weather type(Rainy | Dry): rainy

Enter the road type(Flooded | Wet): wet

Road wet…drive with caution

Read more about programming here:

https://brainly.com/question/23275071
#SPJ1

suppose that you have a merkle tree with 4 transactions. what is the lowest number of hashes one need to provide to verify that a transaction belongs to a tree?

Answers

The leaf-node level at the base of the tree is made up of the eight transaction hashes, which are also referred to as transaction IDs. Pairs of these transactions are hashed together.

Hashing together pairs of TXIDs yields a merkle root, which is a brief but distinctive fingerprint for all the transactions in a block. Then, every block header will provide a brief summary of each transaction contained in the block because this merkle root is used as a field in a block header. The user can confirm whether it contains a transaction in the block by using a Merkle tree, which adds up all of the transactions in a block and creates a digital fingerprint of the complete set of activities. A data structure used in computer science applications is called a Merkle tree.

Learn more about transaction here-

https://brainly.com/question/24730931

#SPJ4

given knowledge of load balancing and clustering techniques, which configuration provides both fault tolerance and consistent performance for applications like streaming audio and video services?

Answers

The configuration that provides both fault tolerance and consistent performance for applications like streaming audio and video services is option A.) Active/Passive clustering.

What is the Configuration of a computer about?

A system's configuration in communications or computer systems refers to how each of its functional elements is organized in relation to their nature, number, and distinguishing features. Configuration frequently involves picking the right hardware, software, firmware, and documentation.

Note that One active server and one passive standby server make up an active/passive cluster. A third-party load balancer determines when a passive legacy failover is necessary and directs users to the appropriate node.

Therefore, When molecules hit the receiver surface in the active model, they are absorbed. The receiver is a hypothetical border that has no impact on the behavior of molecules in the passive model. To determine transformations between the receiver signals, two methods are described.

Learn more about configuration  from

https://brainly.com/question/13484609
#SPJ1

See full question below

Given knowledge of load balancing and clustering techniques, which configuration provides both fault tolerance and consistent performance for applications like streaming audio and video services?

A.) Active/Passive clustering

B.) Active/Active clustering

C.) First in, First out (FIFO) clustering

D.) Fault tolerant clustering

in a particular factory, a team leader is an hourly paid production worker who leads a small team. in addition to hourly pay, team leaders earn a fixed monthly bonus. team leaders are required to attend a minimum number of hours of training per year. design a teamleader class that extends the productionworker class you designed in programming challenge 1 (employee and production worker classes). the teamleader class should have member variables for the monthly bonus amount, the required number of training hours, and the number of training hours that the team leader has attended. write one or more constructors and the appropriate accessor and mutator functions for the class. demonstrate the class by writing a program that uses a teamleader object

Answers

Facilitate team development for successful project completion. Through coaching and mentoring, provide teammates with technical leadership.

Establishing best practices and habits will help the team maintain high standards for the quality of its software. Identify and promote the team's potential development and improvement areas.

#include<iostream>

using namespace std;

/*C++ Function to print leaders in an array */

void printLeaders(int arr[], int size)

{

  for (int i = 0; i < size; i++)

   {

       int j;

       for (j = i+1; j < size; j++)

       {

           if (arr[i] <=arr[j])

               break;

       }  

       if (j == size) // the loop didn't break

           cout << arr[i] << " ";

 }

}

/* Driver program to test above function */

int main()

{

   int arr[] = {16, 17, 4, 3, 5, 2};

   int n = sizeof(arr)/sizeof(arr[0]);

   printLeaders(arr, n);

   return 0;

}

Learn more about Development here-

https://brainly.com/question/28011228

#SPJ4

a group of windows pcs in a new subnet has been added to an ethernet network. when testing the connectivity, a technician finds that these pcs can access local network resources but not the internet resources. to troubleshoot the problem, the technician wants to initially confirm the ip address and dns configurations on the pcs, and also verify connectivity to the local router. which three windows cli commands and utilities will provide the necessary information? (choose three.)

Answers

The Three windows cli commands and utilities that will provide the necessary information are ping, ipconfig and nslookup.

The ipconfig and nslookup commands will make the initial IP address and DNS configuration information availabe to the technicians while determining whether the DHCP is assigning correct information to the PCs. The ping utility on the other hand would be used in verifying whether, or not, the connectivity to the default gateway (router) using the configured default gateway address, or using the known correct default gateway address if these are found to be different.

Here's the complete question:

A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.)

a. netsh interface ipv6 show neighbor

b. arp -a

c. tracert

d. ping

e. ipconfig

f. nslookup

g. telnet

Learn more on Windows CLI command from:

https://brainly.com/question/13263568?referrer=searchResults

#SPJ4

Write a python code to generate the following shape

Answers

Hello, you should first install the library of PyTurtle. You can type in terminal if you've GNU/Linux.

sudo apt-get install -y python3-wxgtk4.0

And then, you can use this code. Good luck!

import turtle

# Defining instance of turtle

pen = turtle.Turtle()

wn = turtle.Screen()

#Initial position is setting

pen.penup()

pen.setposition(-275.0,-150.0)

pen.pendown()

#Red diamond shape

pen.color("red")

pen.left(60)

pen.forward(200)

pen.left(60)

pen.forward(200)

pen.left(120)

pen.forward(200)

pen.left(120)

pen.forward(200)

pen.right(120)

pen.forward(200)

pen.right(120)

pen.forward(200)

pen.right(120)

pen.forward(200)

#Go to draw circle

pen.color("white")

pen.right(90)

pen.forward(170)

pen.left(90)

pen.forward(175)

#Draw circle

pen.color("black")

pen.circle(175)

#Go to green diamond

pen.color("white")

pen.forward(175)

pen.left(90)

pen.forward(175)

pen.right(90)

#Draw green diamond

pen.color("green")

pen.forward(200)

pen.left(120)

pen.forward(200)

pen.left(120)

pen.forward(200)

pen.left(60)

pen.forward(200)

pen.left(120)

pen.forward(200)

pen.left(120)

pen.forward(200)

#Always-on-display

wn.mainloop()

22. How many positive integers less than 1000 are divisible by 7?

Answers

If we want to write Python code to find the answer this question;

x=1

count=0

while(x!=1000):

   if(x%7==0):

       count+=1

       x+=1

   else:

       x+=1

       continue

print("There are ",count," numbers which divisible by 7.")

The output will be There are 142 numbers which divisible by 7.

a company has a static website hosted on an s3 bucket in an aws region in asia. although most of its users are in asia, now it wants to drive growth globally. how can it improve the global performance of its static website?

Answers

For all accounts and buckets that you don't want to be publicly visible, it should enable Block Public Access. Data can be safely uploaded and downloaded to Amazon S3 utilizing HTTPS endpoints with SSL.

The basic protocol used to transmit data between a web browser and a website is HTTP, while HTTPS is the secure version of HTTP. To strengthen the security of data transport, HTTPS is encrypted. This is crucial when customers register into a bank account, email account, or health insurance provider and transfer sensitive data.

Any website should use HTTPS, especially those that request login information. Websites that do not employ HTTPS are marked differently from those that do in contemporary web browsers like Chrome.

HTTPS encrypts messages using an encryption protocol. Previously known as Secure Sockets Layer, the technology is now known as Transport Layer Security (TLS) (SSL). This protocol uses an asymmetric public key infrastructure to secure communication.

To know more about HTTPS click here:

https://brainly.com/question/10663873

#SPJ4

distributor claims that the chance that any of the three major components of a computer (cpu, monitor, and keyboard) is defective is 3%. cal the chance that all components work in a computer set.

Answers

The chance that all components work in a computer set is 94.09%. This chance is calculated using binomial probability.

Binomial probability or known as binomial experiment can be described as the probability of exactly x successes on n repeated trials in an experiment which has two possible outcomes.

Step-by-step explanation:

Formula:

P(x) = ⁿCₓpˣ (1-p)ⁿ⁻ˣ

Desc:

P(x) =  the probability of getting success in x trials

n = number of trials

P = the probability of getting success

P ( x ≤ 1) = P(0) + P(1)

³C₀(0,03)⁰ (0,97)³ + C₁ (0,03)¹(0,97)² =  (0,97)³ + (0,03)¹(0,97)² = 0,9409 = 94,09%

Learn more about Binomial probability at https://brainly.com/question/13029978

#SPJ4

Help me out with questions 8,9,10 I need to turn it in asap

Answers

Answer:

10,0000 because its a regular for

Explanation:

Exa: 345 round off 400 answer

write a program that calculates an adult's fat-burning heart rate, which is 70% of the difference between 220 and the person's age respectively. complete fat burning heart rate() to calculate the fat burning heart rate.

Answers

The software serves as an example of an exception.

Program mistakes are managed using exceptions.

The Python program that uses comments to clarify each line is as follows:

This line defines the function get age.

Defining get age()

Age input is taken for this.

age = int("Age:" input)

If the age is between 18 and 75, this returns the age (inclusive)

if (age >= 18 and = 75):

inbound age

#If not, the ValueError is returned.

else:

declare ValueError ("Age is out of range or invalid")

The fat burning heart rate function is defined by this.

age = def fat burning heart rate

This gives you your heart's fat-burning rate.

return (0.7 * age - (220))

#The main starts right here.

#The attempt block is now in motion.

try:

Age input is taken for this.

get age = age ()

This displays your heart rate when burning fat.

fat burning heart rate(age),"bpm", "Fat burning heart rate for a", age,"year-old:"

Learn more about program here-

https://brainly.com/question/3224396

#SPJ4

you are creating a slideshow for a client presentation. there is a pivot table in a spreadsheet that you want to include. in order for the pivot table to update whenever the spreadsheet source file changes, how should you incorporate it into your slideshow?

Answers

The best way to incorporate a pivot table into a slideshow is to link it to the spreadsheet source file. That way, whenever the source file changes, the pivot table will update automatically.

What is spreadsheet?
A spreadsheet is indeed a computer programme used for organising, organising, analysing, and storing tabular data. Spreadsheets were created as electronic alternatives to paper accounting worksheets. Data typed into table cells serves as the program's input. Each cell may have text, numeric information, or the output of algorithms that instantly calculate and show a value dependent on the content of other cells. One of these electronic documents is referred to by the word "spreadsheet." Users of spreadsheets can change any stored value or watch how it affects the results of calculations. Because various scenarios may be quickly studied without manual recalculation, the spreadsheet is advantageous for "what-if" analysis. Multiple sheets can interact with one another in modern spreadsheet software, and data can be shown graphically or as text and numbers.

To learn more about spreadsheet
https://brainly.com/question/26919847
#SPJ4

Answer: D ( to pull specific information from PivotTable to answer the question)

Explanation:

Edg 2022

suppose you wish to learn what tables are included in a database, what entity characteristics these tables contain, and how these tables are related. which resource would provide this information?

Answers

A table consists of rows and columns. Each column corresponds to an attribute of the entity referenced by the table. Each row represents an instance of the entity described by the database table.

The specific data associated with each attribute is stored in rows corresponding to each column. A database is a structured collection of information about various specific, well-defined types of entities. Entities generally have various specific types of relationships with each other. Each entity has a specific set of (unique) attributes of interest. An entity type typically corresponds to one or more related tables in your database. attribute. A characteristic of an entity type that describes the entity. For example, the Person entity type has a Date of Birth attribute.

Learn more about entity here-

https://brainly.com/question/14972782

#SPJ4

you manage a network that has multiple internal subnets. you connect a workstation to the 192.168.1.0 subnet using the default subnet mask. this workstation can communicate with some hosts on the private network, but not with other hosts. you run ipconfig /all and see the following:

Answers

The cause of the problem will be Incorrect default gateway.

A TCP/IP computer cannot communicate with external networks, but it can communicate with the systems on the LAN (as no router is required) if its configuration does not include a default gateway address.

Click the Start button, then choose Command Prompt from the context menu. Step 2: Type "ipconfig" into the Command Prompt window and hit [Enter]. The numbers listed in the Default Gateway section are the IP Address of your router.

30 seconds after unplugging the router, connect it back in. Reconnecting to the internet may take some time. Before continuing, get in touch with your Internet Service Provider if you're still having trouble connecting to the internet. Transfer the Ethernet connection from the Internet Gateway to another router port.

Learn more about default gateway:

https://brainly.com/question/2692918

#SPJ4

The complete question is ''You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet.

This workstation can communicate with some hosts on the private network, but not with other hosts. you run ifconfig /all and see the following.

Ethernet adapter Local Area Connection : Connection- specific DNS Suffix . : mydomain . local Description . .Broadcom network adapter

Physical Address . : 00 - AA-BB-CC-74-EF

DHCP Enabled . . . . . . . No

Autoconfiguration Enabled . Yes

IPv4 Address 192 . 168 . 1 . 102(Preferred)

Subnet Mask . 255 . 255 . 255 . 0

Default Gateway : 192 . 168 .2.1

DNS Servers . . 192 . 168 . 2 . 20

What is the most likely cause of the problem?

madison is configuring live migration within hyper-v manager for a server. the bandwidth on the server’s network is limited. what configuration options would you advise madison to use?

Answers

Since Madison is configuring live migration within hyper-v manager for a server. the bandwidth on the server’s network is limited. the configuration that I could advise Madison to use is  Self-aligned barrier (SAB) configuration.

What is Computer Configuration?

Software, hardware, or say both may be referred to as configuration. For instance, an average laptop PC configuration includes an operating system,8GB of main memory, and a hard drive or solid-state drive (SSD).

Note that Since the Cu/barrier interface adhesion is frequently regarded as the limiting element for the electromigration performance of Cu interconnects capped with dielectric barriers, self aligned barriers techniques are the subject of extensive research.

Learn more about configuration from

https://brainly.com/question/14307521
#SPJ1

juan, a network analyst, is using the tcp xmas scan while performing a technical assessment to determine network vulnerabilities. what would be the response of all open ports?

Answers

While doing a technical assessment to determine network vulnerabilities, you used the TCP XMAS scan, All open ports will ignore the packets.

Here's the full question:

While doing a technical assessment to determine network vulnerabilities, you used the TCP XMAS scan. What would be the response of all open ports?

a. The port will send an ACK

b. The port will send a SYN

c. The port will ignore the packets

d. The port will send an RST

What is port scanning?

Port scanning refers to a method used to detect which ports in a given network are open and available for use. It also involves sending packets to certain ports on a host to inspect responses to detect potential, underlying vulnerabilities.  

During port scanning, A port scanner will send a TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) network packet and inquire the port about their status. The responses will either be: open, closed or blocked.

In using xmas scan, a loophole with the TCP RFC is used to differentiate between open and closed ports. This means that the Xmas scan in order to identify listening ports on a targeted system will send a specific packet; If the port is open on the target system then the packets will be ignored.

Learn more on port scanning from:

https://brainly.com/question/10536867?referrer=searchResults

#SPJ4

which special identity group contains any account (except guest) that is currently signed in to a computer or domain with a valid username and password?

Answers

The answer to the following query is authenticated, by the user.

Users are referred to as authenticated users if they access our accounts or those of others for legitimate reasons through a straightforward login or logon process without hacking. Simply said, authenticated users are those actual individuals who log in using their real username and password.

A domain in computer networking is a collection of devices that share the same administrative authority. An organization might have a domain that encompasses all of the computers in its offices, for instance. Subdomains, which are smaller groups of computers within a domain, can be created.

Learn more about Special Identity Group :

https://brainly.com/question/28145492

#SPJ4

Which of the following software is unique to a Mac?

A. OpenOffice Writer
B. Pages
C. Word Online
D. Word Perfect

Answers

Answer: B, Pages

Explanation: The software named "Pages" is exclusive to Apple products.

The Answer is B Pages

what would be the best pseudocode for an algorithm to do the following? it reads an even number of characters then prints the first character, third character, fifth character, and so on. on a second output line, it prints the second character, fourth character, sixth character, and so on. use two queues to store the characters.

Answers

A simple, non-working structure of how we want code to behave is called pseudo code. It is frequently utilized for formulating solutions to problems and the initial steps in creating algorithms.

If a student receives a test score of at least 90

A collection of guidelines known as an algorithm is utilized to resolve issues that can be expressed in pseudocode. Algorithms are typically complete pieces of code that can be utilized to solve a problem. The pseudocode shown above might be used to generate the following algorithm in Java:

If testScore exceeds 90,

'otherwise if (testScore >= 80 && testScore = 89)'; studentGrade

gradeofstudent = "B";

}

Learn more about algorithm here-

https://brainly.com/question/22984934

#SPJ4

a functional policy declares an organization's management direction for security in such specific functional areas as email, remote access, and internet surfing.

Answers

A functional policy declares an organization's management direction for security in such specific functional areas as remote access, email, and internet surfing and using. Hence the given statement in this question is True.

The functional policy defines the overall functional operation of the organization. The functional policy of an organization from the security perspective defines the management direction to access the system remotely, access email, and internet surfing. The main purpose of the functional policy regarding the security of the organization is to protect the organization's data and information, and protect the organization's employees' data while surfing the internet.

The complete question is given below

"

a functional policy declares an organization's management direction for security in such specific functional areas as email, remote access, and internet surfing.

True

False

"

You can learn more security policy of an organization at

https://brainly.com/question/5673688

#SPJ4

Answer: True

Explanation: Got it right on the test

when information collected for one purpose is put to another purpose, that is called a group of answer choices backdoor exploit cookie secondary use of the data collaborative filter data leveraging opportunity

Answers

It is referred to as a when information is used for another purpose. data's secondary use. There is a policy that states that any information sharing between organizations must have the explicit consent of the consumer. opt-in.

Data mining, also known as knowledge discovery in databases, is a process used in computer science to identify intriguing and practical patterns and relationships in massive data sets. When you visit a website, a little text file called a cookie is downloaded and saved to your computer's hard disk. When you return to the same website later, the web server will be able to read the information in this text file. There are many uses for cookies. Queries. In a database, queries can carry out a wide range of tasks.

Learn more about information here-

https://brainly.com/question/27798920

#SPJ4

the design of the research could be any of the following general classfication descriptive correlation casual experiment time serieds

Answers

It is TRUE to state that The design of the research could be any of the following:

general classification descriptive correlation casual experimenttime series.

What are the various types of research?

The first is Descriptive Research.

Descriptive Research is a sort of research that is used to characterize a population's characteristics. It collects data that is used to answer a variety of what, when, and how inquiries about a certain population or group.

Descriptive research "aims to shed light on present challenges or problems using a data gathering procedure that allows them to characterize the situation more thoroughly than was previously feasible." Simply said, descriptive studies are used to characterize different features of phenomena.

Casual Experimentation or research is the study of cause-and-effect relationships. To establish causality, the variation in the variable suspected of influencing the difference in another variable(s) must be discovered, and the changes from the other variable(s) must be computed (s).

A descriptive correlational study is one in which the researcher is primarily concerned with characterizing connections between variables rather than attempting to demonstrate a causal relationship.

Time series analysis is a method of examining a set of data points gathered over a period of time. Time series analysis involves analysts capturing data points at constant intervals over a predetermined length of time rather than merely occasionally or arbitrarily.

Learn more about research:
https://brainly.com/question/28467450
#SPJ1

Full Question:

The design of the research could be any of the following:

general classfication descriptive correlation casual experimenttime series

True or False?

say you are registering for next semester’s classes. you have choice a, which is your art class, and choice b, which is your math class. you need both of them, but it’s a race between time and luck. if you end up registering on time for choice a, but you don’t get your choice b, which logical operators would be true?

Answers

A set of boolean operands will only have a logical AND (&&) operator (logical conjunction) that is true if and only if all of the operands are true. If not, it will be untrue.

A logical operator is a symbol or word that joins two or more expressions in such a way that the value of the resulting compound expression solely depends on the value of the original expressions and the meaning of the operator. The AND, OR, and NOT logical operators are often used. The logical NOT (!) operator transforms truth into untruth and vice versa. Normally, boolean (logical) values are used with it. When applied to non-Boolean values, it returns true unless its sole operand can be transformed to false. The two vertical line symbols stand in for the logical OR operator. In contrast to the logical AND operator, it only returns false if both of the expression's claims are untrue.

Learn more about Operator here-

https://brainly.com/question/2945136

#SPJ4

What is decision support system

Answers

A decision support system (DSS) is a computer program application that helps businesses make better decisions. Large volumes of data are analyzed, and the best solutions are then presented to an organization.

What is decision support system?

One might be argued that a DSS is anything that offers logical, quantifiable, and scientific data to assist leaders in making educated decisions. Examples of decision support systems include complex decision support software, manual systems, etc.

Note that it is a group of computerized information systems called decision support systems (DSS) provide assistance for decision-making processes. Interactive computer-based systems and subsystems.

Learn more about decision support system from

https://brainly.com/question/7655444
#SPJ1

What do you create when you want to set up a meeting using the Microsoft Office Online Calendar application?

A. Appointment
B. Event
C. Individuals
D. Groups

Answers

Answer:

Explanation:

B. Event

The answer is B Event

write a loop that subtracts 1 from each element in lowerscores if the original element was greater than 0, and otherwise just assigns the element with 0. ex: lowerscores

Answers

The loop is used to repeatedly run the block of code in accordance with the condition stated in the loop. It entails repeated execution of the same code, which helps to traverse an array's items while also saving code.

#include <iostream>

#include <vector>

using namespace std;

int main() {

  const int SCORES_SIZE = 4;

  vector<int> lowerScores(SCORES_SIZE);

  unsigned int i;

  for (i = 0; i < lowerScores.size(); ++i) {

     cin >> lowerScores.at(i);

  }

  /* Your solution goes here  */

  for (i = 0; i < lowerScores.size(); ++i) {

     cout << lowerScores.at(i) << " ";

  }

  cout << endl;

  return 0;

}

Learn more about Loop here-

https://brainly.com/question/14390367

#SPJ4

which career worker installs, maintains, and repairs equipment used for communication? select all that apply. printing technology printing press operator electronic home entertainment eq

Answers

The career that has the main task to install, maintain, and restore gadget used for communique is called The telecommunication.

Telecommunications, additionally referred to as telecom, approach the alternate of data over vast distances with the aid of using digital approach and refers to all kinds of voice, statistics and video transmission.

Telecommunication may be defined as communique at a distance the use of electric alerts or electromagnetic waves. Examples of telecommunications structures are the phone network, the radio broadcasting system, laptop networks and the Internet.

Learn more about the telecommunication at https://brainly.com/question/1622085

#SPJ4

you will install hyper-v on the server and create seven virtual servers, with each server running windows server 2012. which windows server 2012 edition should you install?

Answers

Installing all of the Hyper-V components from Powershell is the workaround. In contrast to Windows Server 2012 Essentials (non-R2) edition, Windows Server 2012 R2 Essentials may operate a single instance of a virtual machine on Hyper V.

Hyper-V cannot be installed if an active hypervisor is present. When we attempt to install Hyper-V on a server that is already a virtual machine, this error happens. Itanium-based processors are not supported, and x64-based processors are the minimum CPU requirements for running Hyper-V. Hardware Data Execution Protection and hardware-assisted virtualization must also be turned on. A dual-core processor is not necessary at all. The Windows Server 2016 Standard or Datacenter Editions both support the installation of Hyper-V.

Learn more about Hyper V here-

https://brainly.com/question/14466010

#SPJ4

define a method named swapvalues that takes an array of four integers as a parameter, swaps array elements at indices 0 and 1, and swaps array elements at indices 2 and 3. then write a main program that reads four integers from input and stores the integers in an array in positions 0 to 3. the main program should call function swapvalues() to swap array's values and print the swapped values on a single line separated with spaces. ex: if the input is: 3 8 2 4 function swapvalues() returns and the main program outputs: 8 3 4 2 the program must define and call a method: public static void swapvalues(int[] values)

Answers

Answer:

Explanation:

e

Other Questions
Question 2 of 25The coach of a college basketball team categorizes the number of pointsscored by the team in each game, with the categories being 51 - 57, 58 - 64,65 - 71, and 72 or more. If the following data represent the numbers ofpoints scored in the last 10 games, how many games were in the 51 - 57category?51, 70, 63, 59, 56, 75, 60, 55, 67, 64O A1B. 2O c. 4O D. 3 Explain how travelling to a ski resort to go skiing could influence travel time the piano played a crucial role in 19th-century musical culture.a. Trueb. False Refer to Passage 2 "War of the Worlds".Which of the following best states the main (central) idea of this passage?The main idea of this article is...To define the number of objects in our solar systemBoth Pluto and 2003 UB313 should be considered planetsThat scientists need to encourage children that science is excitingThat planets are incredibly difficult to find and define what is the name of a protocol that lets users share files over a network? 1 point apache dns cups nfs 2. question 2 which two of these methods could you use to set up printing in an organization? The intent of the Indian Removal Act was to The magnitude of the electric force between two particles depends on whichfactors? A. Charge and densityOB. Charge and distanceOC. Mass and chargeOD. Mass and distance Carrots costs $0.99 per pound. Broccoli costs $1.50 per pound. Jack buys 3.5 pounds of carrots and 1.25 pounds of broccoli. What is Jacks total bill? Please help me im getting stressed with solution the average daily rainfall is typically 5/8 of an inch. Last year, the average daily rainfall was only 3/8 of an inch. What percent of the typical average daily rainfall fell last year in Green Valley? PLEASE HELP BRO WILL GIVE BRAINLIA student writes an incorrect step while checking if the sum of the measures of the two remote interior angles of triangle ABC below is equal to the measure of the exterior angle. A triangle ABC is shown. The base of the triangle extends into a straight line. The angle formed between this straight line and the edge of the triangle is marked as p. The angle adjacent to p is marked as o, and the other two angles inside the triangle are marked as m and n. Step 1: mm + mn + mo = 180 degrees (sum of angles of a triangle)Step 2: mp + mo = 180 degrees (adjacent supplementary angles)Step 3: Therefore, mm + mn + mo = mn + mpStep 4: So, mm + mn = mpIn which step did the student first make a mistake and how can it be corrected? (4 points) Step 2; it should be mo mp = 90 degrees (complementary angles) Step 1; it should be mm + mn + mo = 90 degrees (adjacent angles) Step 1; it should be mm + mn + mo = 90 degrees (corresponding angles) Step 3; it should be mm + mn + mo = mo + mp yo can anyone help me solve this rq i need it for tomorrow Read each of the sentences that describe a phase of mitosis. Drag each sentence number onto the correct place on the diagram.Sentence 1: The cytoplasm pinches in half.Sentence 2: The centromeres of the duplicated chromosomes line up across the center of the cell.Sentence 3: The cell grows and replicates its DNA and centrioles.Sentence 4: The chromosomes which were distinct and condensed begin to spread out into a tangle of chromatin.Sentence 5: The genetic material inside the nucleus condenses and the duplicated chromosomes become visible.Sentence 6: The chromosomes separate and move along spindle fibers to opposite ends of the cell.6,2,5,1,3,4 the table shows the cost and revenue information for a perfectly (or purely) competitive firm that produces external hard drives. use whole numbers to answer the six questions. quantity (units) fixed cost ($) variable cost ($) total revenue ($) 10 100 36 1,000 11 100 74 1,100 12 100 145 1,200 13 100 202 1,300 14 100 300 1,400 15 100 435 1,500 16 100 588 1,600 17 100 774 1,700 what is the marginal revenue received from the 11th unit? $ what is the marginal cost of producing the 11th unit? $ what price does this firm charge for each hard drive? $ per unit how many units should this firm produce to maximize profits? units when profit maximizing, what is this firm's profit? The measures of the angles of a triangle are shown in the figure below. Solve for x.4634x Question 4 of 10A biology class observed monarch caterpillars over several weeks. On thefirst day, the caterpillars were 2 mm in length. The caterpillars ate milkweedleaves. After 14 days, the caterpillars were 30 to 40 mm in length. Which twocharacteristics of life did the caterpillars demonstrate?A. Obtaining matter and energyB. Growth and developmentC. ReproductionD. Evolution -3(v + 2) - 2v simplify and use distributive property Write the equation of the line that goes between the two points (6, -5) and (2, 3). Why do you think delancey used phrases common to the Iroquois to make a union between the colonists and Iroquois nations? The relative atomic mass of iridium is 192.22. Explain whether a naturally occurring sample of iridium contains more 191Ir or 193Ir