the computer that communicate with each other are called ______please ask the answer in 15 minutes after 1 p.m. ​

Answers

Answer 1

The computers that communicate with each other are called [tex]\sf\purple{transmission \:control\: protocol\: (TCP)}[/tex].

[tex]\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{!}}}}}[/tex]


Related Questions

Your organization's IT department has developed a custom application that reports the hostname of each client that tries to access three servers in the accounting department that store sensitive information. You do a random test and find that the program is not reporting the host names for some clients even though it properly records their IP addresses. This is because the custom application submits reverse lookup requests to the DNS server to discover the host names for the specified IP addresses. As you investigate further, you learn that the clients whose hostnames could not be reported have static IP addresses and are on subnet 192.168.3.0. What should you do

Answers

Answer:

Configure DC1 to forward name resolution requests to 192.168.3.0

Explanation:

DC1 is configured in order to use forwarders so that they can send unresolvable host name requests to a DNS server at the main office or the head quarters.

This also prevent sending of DNS spoofing attack  to a DNS client

Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
O SmartArt.
O WordArt.
O Clip Art
O Pictures

Please help ASAP

Answers

Answer:

clip art

Explanation:

i hope this helps you

java Consider the following problem statement. A cookie recipe calls for the following ingredients: 1.5 cups of sugar 1 cup of butter 2.75 cups of flour The recipe produces 48 cookies with this amount of the ingredients. Write a program that asks the user how many cookies he or she wants to make, and then displays the number of cups of each ingredient needed for the specified number of cookies. Format your output nicely that all numbers and decimals align as shown in the example! Limit decimals to four digits.

Answers

Answer:

Explanation:

The following code is written in Java. It creates a program that asks the user how many cookies they want to make. Then it adjusts the original recipe based on the ratio of the original amount of cookies it makes to the amount the user wants. Finally, passing the output of the new adjusted recipe to the user. Due to technical difficulties, I have added the code as a txt file attached below.

The part of an HTML document where the CSS file is linked is the..?
A) body
B) footer
C) header
D) paragraph

Answers

Answer:

C) header

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head.

The head (header) contains information such as version of HTML, title of a page, metadata, link to custom favicons and cascaded style sheet (CSS) etc.

On the other hand, the body of a HTML document contains the contents or informations that a web page displays.

Hence, the part of an HTML document where the cascaded style sheet (CSS) file is linked is the header. A style sheet can be linked to an HTML document by three (3) main methods and these are;

I. External style.

II. Inline style.

III. Embedded (internal) style.

Q1. Which implementation of Network Access Control checks users' credentials to determine what level of access they should have to a top-secret file?

A. ACE
B. DAC
C. MAC
D. RBAC

Q2. Which physical access control uses a portable device that authenticates a person's identity electronically by storing some sort of personal information?

A. Infrared scanners
B. Hardware security tokens
C. Biometric devices
D. Keypads

Q3. Which implementation of Network Access Control grants access depending on a specific job role?

A. DAC
B. RBAC
C. MAC
D. PAC

Q4. Which implementation of Network Access Control is more relaxed, allowing users to determine file access privileges?

A. AAC
B. MAC
C. DAC
D. RBAC

Q5. Which type of access control sets the standard for the way security actions unfold?

A. Identity
B. Management
C. Physical
D. Technical

Answers

Answer:

1. MAC

2. Biometric Devices

3. RBAC

4. DAC

5. Management

Explanation:

Q.1) Option c) MAC

Q.2) Option c) Biometric devices

Q.3) Option b) RBAC

Q.4) Option c) DAC

Q.5) Option b) Management

What is MAC ?

The ability of individual resource owners to allow or refuse access to resource objects in a file system is constrained by the security measure known as mandatory access control (MAC).

What is a biometric device ?

An authentication and security identification tool is a biometric gadget.

What is RBAC ?

Role-based access control, often known as role-based security, is a method for only allowing authorized users to access a system.

What is DAC ?

The idea behind discretionary access control is to limit access to things based on who the subject is.

Therefore, MAC, biometric device, RBAC, DAC and Management access control sets are some of the measures for network security and access control.

You can learn more about network security from the given link

https://brainly.in/question/33317398

#SPJ2

Select the correct answer.
A student is browsing a website. While browsing, he clicks on a link that takes him to another website. Which code gives the correct format of the
external link?

Answers

Answer:

(B) because on a website IT HAS TO HAVE "WWW." first

why people shouldnt get married​

Answers

Well it depends if your thinking! I know many reasons why people should get married but I also know many reasons why people shouldn’t get married!

For an example if you are a man and you don’t want to get married, well I think it’s 50% wrong and another 50% right cause if you want to enjoy life and not be stuck with the same wife you wouldn’t get married, but now think of having a family when you get married you receive a blessing, cause you will have son , daughters and a wife who will support you all the time!

What
are the
difficulties associated with the machine level and assembly
languages ?​

Answers

Answer:

kalo cha

Explanation:

tero bau ra tesko

1.This check tests whether the data obeys specified criteria.Immersive Reader

Format check

Consistency check

reasonableness check

Data type check

Answers

Format check !!!!!!!!!!!!!!!!!.....

Noah would like to center and underline the title. Which of the following steps should Noah follow?
Type the title, select the underline command, and select the centering command.
Type the title, highlight the text, and select the centering command.
Type the title, highlight the text, select the underline command, and select the centering command.
Type the title, drag across the text with the mouse, and select the underline command.

Answers

Answer:

Option 3 - Type the title, highlight the text, select the underline command, and select the centering command.

Network Address Translation (NAT) technology provides a major benefit for which of these network problems

Answers

Answer:

Address being exhausted

Explanation:

Network Address Translation (NAT) technology is a technology which has been very beneficial to the IPv4 network systems.

Its major function is that it provides a whole lot of options and ensures that the address isn’t exhausted. This difference sets the IPv4 system apart from other systems whose addresses got exhausted and led to the creation of the IPv4.

Searching for Venom !!

help me find him lol​

Answers

Answer:

Venom is widely distributed taxonomically, being found in both invertebrates and vertebrates; in aquatic and terrestrial animals; and among both predators and prey.

Explanation:

[tex] \red{hope \: u \: find \: venom \: asap}[/tex]

Explanation:

[tex]are \: you \: searching \: for \: me \: [/tex]

Identify the error and write correct HTML program 5
Cyber Bullying Tips<\head>
Don’t Respond Talk to a trusted adult
<|html>

Answers

Answer:

1. <BODY background = ‘‘red”>

2. <FONT type =‘‘arial ”>

Explanation:

Answer:

<html>

<head> Cyber Bullying Tips </head>

<body>

Don't Respond, Talk to a trusted adult

</body>

</html>

Hope this helps!

Other Questions
Are executive pay levels unreasonable? Why or why not When Elle's Espresso Bar increased its price by 10 percent, the quantity of coffee that Elle sold decreased by 40 percent. When Elle and all her competitors cut their prices by 10 percent, the quantity of coffee sold by Elle increased by only 4 percent.The price elasticity of demand for Elle's Espresso Bar coffee is nothing. Please help me with this question!! what are 3 things that are the same from both performances and what are 3 things that are different from alexander hamilton? 6. Discuss how polymorphism in the cnidarians might have influenced adaptive radiation of the group. I need help with these 2 please Is it possible for a totalitarian government to exist under single-party rule?O A. Yes. In order to maintain such a high level of control, there can beno room for other political parties.B. No. Totalitarian governments require absolute freedom ofindustry.C. Yes, as long as there is direct democracy.D. No. A totalitarian government requires multiple parties toparticipate. A shift of the demand curve (an increase or decrease in demand) due a change in one or more of the determinants of demand causing people to buy more or less of the goods/services at the various prices*1 change in quantity demanded2 demand3 demand law of demand 4 change in demand If ABC and ABD are equilateral, which line segment if 60 clockwise rotation of AB about the point A? Is censorship in any form justified? que tipo de lenguas han influido grandemente enel espaol se hablan. mas de 68 en el territorio nacional (m2-m-4)+(m-5) (1 point) 5-Resuelve la sopa de letras:C H S J G I L V L M B V D C N M O Y T V I O D H Y C W W H D Q O A P S H J L O A P E K O O Y D B E Z I C W B U Z B A Q A A U L B O B N Z E B B L R N R Y I P N S V W T I Q B B O B S P E E R P O E M R S L D T A W M Y G U D B D A V R L R S A O A R R C S O D I D I C E D S O M A B A H T O A P O V D V V I C B C E R N W A M E T C X I M R B H C T T A A M O P M A X I D I E B K L D P U V U S G U O I U R G L A S C T F Z S E O O B C K I A L Q A R W A E B R R R S A W F D N O Z H D A K O A N I O T N A N J B N H I R C F I O L A C I O M O X E V R E A D A D M L R C K A S E I S S P H M B E W V P S D D U I B L J I B O P E T H R D E I N I K A O F G L M R S A A C L A R A B A N A O T A O A D A M Z T I V P O OE G W E M I H E S F B R N S T E Q U Z X S S C R Y A Z Z S N Z I C T A K A P O T H N M S I R T I R I E E H I R L H R W D S R M N S L B Z M Y K T Y B A L N O R A F I T S E V N I O S R T T U A A Z Z E U U A Z I S T U S L B R Q Y S H V T D N M C N X U L A D R H T V A F R N T I A N A E P L O G S E E P T A R G R I H U B O P O S E D O A F P T Q S T Q S C J A V G M I N A B L V M A L V C C O A B T B M H I W J V V I S K N J Z R D C D A I N V H P L O T Y R D O O N N Y O M E R N O S C O O R V E H M C Z F C R I X G A B C R O Z T P D A S T P V X M I O E C V Z P V B S R X M B C L B T P L V F P J A F H M U K A A Y P B W F I E L S A X N S C M Z A F V W C S H V N S O M A V L A S J R M A S P E N S E P M Z ZZ P A F I O N O A K P Z D O A D K U I E S P K Z N T D I E M S L A C O X V L T A M M W R F O S V Y Y T E R T X L D T W X Z R A S K O D D Z K X A C P E T E J A G O R R E T N I T L J F U N C I O N A R E M O S M K R G E N B A C R M M L J C R F O O O B N F C E M V B U E O K R I X H V P U P H L C W M G X Y X F H C V M I R A R A C N H L Y W M P O C H B L A R R ABRIRACLARABANAGUANTESAPROBAISCOLECCIONABANCOMPARTIRAMOSCOMPATIASCOMPRENDOCOMPROCOMUNICACONTEMPLARASCUIDARANDECLARADISFRUTARAERAESTABAFUNCIONAREMOSGOLPEANHABREMOSABRAZADOHABRBEBIDOHABRCOMIDOHABRCORRIDOHABRAESCRITOHABRASAMADOHABAHABAMOSDECIDIDOHBLARHUBIERAESTUDIADOHUBOPOSEDOINTERROGAINVESTIFARONLIMPIMIRARAMOVILIZANOLVIDAMOSOMOSPARTAPENSPERDIPLANTASQUEDARONQUERIDORECORRAREVISABASALVAMOSSENTASONRESOABATENGAIS Please help please I need help what are the''krantzers''? lim(x0)((1+x+x^2 )-1)/tan5x Someone please help me thank you Are the following polygons similar explain Use the graphling tool to determine the true statements regarding the represented function check all that apply Now round 0.065 to the nearest hundredth.0.065 rounds to? The force of gravity pulling down on thebarbell is 756 newtons (N) How manynewtons of force are exerted by theweightlifter to hold the barbell up?