In the osi model, what functions are performed at the presentation layer?

Answers

Answer 1

Data translation and data integrity maintenance are essentially the responsibility of the display layer. So these are the functions that performed at the presentation layer.

The sixth layer in the Open Systems Interconnection (OSI) model is the presentation layer. The OSI model is a concept used in computer networking to describe how data is transmitted from one computer to another. Each layer in the architecture is made up of a collection of protocols, or rules that regulate data transmission, that enable the layer to carry out activities required for transmission.

Even networks or machines with different operating systems or architectural designs may experience this. Data translation and data integrity maintenance are essentially the responsibility of the display layer. The OSI model consists of seven layers. Understanding the other six layers can help you comprehend the presentation layer.

The technique of data transfer from one computer to another is handled by the first three layers, also referred to as the lower or media layers. The top or host layers, which deal with how programs communicate with the network, are the only remaining layers. The seventh and uppermost layer is the one you directly interact with, hence the OSI model's layer order is reversed.

To know more about presentation layer click on the link:

https://brainly.com/question/12974549

#SPJ4


Related Questions

What term is used to describe the method that allows coplink to access many different databases of law enforcement agencies with varying data fields?.

Answers

The term is used to describe the method that allows copylink to access many different databases of law enforcement agencies with varying data fields is option c:  multi dimensional approach .

Why is a multidimensional approach important?

The multidimensional method enables us to assess a company's complex social behavior (for example, a company may only be socially responsible in the environmental dimension) as well as the perspectives of various stakeholders (i.e. shareholders that are made for the economic dimension as well as employees for the social dimension).

Illeris (2002, 2002) took into consideration the cognitive, emotional, and social elements of learning; this method is multidimensional. The Three Dimensions of Learning: Cognitive, Emotional, and Social.

Therefore, Development is multidimensional, which means that aspects like physical, emotional, and psychosocial development interact dynamically. Gains and losses occur as a result of development in many different directions throughout life. Characteristics can be changed since development is changeable.

Learn more about multi dimensional approach from

https://brainly.com/question/13791083
#SPJ1

See full question below

What term is used to describe the method that allows COPLINK to access many different databases of law enforcement agencies with varying data fields? Multi-dimensional Approach Clustering Approach Data Cube Approach Federated Approach

Primitive data types are predefined within the java language and named with a reserved word

a. True
b. False

Answers

Primitive data types are predefined within the java language and named with a reserved word is True

Sun Microsystems first introduced the programming language and computing environment known as java language in 1995. Through the provision of the dependable foundation upon which several services and applications are built, it has grown from modest beginnings to power a significant portion of the digital world of today. Java is still a crucial component of cutting-edge technologies and future-oriented digital services.

Even though the majority of current Java programs integrate the Java runtime with the program itself, there are still a lot of programs and even certain websites that require desktop Java to work. This website, Java.com, is designed for users who may still need Java for desktop programs, more specifically those that target Java 8. Anyone interested in learning Java programming, both developers and users

Learn more about java language here:

https://brainly.com/question/13153130

#SPJ4

During which step of the etl process can data that fails to meet expected patterns or values be rejected to help clean up dirty data?.

Answers

The extract is the step of the ETL process that can data that fails to meet expected patterns or values be rejected to help clean up dirty data.

What are the steps of the ETL process?

The five steps of the ETL process are as follows:

Extract.Clean.Transform.Load.Analyze.

Among the five above-given steps of the ETL process, extract, transform, and load are the most important process step of the ETL. The transformation step of an ETL process involves the execution of a series of rules or functions to the extracted data to convert it to a standard format. It is the third step of the ETL process.

While extraction is the first step of the ETL process that significantly imports and consolidates the structured and unstructured data into a single repository.

Therefore, the extract is the step of the ETL process that can data that fails to meet expected patterns or values be rejected to help clean up dirty data.

To learn more about the ETL process, refer to the link:

https://brainly.com/question/26801686

#SPJ1

suppose that you have a four-byte integer x that contains two sixteen-bit values, one in the high sixteen bits and one in the low sixteen bits. you want to store the value of the integer in the high sixteen bits to a second variable y. what types of operations must you use to accomplish this?

Answers

Answer:idrk whats the assement name

Explanation:

Which of the following became the standard PC in the Personal Computer Era? A) Wintel PC B) DOS PC C) MITS PC D) Altair E) Apple II

Answers

Wintel PC is the correct answer. This became the standard PC in the Personal Computer era.

The IBM PC was the most widely used personal computer in the world, and both its operating system, which was based on Microsoft Corporation's MS-DOS system, and its CPU, the Intel 8088, became industry standards. When Steve Jobs and Steve Wozniak created the Apple computer in 1976, the personal computer era officially began. The personal computer was transforming culture by the 1980s, and libraries jumped on board the change. How many computers can handle data, based on their capacity? Three different computer types—analogue, digital, and hybrid—are categorized based on how well they can handle data.

Learn more about computer here-

https://brainly.com/question/21080395

#SPJ4

vincent is performing a wireless environment analysis and wishes to identify factors that affect signal propagation. which factor is least likely to impact wireless signals?

Answers

Since Vincent is performing a wireless environment analysis and wishes to identify factors that affect signal propagation. the factor that is least likely to impact wireless signals is Time of day

How do wireless signals work?

Electromagnetic waves that are traveling through the atmosphere are wireless signals. These are created when electric energy passes through a metal object, such a wire or an antenna, and waves are created all around that object.

In summary, the manipulation of radio waves enables the wireless transport of data. These waves are produced by creating electrical pulses in a natural way. Then, in order to transmit sound or data, these radio waves might have their amplitude or frequency altered.

Learn more about wireless signals from

https://brainly.com/question/23091703
#SPJ1

What is a best practice when using remote desktop protocol (rdp) to access another computer?

Answers

The Remote Desktop Protocol (RDP) is a protocol or technical standard for remotely accessing a desktop computer.

RDP, Independent Computing Architecture (ICA), and virtual network computing (VNC) are all protocols that remote desktop software can use, but RDP is the most commonly used. A VPN establishes a secure, encrypted connection over an insecure network, such as the internet. VPN technology was created in order to allow remote users and branch offices to securely access corporate applications and other resources. VPNs enable remote employees to route their online activity through a secure server capable of directly connecting them to their company's network. These systems encrypt data sent over the network so that it is unreadable even by those with access to it.

Learn more about protocol here-

https://brainly.com/question/27581708

#SPJ4

After pitching her game to a room full of investors, Zoie has confirmed that two of the investors are very interested in learning more. They both called and asked Zoie for a game proposal. What is a game proposal used for?

A.) It is used as the graphical overlay on a game which displays feedback for the player.

B.) It is used to secure funding for the project from venture capitalists or publishers, or with internal teams within the company, taking the concept and ideas about the game and starting to turn them into specifics.

C.) It is the teaser for the game, which is used to sell the game to the team, investors, target audience, or anyone else who might be interested in the game.

D.) It is used to list the different subtasks of a game development project, along with their estimated time and progression.

Answers

Answer: B

Explanation:

it is used to secure funding for the project from venture capitalists or publishers, or with internal teams within the company, to take the concept and ideas about the game and start to turn them into specifics

What protocols is the one that is most likely to require irb review?

Answers

Research involving a human subject protocols is the one that is most likely to require irb review.

Introduces the ethical and governing concerns surrounding the use of human subjects in research. It gives an explanation of the informed consent procedure and the Common Rule, a set of rules that several U.S. federal agencies have embraced.

Certain categories of researchers must complete RCR training in order to work with the National Institutes of Health (NIH), National Science Foundation (NSF), and U.S. Department of Agriculture (USDA). Regardless of a researcher's funding source, RCR is increasingly seen as a crucial part of training.

The key RCR issues, such as authorship, collaborative research, conflicts of interest, human subjects, and research misconduct, are thoroughly reviewed in this course. The use of case studies and audiovisual examples to illustrate crucial ideas.

To know more about research click on the link:

https://brainly.com/question/18723483

#SPJ4

A study to test a newly created wheelchair by having senior citizens use it.

To know more about irb review :

https://brainly.com/question/28902906

#1234

While social security benefits millions of americans, the system is not perfect. In what ways is inequality built into the social security system?.

Answers

Growing economic disparity directly jeopardizes the financial stability of Social Security. The total wages of low- and middle-income workers are strongly correlated with Social Security's funding due to the payroll tax cap, but not the full wages of higher-earning workers.

What is the Social Security system?

The phrase "Social Security" is frequently used in the United States to refer to the Old Age, Survivors, and Disability Insurance program, which is run by the Social Security Administration (SSA). The Social Security Act was first passed in 1935, and its present, revised form now includes a number of social welfare and insurance programs.

To get more information about Social Security :

https://brainly.com/question/23913541

#SPJ1

I use a Dell Precision T3500 with 24 GB of ram and an Intel Xeon X5690 with 3.47 GHz, and I wanted to know, would an RTX 3050 from nvidia work just fine with this computer?

Answers

Answer:

yes it would

Explanation:

as long as it's fast enough you'll be fine.

where should an organization's web server be placed?

Answers

There should be a web server in the demilitarised zone (DMZ). A network with resources that are open to the public is called the DMZ. A firewall guards the DMZ, which is situated in between the private network and an untrusted network (like the internet).

A private network (LAN) called an intranet uses internet information services only for internal usage. A website's server shouldn't be located on the intranet because it should be accessible to the whole public.

A network that is privately run and separate from the intranet is called an extranet. Between a private LAN and the internet lies an extranet. Business associates, suppliers, and sometimes even clients from outside the corporation are given access to resources through an extranet. There should not be a web server there.

Learn more about DMZ :

https://brainly.com/question/21420867

#SPJ4

a 64-bit processor is required for a computer on which you wish to install the hyper-v server role, along with what other technology?

Answers

A 64-bit processor is required for a computer on which you wish to install the hyper-v server role, along with the Data Execution Prevention (DEP) feature.

What do you mean by 64-bit?

64-bit integers, memory addresses, or other data units[a] in computer architecture are those that are 64 bits wide. Furthermore, 64-bit CPUs and ALUs are those that utilise processor registers, address buses, or data buses of that size. A 64-bit computer is one that employs such a processor. 64-bit computing refers to the usage of machine code with 64-bit virtual memory addresses in software. However, not all 64-bit instruction sets support full 64-bit virtual memory addresses; for example, x86-64 and ARMv8 support only 48 bits of virtual address, with the remaining 16 bits of virtual address requiring all 0's or all 1's, and several 64-bit instruction sets support fewer than 64 bits of physical memory address.

To learn more about 64-bit

https://brainly.com/question/11633895

#SPJ4

the following code computes the product of a and b. what is its runtime?

int product (int a, int b) { int sum =0; for (int i=0; i< b; i ) { sum = a; } return sum; }

Answers

Since neither loop depends on the other, the two loops are independent. Therefore, we may define the difficulty of the two stacked loops as the sum of the difficulties of the separate loops.

The inner loop in j is O(lgn) and the outer loop in I is O(n) in this scenario (log base 2 of n). The total time is therefore O. (nlgn). The term is derived from the separation between compile time and runtime in compiled languages, which also distinguishes between the computer operations involved in creating a program (compilation) and running it on the target machine (the run time). Consider the following for a n of 16 to understand why the inner loop is O(lgn): j | step# 1 | 1 2 | 2 4 | 3 8 | 4 16 | 5.

Learn more about loop here-

https://brainly.com/question/14390367

#SPJ4

Which of the following are examples of security threats?

Select all of the boxes that apply.

antivirus software

bugs

power surges

theft of hardware

Answers

Answer:

b,c.d

Explanation:

bc i got it wrong

Answer:

B, C, D

Explanation:

all 3 and got correct

What should you insert if you want to print one page of a document in landscape orientation while the rest of the document prints in portrait?.

Answers

There are two orientations in a document in Microsoft office which include landscape and portrait. These orientations can be changed form the Page Layout option.

What are orientations?

There are two common types of orientation in a document which are portrait and landscape. Portrait denotes a format of printed matter which is higher than the width. Landscape denotes a format of printed matter which is wider than the height. So, the printing orientation that is wider than the length is landscape.

To change the orientation: Select the pages or paragraphs whose orientation you wish to change. Then, Click PAGE LAYOUT > Page Setup dialog box. In the Page Setup box, under Orientation, click on the Portrait or Landscape mode. Then, Click to the Apply to box button, and click Selected text.

Learn more about Orientation here:

https://brainly.com/question/14691941

#SPJ1

While reviewing an audit log, a financial institution employee notices that several attempts were made by a user to bypass the authentication process. The user attempted to log in ten times in twenty minutes using various methods, though the user never gained visible access. Which of the following describes what the employee should do next?

a. Nothing, the user did not gain access.
b. Clear the audit log, in case of error.
c. Continue to monitor the log until the user authenticates.
d. X Escalate the information to a security manager.

Answers

In GDPR and other privacy laws, the data controller bears the most responsibility for protecting the privacy and rights of the data subject, such as a website user.

Simply put, the data controller is in charge of the procedures and purposes for which data is used. Depending on the type of data involved, the consequences can include database destruction or corruption, the leak of confidential information, intellectual property theft, and regulatory obligations to notify and possibly compensate those affected. For good data management, four major pillars must be considered: strategy and governance, standards, integration, and quality. Most importantly, an organization must embrace data as a corporate asset in order to be data-driven.

Learn more about data here-

https://brainly.com/question/10980404

#SPJ4

true or false? the index of the coding manual contains two tables to help facilitate locating certain diagnostic codes

Answers

Yes, it is true that the index of the coding manual contains two tables to help facilitate locating certain diagnostic codes.

When determining whether to include a patient in a register, the diagnosis is frequently a crucial factor. Due in part to different obligations to precisely collect this data, the quality of diagnosis data is frequently adequate. In order to distinguish between active and inactive diagnoses, EHRs also feature problem lists; nevertheless, the validity of the data contained therein may require further investigation.

It can be difficult to convert diagnosis information from one coding system to another, and even more so to convert diagnosist codes from one coding system's version to another (e.g., mapping ICD-9 to ICD-10). In addition, a number of federal and state laws23 may restrict the ability to extract specific diagnostic codes for use in external registries, such as HIV status and diagnoses of mental illnesses.

TO know more about diagnosist codes click on the link:

https://brainly.com/question/14592968

#SPJ4

which one of the following is a correct declaration for a function named passvect with the vector parameter mynum of size 10, so that the function modifies the contents of the actual parameter mynum?

Answers

The contents of the actual parameter mynum
1)  c)  void passvect(vector& mynum);
2)  d) can be passed either way, but it is best to pass by reference.
3)  d) 10
4)  a) 0

What is parameter?
A parameter, also known as a formal argument in computer programming, is a particular type of variable that is used in a routine to refer to a specific bits of data that are supplied as input to the procedure. These bits of information represent the values of the arguments (also known as real arguments or actual parameters) that will be used to call or invoke the function. A subroutine is typically defined with an ordered list with parameters so that each time the routine is called, its arguments are evaluated for that call and the results can be assigned to the associated parameters. In contrast to how the term "argument" is typically used in mathematics, "argument" in computer science refers to the actual input expression that is passed or supplied to a function, procedure, or routine in the call statement, whereas "parameter" refers to the variable inside the subroutine's implementation.

To learn more about parameter
https://brainly.com/question/15170808
#SPJ4

Write a while loop that reads integers from input and calculates finalVal as follows:


If the input is divisible by 3, the program outputs "hit" and increases finalVal by 1.

If the input is not divisible by 3, the program outputs "miss" and doesn't update finalVal.

The loop iterates until a negative integer is read.


Ex: If the input is 6 9 4 -2, then the output is:


hit

hit

miss

Final value is 2


Note: x % 3 == 0 returns true if x is divisible by 3.


Code:


#include

using namespace std;


int main() {

int in;

int finalVal;


finalVal = 0;

cin >> in;


/* Your code goes here */


cout << "Final value is " << finalVal << endl;


return 0;

}

Answers

Using the knowledge of computational language in C++ it is possible to write a code that write a while loop that reads integers from input and calculates finalVal.

Writting the code:

#include <iostream>

using namespace std;

int main() {

   int numInput;

   int result;

   result=0;

   cin>>numInput;

   while(numInput>0){

       if(numInput%4==0)

           cout<<"miss\n";

       else{

           cout<<"hit\n";

           result+=1;

       }

       cin>>numInput;

   }

   cout<<"\nResult is "<<result<<endl;

   return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

Explain how you can legally use a song without the songwriters permission

Answers

Original creators, like musicians, have copyright protection over their works, which means they have the sole right to perform or duplicate those compositions. If you violate their rights by using their music without permission (that is infringe on their rights), you may face legal consequences.

What is copyright infringement?

The use or creation of copyright-protected content without the authorization of the copyright holder is copyright infringement. Copyright infringement occurs when a third party violates the rights granted to the copyright holder, such as the exclusive use of a work for a specific period of time.

Copyright infringement is prohibited. Copyright infringement is frequently a civil rather than a criminal matter. Copyright infringement penalties often involve a fee and/or restitution to the harmed party.

Learn more about the right Infringement:
https://brainly.com/question/1078532
#SPJ1

hakim is a network engineer. he is configuring a virtual private network (vpn) technology that is available only for computers running the windows operating system. which technology is it?

Answers

The technology is secure socket tunneling protocol (sstp). A virtual private network (VPN) tunnel called Secure Socket Tunneling Protocol (SSTP) offers a way to send PPP data over an SSL/TLS channel.

A virtual private network (VPN) tunnel called Secure Socket Tunneling Protocol (SSTP) offers a way to send PPP data over an SSL/TLS channel. By combining key negotiation, encryption, and traffic integrity checking, SSL/TLS offers transport-level security. Except for authorized web proxies, almost all firewalls and proxy servers can be bypassed by using SSL/TLS across TCP port 443 (by default; port can be altered).

Authentication for SSTP servers is required during the SSL/TLS stage. Authentication for SSTP clients is required during the PPP phase but is optional during the SSL/TLS phase. Common authentication techniques like EAP-TLS and MS-CHAP are supported by PPP. For Linux, BSD, and Windows, there is SSTP.

To know more about SSTP click here:

https://brainly.com/question/4674025

#SPJ4

a computer excels at applications which do not require a large amount of precise user input and is designed to be held in one or two hands

Answers

The underlined word (excel) is similar in meaning to: A. Surpass.

What is a synonym?

A synonym can be defined as a type of word that has the same meaning as a listed word. This ultimately implies that, two or more words that are similar in meaning are referred to as synonyms.

In English literature, some examples of synonyms include the following:

Innovative: new.Shut: close.Old: elderly.Loyal: faithful.Vociferous: stridentDangerous: hazardous.Destitute: poor.Stymie: deduceExcel: surpass

In conclusion, excel and surpass are synonyms because they describe the higher abilities of a tablet in comparison with other mobile computing devices, based on the amount of precise user input.

Read more on synonyms here: https://brainly.com/question/24870405

#SPJ1

Complete Question:

Tablet. A tablet, tablet computer or tablet PC is a mobile computing device designed to be held in one or two hands. It is typically the size of a book (7 inches or bigger) and resemble a large smartphone.

Tablet let the users do many of the same things as a traditional computer. They can browse the internet, connect to social network apps, and display HD videos. They excel at application which do not require a large amount of precise user input.

Early tablet devices used light pens or a stylus as their input devices. However, today all tablets use a touchscreen as their primary input devices with the option to connect external devices such as a keyboard. Most tablet only have a few physical buttons, the back power, and volume buttons and everything else can be done using your fingers. Today there are top two operating systems used with tablets. A tablet can have apps installed onto them to perform a function.

The concept of a tablet was first sketched by Alan Kay while at Xerox in 1971 and since then there have been many iterations of tablet devices including PDA’s predecessors to the tablet.

“They excel at applications which do not require a large amount of precise user input”

The underlined word is similar in meaning to?

answer choices

Surpass

Solve

Beat

Get over

Be talented

I/O systems (networking, video, etc.) suffer the biggest performance hit in virtualized systems.

a. True
b. False

Answers

Option a is correct. It is true that I/O system (networking, video, etc.) suffer the biggest performance hit in virtualized systems.

An information processing system called I/O (Input/Output) is made to send and receive data from a network, device, or piece of computer hardware.

Over a network, data can be sent between devices. Computers couldn't communicate with other systems or devices without I/O.

In the domain of I/O, input devices and output devices are the two main categories of hardware.

Only data input into another device is possible with input devices. A mouse is an example of an input device because it can only transmit data to a computer; it cannot receive or replicate data from the computer. Only the output of data from one device is received by output devices.

To know more about I/O click on the link:

https://brainly.com/question/17226929

#SPJ4

a pre-designed spreadsheet that is a version of a common document type, like an invoice, is called a(n) .

Answers

A free excel template is a predesigned spreadsheet that has already been created with specified formulae. Free excel templates don't even require you to know how to create formulae because the spreadsheet already includes these features.

Explain about the Pre designed spreadsheet?

A spreadsheet is a piece of software that can store, display, and edit data that has been organized into rows and columns. One of the most used tools for personal computers is the spread sheet. A spreadsheet is typically used to record numerical data and brief text strings.

A predesigned Excel worksheet called a "template" can be used to create new worksheets with the same design, style, and calculations. Because they are already included in the spreadsheet, using templates eliminates the need to generate the fundamental components from scratch each time.

Template a pre-made document that is a variation of a typical document type, such as an invoice or a resume.

To learn more about Pre designed spreadsheet refer to:

https://brainly.com/question/25879801

#SPJ4

what is the name for the device that allows read-only access to all accessible data on a drive and keeps anything from being written to an original drive?

Answers

The name for the device that allows read-only access to all accessible data on a drive and keeps anything from being written to an original drive is write blocker

What is a Write blocker?

A writer blocker is any tool that provides read-only access to a data storage device without compromising data integrity. A writer blocker is any tool that provides read-only access to a data storage device without compromising data integrity. Proper use of write blockers ensures protection of the Data Chain of Custody. There are two main types of writer's blockers. The first type is hardware write blockers. These devices are typically placed between the evidence drive and the forensic workstation. The second type is software write blockers, sometimes built into computer forensics suites such as EnCase and FTK.Protecting the evidence drive from write operations during an investigation is also important to counter potential claims that the contents of the drive were modified during the investigation.

To learn more about data safety, refer

https://brainly.com/question/27034337

#SPJ4

(char)('a'+ Math.random() * ('z'- 'a'+ 1)) returns a random character ________. 36)

a. between 'b' and 'z'
b. between 'a' and 'y'
c. between 'b' and 'y'
d. between 'a' and 'z'

Answers

option d So, (char)('a'+ Math.random() * ('z'- 'a'+ 1)) returns characters from 'a' and 'z'.

Math.random() With an essentially uniform distribution throughout that range, the Math.random() method returns a floating-point, pseudo-random number that is higher than or equal to 0 and less than 1, which you can scale to your desired range. Using the random() method, you can get a pseudorandom double type number that is larger than 0.0 and less than 1.0. When this method is called for the first time, it creates a single new pseudorandom-number generator, exactly as if by the expression new java.random will not return 1.0 itself; instead, multiplying what Math. random range returns with 100 will result in a maximum value of 99.999... and when cast to an int turns to 99. You must multiply by 101 since the randomly produced number must contain the digit 100.

Learn more about math.random() here

https://brainly.com/question/17586272

#SPJ4

small solid-state storage devices widely used within cell phones, laptops, and gps navigation systems are called

Answers

Memory cards are small solid-state storage devices widely used within cell phones, laptops, etc

The small solid-state storage devices widely used within cell phones, laptops, and GPS navigation systems are called a memory card.

What is solid-state storage?

An SSD, or solid-state drive, is a type of computer storage device. On solid-state flash memory, this non-volatile storage medium stores persistent data.

SSDs are hard disk drives (HDDs) that replace traditional hard disk drives (HDDs) in computers and perform the same basic functions as a hard drive.

The term "solid-state" refers to the path that electrical signals take through solid pieces of semi-conductor material.

Prior to the use of solid-state devices like the common transistor, electricity was passed through the various elements inside a heated vacuum tube.

Thus, memory cards are small solid-state storage devices that are widely used in cell phones, laptops, and GPS navigation systems.

For more details regarding SSDs, visit:

https://brainly.com/question/10395261

#SPJ2

isabelle is the cybersecurity engineer for a medium-sized company. she is setting up a firewall for examining inbound network traffic for a variety of characteristics. while remote users working from home should be allowed access to network resources, malicious traffic should be blocked. to differentiate, isabelle is looking at factors such as whether the inbound traffic is a response to a previous request inside the network, whether it includes blocked domain names, ip addresses and protocols, and whether it conforms to known malicious patterns or is otherwise abnormal. what is she setting up the firewall to practice?

Answers

The firewall is set up to practice filtering in the computer system which prevents the unauthorized access into the company's network. Thus, the correct option is A.

What is Cybersecurity?

Cybersecurity or information technology security is the protection of the computer system and networks from the information disclosure and theft or damage to the system or network from public network.

Firewall acts as a filter between internal network and the public network. The firewall keeps out the dangerous traffic from network. Thus, isabelle will set up the firewall for filtering to check the inbound network traffic for various features.

Therefore, the correct option is A.

Learn more about Cybersecurity here:

https://brainly.com/question/27560386

#SPJ1

Your question is incomplete, most probably the complete question is:

Isabelle is the cybersecurity engineer for a medium-sized company. she is setting up a firewall for examining inbound network traffic for a variety of characteristics. while remote users working from home should be allowed access to network resources, malicious traffic should be blocked. to differentiate, isabelle is looking at factors such as whether the inbound traffic is a response to a previous request inside the network, whether it includes blocked domain names, ip addresses and protocols, and whether it conforms to known malicious patterns or is otherwise abnormal. what is she setting up the firewall to practice?

A. Filtering

B. Modeling

C. Access management

D. Active Hub

Installing a device driver can sometimes cause system instability.

a. true
b. False

Answers

Answer:

the answer of your question is a. true

Installing a device driver can sometimes cause system instability, is the true statement.

What is meant by Installing a device?

Through installation, hardware and/or software are made operational. installing a heating system or software on a computer involves situating or attaching something for use or service.  to establish oneself in a new place; to move into a new workplace, location, or employment. to formally welcome someone into a job or position of authority.

The locks on every door have been replaced. We debated installing a new phone system. When a computer is purchased, the software is already pre-installed on it. The software is easy to install on your hard drive.

An installation is a place where tools and machines are kept that are used for a particular job. The building was changed into a clandestine military installation.

Thus, it is a true statement.

For more information about Installing a device, click here:

https://brainly.com/question/28045764

#SPJ12

Other Questions
q + ad = m solve for a 1. What "American" values or ethics does Frederick Douglass seem to embrace or reject? How might we compare Douglass with Thoreau in this regard? How does each view the individual's relationship with society? 2. Harriet Ann Jacobs makes multiple direct appeals to her audiencewhat are these appeals? Who is the intended audience, and how do we know that? 3. How was Sojourner Truth's famous speech "Ain't I a Woman?" unique from other abolitionist speeches given at that time? Give at least two reasons. HELP ME OUT PLEASE!!!!!!!! The distance from Fort Worth to Austin is about 190 miles. Which of the following equations describes the remaining distance to Austin for a car that travels from Fort Worth at a rate of 65 miles per hour? Carter is planning a backpacking trip in the mountains. To prepare for the trip, he has purchased the gear he needs and is planning his meals. He knows it will be cold in the evenings, and he would like a warm meal. Although it will cost more than using a camp stove to heat purified water from the trail and prepare dehydrated food, Carter is considering the use of self-heating containers. He evaluates containers that use the heating systems given in the table. Identify two potential constraints for the system Carter may choose, one based on the specific needs of the situation and one considering environmental impacts or costs. Develop criteria based on scientific understanding of energy transfer that can be used to evaluate potential solutions for his choice in system. Analyze the costs and benefits of using self-heating containers compared with using a camp stove. paragraph about Salem in The Crucible a solution was prepared by dissolving 35.0 gg of kclkcl in 225 gg of water. part a calculate the mass percent of kclkcl in the solution. express your answer with the appropriate units. Using the figure below, Maggie used the definition of vertical angles to help her solve for x. Since vertical angles are congruent, she set the two given expressions equal to each other. After solving for x, her teacher said she got the wrong value for x. Explain where Maggie made her mistake when solving for x. 2. A secretary in an accounting office takes home a printer she found stored in the closet at work. She reasons that no one has been using it so she might as well get some use out of it. What kind of crime is this an example of? O Individual Occupational Crime O State Authority Occupational Crime Organizational Occupational Crime Professional Occupational Crime which word best describes pete Seegers attitude toward the HUAC in this testimony? 100 points Type a hamburger paragraph about your favorite book, short story, poem, author or genre. Tell me why you like it, and how it connects to who you are as a person. What word signal the start of the flashback question 4 scenario 1, continued next, you begin to clean your data. when you check out the column headings in your data frame you notice that the first column is named company...maker.if.known. (note: the period after known is part of the variable name.) for the sake of clarity and consistency, you decide to rename this column company (without a period at the end).assume the first part of your code chunk is:flavors df %>%what code chunk do you add to change the column name? 0 / 1 point rename(company...maker.if.known. the discovery of any kind of life beyond the earth would What is anequation of the line that passes through the points (4, 0) and (3,1) a solution of permanganate is standardized by titration with oxalic acid (h2c2o4). it require 28.97 ml of the permanganate solution to react completely with 0.1058g of oxalic acid. start off by writing a net ionic equation and balancing with the appropriate method. what is the molarity of the permanganate solution? The product of -1/a 0, and it's reciprocal is?A. a/2B. 2/aC. -2/aD. None are correct The line y 14 = 6(x 2.5) represents Barrys profit, y, from selling x painting, aftser buying some canvas. What was the cost of the canvas? What do you like about ocean waves? Determine 3 things you like about it.(Please be specific) PLEASE HELP I GIVE YOU 20 POINTS PLEASE HELP ME PLEASE HELP IF YOU GIVE ME THE RIGHT ANSWERS I GIVE YOU 20 POINTS PLEASE HELP PLEASE HELP ME3. Create a "role-play" or "practice session" between you and an imaginary person who is either abusing drugs or encouraging you to abuse drugs. Include in your role-play these items:a. The persons involvedb. The scenarioc. The dialogue between you and your friendsd. What you would say to them to discourage their abuse of drugse. What you would say or do to refuse to participate4. Summarize your thoughts on the following questions.a. What are the dangers of over-the-counter drugs?b. What can you do to reduce the risk of abusing over-the-counter drugs? the group most likely to experience information overload, when they process information visually under conditions of goal expectations are: