DRU is a small brokerage house that enables its clients to buy and sell stocks over the Internet, as well as place traditional orders by phone or Fax. DRU has just decided to install a new e-mail package. One vendor offering an SMTP-based two-tier client -server architecture. The second vendor is offering a Web-based e-mail architecture. DRU doesn’t understand either one but thanks the Web-based one should be better because, in their words, "the Web is the future". (a) Briefly explain to DRU management, in layperson’s terms, the difference between the two. (b) Outline the pros and cons of the two alternatives and (c)Recommend to DRU about which is better.

Answers

Answer 1

Answer:

(A) A SMTP is a guideline that allows a client to send a message to the server in a network.

The web based mail is a kind of interface by which a correspondence occurs by applying the web explicit conventions or standards fro most of the time.

(B)The pros of an SMTP based two tie client server architecture are that, it has a free platform and a simple set up, also a detailed conversation between a client and a server.

The cons involve, having a blocked SMTP ports, and the slow execution of mass mail.

For the Web based the pros are, no blockages are found, email responses are very quick.

It's cons are, it has a complex kind of arrangement.

(C)What is recommended in this case for DRU is to use the SMTP based two tier client server architecture because, it is quicker, faster, secure and easy to fix.

Explanation:

Solution

(A) A Simple Mail Transfer Protocol (SMTP) is a standard in a which a customer sends messages over to the server in a network.

The sending of emails determines the manner of communication between the server and customer or client. this starts of with a TCP association with a particular port. the customer sends out different snippets of data, and then the server needs to have to look for the verification and email.

A web based email is a kind of interface where the correspondence occurs by making use of web -explicit conventions, for most of the time, the  HTTP will allow you to integrate capacities from assistance coming from outside into your application.

(B) (i) SMTP based two tier client server architecture:

The pros or advantages:

It is platform free and has a simple set up

A complete conversation or communication between the server and the client.

The cons or disadvantages:

A blocked SMTP ports

For a mass email it has a slow execution or implementation

(ii) For the web based the pros and cons is stated below:

The pros:

No blockage is found

Quick email response or transfer or movement.

Cons or disadvantages:

It has a complex or difficult arrangement

Complexity of any type increases or goes higher.

(C) What i will recommend for DRU will be the SMTP based two tier client server architecture due to the following reasons shown below:

It is quicker

It is faster

It is more secure/security

It does not require any high skill to use it;s service

It is easy to fix.


Related Questions

Internally, a bin heap is typically implemented as a BST that has the additional ordering property that the minimum value is at the root (or the maximum value is at the root, if we chose to make the bin heap to be a max heap).
a) True
b) False

Answers

Answer:

True is the correct answer to the given question .

Explanation:

Heap is the complete binary tree that meets the property of organizing the heap There are two types heap max heap and min heap .The value in the heap of every node is greater than or equal to its parent 's value or less then equal to the  parent with there dimension of the minimum value or the maximum value just at the root.

So the binary heap is configured as a Binary Search Tree with the external organizing attribute that perhaps the mean price is in the root with maximum value .

Therefore the given statement is true .

The list of lists below is meant to represent the money raised by a charity over multiple days. The inner lists represent each donation, and the outer list represents each day. Use a for loop to calculate the sum of all the numbers in this list of list of numbers, to print the total amount of money raised.
code given:hourly_donations_per_day = [[44, 33, 56, 27, 33, 25],[12, 15, 22, 19, 21],[36, 34, 32, 37, 28, 11, 35],[20, 19, 29],[22, 27, 21, 15, 26, 15]]

Answers

Answer:

Following are the code to this question:

hourly_donations_per_day = [ #declaring list of lists and assign values

[44, 33, 56, 27, 33, 25],

[12, 15, 22, 19, 21],

[36, 34, 32, 37, 28, 11, 35],

[20, 19, 29],

[22, 27, 21, 15, 26, 15]

]

total_amount_of_money_raised = 0#defining a variable and assign a values 0

for i in hourly_donations_per_day:#defining loop to count values donation  

       if isinstance(i,list): #using if block to add donation values

               for j in i:#defining loop for add list values

                   total_amount_of_money_raised += j #add all values in total_amount_of_money_raised variable

print(total_amount_of_money_raised) #print value

Output:

714

Explanation:

In the above code, a list of the list is declared in which, it assigns the multiple values, in the inner lists it represents donation value and in the outer list it represents the day. In the next step, a variable "total_amount_of_money_raised" is declared that assigns a value 0, in the next step, multiple for loop is declared which is used to add list donation value and at the last print, the method is used to print its value.    

Complete the method, print Multiples(), that takes in a positive integer n, and another positive integer, max. Print out all the multiples of n that are less than or equal to max. Print each multiple on a separate line. For example, if the method is called with n

Answers

Answer:

public static void printMultiples(int n, int max){

    for (int i=1; i<=max; i++){

        if(i%n == 0)

            System.out.println(i);

    }

}

Explanation:

Create a method called printMultiples that takes two parameters n and max

Inside the method, create a for loop that iterates from 1 to max. If i, a number between 1 and max, % n is equal to 0, that means the number is a multiple of n, print the number.

What are entity-relationship diagrams and how are they used? What symbol is used for a relationship? What is an associative entity? Provide an example.

Answers

Answer:

The definition including its given problem is outlined in the following segment on the clarification.

Explanation:

Entity-relationship (ER) diagram describes how mechanical stored procedures are constructed and demonstrate the overarching representation of the situation. It also describes the connections between some of the entities of the framework and even the comparison with standard measurements.For something like an individual relationship structure, the normal representation of connections seems to be a diamond. Associative institutions have several to many partnerships to communicate with. It's indeed the verb throughout a diamond-shaped form that holds two organizations around each other. This verb is in fact an entity on its own, therefore it must be termed an associative entity.An illustration of such might be if a participant were to register for a class. Multiple individuals will be registered for several courses, and there have been many to several relationships; thus, the associative object will indeed register.

DOLLAR GENERAL
x
Knowledge Check
Non-employees are allowed in the store before the store opens and after
closing time.
True
False
SUBMIT​

Answers

Answer:

False

Explanation:

Unless authorized by a manager. Only staff members are allowed in the store before and after normal store hours.

Answer:

The correct answer is

False

If you are not an employee you are not allowed in stores before opening hours or after closing time. The only times non-staff are allowed in the store is for purchasing of products during hours of operation.h

Hope this helps!

Open the Undergrad Debt data in the Excel file. Nationally, on average, a college student last year graduated with $27,200 in debt with a historical standard deviation of $5,000. The file gives sample date from Arkansas.
Does Arkansas students have higher debt than the national average at alpha equal to 10?

Answers

Answer:

Arkansas students have higher debt than the national average, $27,200.

Explanation:

The provided data is:

S = {24040, 19153, 26762, 31923, 31533, 34207, 14623, 24370, 31016}

In this case we need to test whether Arkansas students have higher debt than the national average at alpha equal to 0.10.

The hypothesis can be defined as follows:

H₀: Arkansas students does not have higher debt than the national average, i.e. μ ≤ $27,200.

Hₐ: Arkansas students have higher debt than the national average, i.e. μ > $27,200.

Compute the sample mean:

[tex]\bar x=\frac{1}{n}\sum X=\frac{1}{10}\times 213537=21353.70[/tex]

As the population standard deviation is provided, we will use a z-test for single mean.

Compute the test statistic value as follows:

[tex]z=\frac{\bar x-\mu}{\sigma/\sqrt{n}}=\frac{21353.70-27200}{5000/\sqrt{10}}=-3.70[/tex]

The test statistic value is -3.70.

Decision rule:

If the p-value of the test is less than the significance level then the null hypothesis will be rejected.

Compute the p-value for the test as follows:

 [tex]p-value=P(Z>-3.70)=P(Z<-3.70)=0.00011[/tex]

*Use a z-table for the probability.

The p-value of the test is 0.00011.

p-value = 0.00011 < α = 0.10

The null hypothesis will be rejected.

Thus, it can be concluded that Arkansas students have higher debt than the national average, $27,200.

Two stations running TCP/IP are engaged in transferring a file. This file is 1000MB long, the payload size is 100 bytes, and the negotiated window size is 1000 bytes. The sender receives an ACK 1200 from the receiver.

Requried:
a. Which bytes will be sent next?
b. What is the last byte number that can be sent without an ACK being sent by the receiver?

Answers

Answer:

a. 2100

b. 2199

Explanation:

GIven that:

The file size = 1000 MB

The  payload size is  = 100 bytes

The negotiated window size is = 1000 bytes.

This implies that the sliding window can accommodate maximum number of 10 packets

The sender receives an ACK 1200 from the receiver.

Total byte of the file is :

1000 MB = 1024000000 bytes

a.

Sender receives an ACK 1200 from the receiver but still two packets are still unacknowledged

=1200 + 9 * 100

= 1200 +  900

= 2100

b. What is the last byte number that can be sent without an ACK being sent by the receiver?

b. Usually byte number starts from zero, in the first packet, the last byte will be 99 because it is in 1000th place.

Thus; the last byte number send is :

= 1200 + 10 *100 -1

= 1200 + 1000-1

= 1200 + 999

= 2199

Write an expression using membership operators that prints "Special number" if special_num is one of the special numbers stored in the list special_list

Answers

Answer:

In python, the statement can be written as:

if(special_num in special_list): print("Special Number")

Explanation:

We need to create a list with the name 'special_list' with some values and then check whether special_num is in the list or not using the membership operator.

Membership operator in python: in

Let us do it step by step in python:

special_list = ['1', '2', '3','4']      #A list with the values 1, 2, 3 and 4

special_num = input("Enter the number to be checked as special \t")

#Taking the input from the user in the variable special_num.

if(special_num in special_list): print("Special Number")

#Using the membership operator in to check whether it exists in the list or not.

Please refer to the image attached for the execution of above program.

So, the answer is:

In python, the statement can be written as:

if(special_num in special_list): print("Special Number")

A developer and tester were jointly interpreting a user story and studying the acceptance criteria. The tester wrote a test scenario that the developer felt was invalid. The tester was adamant that it was a valid test scenario and needed to be addressed. How can the dispute be resolved

Answers

Answer:

Discuss with product owner and ask if it is a valid scenario.

Explanation:

To resolove this, a discussion should be made with the product owner and the question on if it is a valid scenario should be asked.

Normally when there are issues like this, the product owner should be able to help sort out the issues. This should be the number one option to pick in cases like this where there are different opinions on what to do.

If you have taken any drugs, it's not safe to drive.
A. True
B. False

Answers

Answer:

True

Explanation:

It is risky to drive while you are on drugs!



11. Which one of the following buttons is used for paragraph alignment?

Answers

Answer:

C

Explanation:

Option A is used for line spacing.

Option B is used for right indent.

Option C is used for right paragraph alignment.

Option D is used for bullet points.

The button used for paragraph alignment would be option C.


How many searches should you complete when looking up information using online references?

Answers

As many as it takes of course ;)

Answer:

c

Explanation:

php Exercise 3: Function Write a function named word_count that accepts a string as its parameter and returns the number of words in the string. A word is a sequence of one or more non-space characters (any character other than ' '). For example, the call of word_count("hello, how are you?") should return 4. Constraints: • Do not use any data structures such as arrays to help you solve this problem. • Do not use the String function explode on this problem. • But you can declare as many simple variables like Integer, String, etc. as you like. Keep it simple.

Answers

Answer:

<?php  

function word_count($string){   // function that takes a string a parameter and returns the number of words in that string

   $space = 0;   // this variable is used in order to detect space, new line and tab spaces in a string

   $words = 1; // this variable is used to identify word presence in string

   $include = $space;  //used to maintain the state of $words and $space

   $counter = 0;  // this counts the number of words in the string

   $i = 0;  //this moves through each character of the string

   while ($i < strlen($string)){  // iterates through every character of string until the last character of string is reached

       if ($string[$i] == " "||$string[$i] == "\n" || $string[$i] == "\t")  //if the space or new line or tab space is identified in the string

           $include = $space;  //set the state of include as space if the next character is a space newline or a tab space

       else if ($include == $space) {  //if next character is a word and current state i.e. $include holds $space

           $include = $words;   //  then set the state i.e. $include as $words

           ++$counter; } //increments i to move to next character at each iteration

       ++$i;  } //returns the number of words in a string

   return $counter; }

$str = "Hello, how are you ";  //sample string

echo "Words: " . word_count($str);  // calls word_count function to return number of words in str.

?>  

Explanation:

The program has a function word_count that accepts a string as its parameter and returns the number of words in the string. In the function there are three variables $space and $words and $include used as state variables. For instance $space identifies space, new line and tab spaces in the $string so it specifies that a space has occurred. $words identifies words in the $string so it specifies that a word has occurred. $include holds this state information. $i moves through every character of the $string and when a space occurs in the $string then the state $include is set to $space. When a word occurs then state $include is set to $words. $counter variable, which is used to count the number of words is incremented to 1 when previous state is $space and next character is a word character. Every time a word is seen in the string, this variable is incremented to 1 to keep track of number of words in the string. When $i reaches the end of the string then this loop stops and counter returns the number of words in the $string.

James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the data is no longer on the drive before he throws it away. What can James use to wipe the data clean?

a. Zero-fill utility
b. Format the drive
c. ATA Secure Erase
d. Smash the USB drive

Answers

Answer:

C. ATA Secure Erase

D. Smash the USB drive

Explanation:

Zero fill utility is a specialized way of formatting a storage device particularly secondary storage such as hard disk, flash drive e.t.c. In this process, the disk contents are overwritten with zeros. Once this has been done, undoing is essentially hard but possible. In most cases, this might just mean that the data content is corrupt and as such might still be recovered, maybe not in its pure entirety.

Formatting the drive on another hand does not essentially mean cleaning the drive and wiping off data. It just means that operating systems cannot see those data contents anymore. They are still present in the drive and can be recovered.

ATA Secure Erase is actually a way of completely and permanently erasing the content in a drive. Once the function has been done, undoing is not possible. Both the data content and even the data management table will be completely gone.

Smashing the USB drive is the surest way of cleaning data as that will permanently destroy the working components of the drive such as the memory chip. And once that happens then there's no drive let alone its contents.

All the protocol layers of the internet (Application, Transport. Network) were originally without any security. TLS is one of the security architectures added later. In the Internet protocol stack. TLS is located:________. 1. right above the application layer 2. right below the application layer 3. right below the transport layer 4. right above the IP layer

Answers

Answer:

2. right below the application layer

Explanation:

TLS (Transport Layer Security) is an improved and more secured version of the SSL (Secure Socket Layer) used as cryptographic protocol for providing authentication and encryption over a network. It is initialized at the transport layer of the IP stack and finalized at the application layer. In other words, it is located between the transport and application layer of the Internet protocol stack. And this is necessary so that data received in the application layer from the transport layer are protected from start to end between these two layers.

Therefore, it is safe to say that the TLS is located right below the application layer.  

Rijndael, AES, CCMP are same as well as different. They are same in terms of how encryption is done and different in terms of whether each one is a protocol, algorithm or a standard.CCMP is both, a protocol and a standard, Rijndael is:_________ a) standard only b) an algorithm c) a communications protocol. d) patented by US Government

Answers

Answer:

Option (b) is the correct answer to this question.

Explanation:

AES is based on Rijndael Algorithm.

The Rijndael algorithm enables a choice of block sizes and key sizes. The choices are for each of 128, 192, or 256 bits. Once NIST implemented Rijndael for AES, it only specified one block size,128 bits, but maintained three major lengths of selection. IEEE 802.11I go a step and further limits when both the main size and length of the block for 128 bits. It simplifies deployment and relieves users during development from having to make yet again another decision.

Other options are incorrect because they are not related to the given scenario.

Consider the following algorithm. x â 1 for i is in {1, 2, 3, 4} do for j is in {1, 2, 3} do x â x + x for k is in {1, 2, 3, 4, 5} do x â x + 1 x â x + 5 Count the number of + operations done by this algorithm.

Answers

Answer:

Number of + operation done by this algorithm is 60

Explanation:

i = 4

j = 3

k = 6

Now, let "n" be number of '+' operations

n = i × j + i × 2k

substituting the figures

n = 4 × 3 + 4 × (2 × 6)

n = 12 + 4 × 12

n = 12 + 48

n = 60

Answer:

i can't see some of the numbers

Explanation:

The blank function returns to the first character or characters in a text string based on the number of characters specified??? A. PROPER B. MID C. LEN D. LEFT

Answers

Answer: D.) LEFT

Explanation: LEFT is an excel function allows users to extract a specified number of characters starting from the left. The syntax goes thus :

=LEFT(text, [num_chars])

text: the original string in which characters are to be extracted.

num_chars : takes an integer, stating the number of characters to extract.

The proper function is also an excel function which sets the first character in each word to uppercase. The mid function is also used in text extraction starting from any position in the original string based on what is specified.

The LEN function is used to get the number or length of characters in a string.

Write the definition of the function displaySubMenu that displays the following menu; this function doesn't collect the user's input; only display the following menu:
[S]top – Press 'S' to stop.

Answers

Answer:

Using Python:

def displaySubMenu():

   print("[S]top – Press ‘S’ to stop.")

Using C++ programming language:

void displaySubMenu(){

cout<<"[S]top – Press ‘S’ to stop.";}

Explanation:

The function displaySubMenu() has a print statement that prints the following message when this function is called:

[S]top – Press 'S' to stop.

You can invoke this function simply by calling this function as:

displaySubMenu()

The function doesn't take any input from the user and just displays this message on output screen whenever this function is called.

In C++ you can simply call the function using following statement:

void main(){

displaySubMenu(); }

Write a python function absDiff(...) that takes two integers as parameters, gets the absolute value of both, subtracts the second from the first, and returns the difference.

Answers

Explanation:

Remember, an absolute value is the non-negative value of a number in this case the integer.

First, using the abs() function. Here's an example:

# Some random integers

variableA = -308

variableB = 301

Second, # Get the absolute values of those integers

absA = abs(variableA)

absB = abs(variableB)

Next,

# Output the results

print("Absolute values of integers with `abs()`:")

print("|", variableA, "| = ", absA, sep="")

Finally,

Use abs(variableA-variableB):

In [1]: abs(-308-301)

Out[1]: 307

For vulnerable road users, the areas where roadways transition from one environment to another are...
A. the safest areas.
B. the most clearly marked areas.
C. the most dangerous areas.

Answers

The answer will be C- the most dangerous areas !!!

For vulnerable road users, the areas where roadways transition from one environment to another are the most dangerous areas. Thus the correct answer is C.

What is the environment?

An environment is refers to surroundings in which all the living and nonliving objects exist to survive life. This includes humans, animals, plants, and other resources.

the areas where roadways transition from one environment to another are the most dangerous areas because here drivers first recognize an approaching change in the nature of the roadway and then reduce their speed as appropriate.

Therefore, option C is appropriate.

Learn more about the environment, here:

brainly.com/question/518189?

#SPJ2

Which among the following enhances WS-Security to facilitate a mechanism for issuing, renewing, and validating security tokens?

a. WS-Trust
b. WS-SecureConversion
c. WS-SecurityPolicy
d. All of the mentioned

Answers

Answer:

a. WS-Trust

Explanation:

WS-Trust can be defined as a WS-specification as well as OASIS standard that help to provides extensions to WS-Security, in order to facilitate a mechanism for issuing, renewing, as well as validating of security tokens which is why the aim and objectives of WS-Trust is to help and enable applications to construct trusted SOAP message exchanges.

Nevertheless WS-Trust enables the issuance as well as the dissemination of credentials within several and various trust domains.

A web service using the WS-Trust can be used for implementing the standards that encode the WS security to facilitate the mechanisms for issuing and reviewing the security tokens.

Hence e the option A is correct. The  WS security token service is a service based on the mechanisms of the key exchange.

Learn more about the following enhances WS-Security to facilitate.

brainly.com/question/13171394.

Write a Java application with a main() to find the two largest distinct integers entered on the command line by the user. We are just creating a simple stand-alone application. All your code can be in main().

Answers

Answer:

import java.util.Scanner; // Scanner class is to use input output functions

public class TwoDistinctLargest //class to find two distinct largest nos

{

public static void main(String[] args) { //start of main() function

Scanner input = new Scanner(System.in); // creates Scanner type object

       int integers = 0, largest1 = 0, largest2 = 0; // declare variables

/* integers holds the input integer values, largest1 has 1st largest number and largest 2 contains second distinct largest number, i is used as the count variable to move through the input integers */

       int i = 0;  

//prompts user to enter integers and enter 0 to stop

       System.out.println("Enter the integers (press 0 to stop): ");

       integers = input.nextInt(); //reads and scans input integers

       while(integers != 0) {

/* the loop keeps taking integer values from user until the value of integers is equal to 0, this means until the user enters 0 */

//checks if the value of integer is greater than first largest computed number

           if(integers > largest1) {

//if the value in largest1 is greater than that of largest2

               if(largest1 > largest2) {

                   largest2 = largest1; } // then value of largest1 is set to largest2                

               largest1 = integers; // largest1 now holds the value of integers //which means largest1 holds the first distinct largest integer

           } else { //checks if the value of integers is greater than largest2

               if(integers > largest2) {

//if the value of integers is not equal to that of largest1

                   if(integers!=largest1)  {

// set the value of second distinct largest number to largest2

                   largest2 = integers;}              }            }

                     i++; //keeps moving to the next input integer

           integers = input.nextInt();     //keeps taking input integers    }      

//prints the two distinct largest integers

       System.out.println("\n The 1st largest distinct integer is " + largest1);

       System.out.println("\n The 2nd largest distinct integer is " + largest2); } }

Explanation:

Lets suppose the user inputs the following integers

1, 6, 5, 6, 0

Initial values are:

integers = 0

largest1 = 0

largest2 = 0

i = 0

When the user enters 1, then value of integers = 1

while loop checks if integers!=0. As integers =1 so the program enters the body of while loop. The first IF condition is checked if(integers > largest1)

As largest1 = 0 and integers =1 so this condition evaluates to true as 1 > 0

So the statements in the body of this IF condition are executed. This if conditions contains another if statement if(largest1 > largest2) which checks if the value largest1 is greater than that of largest2. Its false because largest1 =0 and largest2 =0 so largest1 = largest2, so the statement of this if condition body will not execute and program moves to this                 largest1 = integers; statement which sets the value of integers i.e. 1 to largest1. So the value of largest1 = 1

Now the i is incremented by 1 and it points at second value of integers= 6.

while loop checks if integers!=0. As integers =6 so the program enters the body of while loop. The first IF condition is checked if(integers > largest1)

As largest1 = 1 and integers =6 so this condition evaluates to true as 6>1

So the statements in the body of this IF condition are executed. This if conditions contains another if statement if(largest1 > largest2) which checks if the value largest1 is greater than that of largest2.

Its true because largest1 =1 and largest2 =0 so largest1 > largest2, so the next statement is executed largest2 = largest1; So now the value of largest2=1.

Now program moves to this largest1 = integers; statement which sets the value of integers i.e. 6 to largest1. So the value of largest1 = 6

Now the i is incremented by 1 and it points at second value of integers= 5.

while loop condition is again true. IF condition is checked if(integers > largest1)

As largest1 = 6 and integers =5 so this condition evaluates to false as 5<6. So this IF part will not execute and program control moves to the else part.

Else part has an if condition if(integers > largest2) which evaluates to true because integers = 5 and largest2 = 1 so the program moves to next if statement inside the previous if statement of else part i.e. if(integers!=largest1). This if statement is the main statement which will help in finding two distinct largest numbers in case the same largest value is input more than once. It checks If the value of integers is not equal to largest1 value. As integers = 5 and  largest1 = 6 so this if condition is true. If this condition is not used in this program then largest2 will not be assigned distinct largest values but assigned 6 for both largest1 and largest2 as 6 is input twice. Next this if statement  largest2 = integers assigns value of integers to largest2 which is the second largest distinct integer.

Now the i is incremented by 1 integers value become 0.

while loop checks if integers!=0. As integers =0 so the while loop breaks. The last two print statements which produce following output.

The 1st largest distinct integer is: 6

The 2nd largest distinct integer is: 5

A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review to get detailed information about this compromise? Check all that apply

Answers

Complete Question:

A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review to get detailed information about this compromise? Check all that apply.

A. Logs.

B. Full Disk Encryption (FDE).

C. Binary whitelisting software.

D. Security Information and Event Management (SIEM) system.

Answer:

A. Logs.

D. Security Information and Event Management (SIEM) system.

Explanation:

If a network security analyst received an alert about a potential malware threat on a user’s computer. In order to get a detailed information about this compromise, the analyst should review both the logs and Security Information and Event Management (SIEM) system.

In Computer science, logs can be defined as records of events triggered by a user, operating system and other software applications running on a computer. Log files are used to gather information stored on a computer such as user activities, system performance and software program.

Security Information and Event Management (SIEM) system is the process of gathering and integration of all the logs generated by a computer from various software application, service, process, or security tool.

These logs collected through the SIEM are shown in a format that is readable by the security analyst and this help in real-time detection of threats.

Hence, logs and SIEM systems are important tools for network security analyst for detection of threats in real-time and event management functions.

all HTML tags are case sensitive, case insensitive and have to be written in capitals only​

Answers

Answer:

Html tags are not case sensitive

It's in JavaScript that the tags are case sensitive


21. The quality of worth or merit, excellence and importance; custom or
ideal that people desire as an end, often shared within a group.
*

Answers

Answer:

Goals

Explanation:

Interestingly, the term goals refers to a perceived future a certain individual or group of individuals are hopeful for, or better still it could be an expectation of improved quality of worth or merit, excellence and importance; custom or ideals that people desire as an end, often shared within a group.

Remember, goals are desired end, achieved as a result of deliberate action or actions towards attaining it.

A Solutions Architect needs to build a resilient data warehouse using Amazon Redshift. The Architect needs to rebuild the Redshift cluster in another region. Which approach can the Architect take to address this requirement

Answers

Answer:

Explanation:

An Amazon Redshift data warehouse refers to a collection of computing resources that are known as nodes. These nodes are organized into a group called a cluster. In order to correctly replicate/rebuild this cluster in another region, the Architect needs to modify the Redshift cluster to take snapshots of the Amazon EBS volumes each day, sharing those snapshots with the other region. These snapshots will provide accurate and up-to-date information allowing for a correct rebuild of the Redshift cluster.

If your computer freezes on a regular basis and you checked your hard drive and you have insufficient space you've not installed any software that could cause disruption you have recently added more around so you realize that you have enough memory and that isn't causing a problem what could you do to check next? A) Ensure that the computer is disconnected from the internet by removing any Ethernet cables. B) Use scandisk to ensure that the hard drive is not developing errors or bad sectors. C) Replace the CPU and RAM right away. D) Install additional fans to cool the motherboard.

Answers

Answer:

d

Explanation:

If your computer freezes on a regular basis, and you have enough memory and that isn't causing a problem. You should install additional fans to cool the motherboard. The correct option is D.

What is computer freezing?

Computer freezing means the computer is not running smoothly. It is causing concerns in opening any application or running software. It is also called computer hanging. The freezing can occur due to the heating of the motherboard. The addition of the fans would be good.

Freezing on the computer happens when the memories of the computer are full, or any virus has been installed on the computer. Hanging or freezing of computers can be avoided by emptying some data or installing an antivirus.

Thus, the correct option is D. Install additional fans to cool the motherboard.

To learn more about computer freezing, refer to the link:

https://brainly.com/question/15085423

#SPJ2

Those with good motor skills are often described as having ...
A. good coordination.
B. poor coordination.
C. athletic coordination,

Answers

The answer is B. Poor coordination

In the above case, those with good motor skills are often described as having good coordination.

What is good coordination?

A coordination skill is known to bee the ability of a person to look at many moving pieces and derive a plan for all the pieces to be put  together.

Therefore, In the above case, those with good motor skills are often described as having good coordination.

Learn more about good coordination from

https://brainly.com/question/1476231

#SPJ9

In cell B13, create a formula using the VLOOKUP function that looks up the value from cell A11 in the range A5:B7, returns the value in column 2, and specifies an exact match.

Answers

Answer:

VLOOKUP(A11,A5:B7,2,0)  is the correct answer to this question.

Explanation:

The VLOOKUP method contains a vertical lookup by scouring for worth in a table's first section and trying to return the significance in the throughout the situation within the same row. The VLOOKUP excel is a built-in function classified as a Lookup / see as.

According to the question:-

The formulation needed to enter is = VLOOKUP(A11, A5: B7,2,0)

The first "A11" here is the cell from which value is retrieved

The second "A5: B7" input is the range for the table where you need to lookup. 2 Is the number of the column from which the value is taken and 0 indicates the exact math

The VLOOKUP function is used to look up a value in a particular column.

The VLOOKUP formula to enter in cell B13 is: VLOOKUP(A11,A5:B7,2,0)

The syntax of a VLOOKUP function is:

VLOOKUP(lookup_value, cell_range, column_index, [return_value])

Where:

lookup_value represents the value to look upcell_range represents the cells to checkcolumn_index represents the column index[return_value] is an optional entry, and it represents the value that will be returned by the look up function.

From the question, we have:

lookup_value = cell A11cell_range = cell A5 to B7column_index = 2[return_value] = 0

So, the VLOOKUP function would be: VLOOKUP(A11,A5:B7,2,0)

Read more about VLOOKUP function at:

https://brainly.com/question/19372969

Other Questions
13 At the beginning of 2009, Mr Veale bought a company.The value of the company was 50 000Each year the value of the company increased by 2%.(a) Calculate the value of the company at the beginning of 2017Give your answer correct to the nearest 100 Noma plans to save $4,800 per year for the next 40 years. If she can earn an annual interest rate of 10.6 percent, how much will she have in 40 years "Health reform has leveraged Medicaid for a significant part of the expansion. Is this good public policy? Why or why not?" describe the middle class in three points from social studies can someone help me plz What is the current classification of bacteria formerly termed members of the Bethesda-Ballerup group? g What is the electron configuration for N (nitrogen)?A. 1521p5B. 1s22s23s 3pO cly 1s22s22p3O D. 1s 2s22p 3sSUBMIT What is the average acceleration? Please show work! Economics is neutral between ends Discuss the validity of this statement in a welfare state. Find f o g and g o f to determine if f and g are inverse functions. If they are not inverses, pick the function that would be the inverse with f(x). f(x) = (-2/x) 1; g(x) = -2/(x+1)Choices: a. g(x) has to be: (1+x)/2b. g(x) has to be: x/2c. g(x) has to be: 2 (1/x)d. Inverses What was the three-fifths compromise?A. Three-fifths of the states needed to approve the Constitution.B. A slave would count as three-fifths of a person when paying taxes.C. Three-fifths of the national population would own slaves.D. A slave would count as three-fifths of a person when counting population for representation gooooooooooooooooooooooooooooooooooooooooooooooooooooooood moring got another question I need help ASAP bsnbssbbsb The originators of autogenic training, Shultze and Luthe, believed that when doing this technique, among other aspects, the person should focus on internal physiological processes.1. True2. False introduction for a letter to the president of your country Graph the line that passes through the points (2, 1) and (1, -2) and determine the equation of the line. 15. Over what range of angles does the value of sin(O) consistently increase?A. 45 to 135B. 90 to 180C. 0 to 180D. 0 to 90 Which sentences combine the ideas correctly? Check all that apply. The members of the team worked well together. The team members won first place in the contest. The teams members worked well together, and they won first place in the contest. Because the teams members worked well together, they won first place in the contest. Being team members, the team worked well by winning first place in the contest. The teams members won first place in the contest because they worked well together. The teams members won first place in the contest; they worked well together. There is a list of seven numbers. The average of the first four numbers is 5, and the average of the last four numbers is 8. If the average of all seven numbers is 6 4/7 , find the number common to both sets of four numbers. Find the inverse of the function Find the inverse of the function f(x)=2x-4