Answer:
transport layer protocol
Explanation:
The full form of TCP is Transmission Control Protocol. It is defined as the standard of establishing and maintaining a network conversation with the help of which the programs can exchange information and data. TCP works with IP or Internet Protocol.
The application programs uses the TCP transport layer protocol to receive data which is in the form of byte streams that contains the information in the commands. TCP is also called as the "connection-oriented" protocol.
Describe two circumstances where access services might get implemented by organizations please.
Answer:
Answered below
Explanation:
Remote access enables access to an organisations network from remote places. Certain conditions require such access. An organisation might require their workforce to work from home especially in this coronavirus health pandemic situation. Therefore remote access is necessary.
Also attending to customers needs, virtual meetings and connections to workers and clients all over the world, can only be made possible by the implementation of secured remote access, by the organisation.
Identify a security context of interest to you. Within this context, what constitutes a direct benefit of a risk management strategy? An indirect benefit? Provide examples.
Here,the Preparedness of the National(National Preparedness), that which gives a description of mission areas and also provide a framework for the consideration of management of risk.
It gives an illustration of the relationship of the National preparedness mission elements of risk.
Activities aimed at prevention are also associated with the efforts for the addressing of protection efforts generally address vulnerabilities recovery efforts.
However,we see that efforts of mitigation transcends vulnerability and also consequence spectrum.
Here,the PPD-8 mission areas are central,and this is to enhance national preparedness and also for infrastructure risk management activities.
When these are developed,they contribute to the achievement of resilient and secure critical infrastructure,and these critical infrastructure risks are however seen as part of setting capability targets.
THREAT AND HAZARD IDENTIFICATION AND RISK ASSESSMENT.
"THIRA" gives a provision of an approach for the identification and assessment of risks and also the associated impacts.
Determination that THIRA process has been completed by jurisdiction,then you consider the results when undergoing the assessment of risks to critical infrastructure.
how do i change my desktop theme on my chromebook?
Answer:
open Chrome.
At the top right, click More. Settings.
Under "Appearance," click Themes. You can also go to the gallery by visiting Chrome Web Store Themes.
Click the thumbnails to preview different themes.
When you find a theme you'd like to use, click Add to Chrome.
Explanation:
A technology that can help a student to increase his or her understanding of the vocabulary used in a classroom is called:_______
a. assistive instruction.
b. UDL technology.
c. hypertext software.
d. adaptive instruction.
Answer:
c. hypertext software.
Explanation:
In Computer science, a hypertext can be defined as textual informations that are being displayed on a computer system and these texts usually links to other informations (texts) that the user can easily have access to in real-time.
Basically, some developers include encyclopedias and dictionaries in their software database, which makes other necessary informations or contents easier and immediately accessible to the users through the use of hypertexts that is activated by pointing and clicking on the link with a mouse, keypress set or soft touching the screen.
Hence, a technology that can help a student to increase his or her understanding of the vocabulary used in a classroom is called hypertext software.
Best of Luck
for your work and
d
Best wishes for you
.
oh, why thank you same to you
Network Access Protection (NAP) analyses the ________ of a computer.
Answer:
virus in a virus
Explanation:
Is the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfaction
Answer:
customer-serious orientation
Explanation:
Customer-serious orientation can be defined as the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfaction.
This ultimately implies that, a customer-serious oriented business firm or company puts the needs, wants and requirements of its customers first without considering their own needs in a bid to satisfy and retain them.
Hence, customer-serious orientation requires the employees working in an organization to show and demonstrate positive attitudes and behaviors at all times.
If a system's instruction set consists of an 8-bit opcode, what is the maximum number of output signal lines required for the control unit?
A) 8 B) 64C) 128 D) 256
Answer:
D. 256
Explanation:
Given
[tex]Instructions = 8\ bit[/tex]
Required
Determine the maximum number of output
To get the required value, we make use of the following:
[tex]Maximum = 2^n[/tex]
Where n is the bits of the opcode.
i.e.
[tex]n = 8[/tex]
Substitute 8 for n in [tex]Maximum = 2^n[/tex]
[tex]Maximum = 2^8[/tex]
[tex]Maximum = 256[/tex]
Hence, option D answers the question