Routing and remote access services allow users to connect to private networks using or:.

Answers

Answer 1

Answer:

Users can connect to a remote access server through a dial-up connection or a virtual private network (VPN) connection.

Explanation:

A dial-up connection requires both the server and the client computer to have a correctly configured modem. The client and the server connect over analog public telephone networks. To enhance the security of a dial-up connection, use data encryption, Windows logon and domain security, remote access policies and callback security.


Related Questions

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?

Answers

A feature which is a good conferencing tool to use with other people who are located elsewhere or even in a different location is known as video communications.

What is communication?

Communication refers to a process which involves the transfer of information from one person (sender) to another (receiver), especially through the use of semiotics, symbols, signs and network channel.

In this context, video communications is a feature which is a good conferencing tool to use with other people who are located elsewhere or even in a different location because it provides an image of the person in real-time.

Read more on communication here: brainly.com/question/26152499

#SPJ12

Access passwords (or pins) and device encryption for devices are:

Answers

Access passwords (pins) and encryption for devices are recommended for all devices, especially for portable ones because they can easily be lost or stolen.

What is a password?

A password can be defined as a string of characters, phrase or word that is designed and developed to distinguish an unauthorized user from an authorized user.

Additionally, an encryption is used to conceal and secure a digital data, so as to make it hidden to unauthorized user.

In conclusion, access passwords (pins) and encryption for devices are recommended for all devices, especially for portable ones because they can easily be lost or stolen.

Read more on password here: https://brainly.com/question/19116554

#SPJ12

what is one of the key components of a typical formula?

Answers

The key components of a typical formula?

FunctionsReferencesOperatorsConstants.

What is a formula?

A formula is known to be made up of functions, references, operators, and constants as they help it to carryout its operations.

A function is known to be any rule, or expression that tells about an association between one variable and other.

Therefore, The key components of a typical formula?

FunctionsReferencesOperatorsConstants.

Learn more formula from

https://brainly.com/question/2005046

#SPJ11

identifying the source of owners of online resources ​

Answers

Answer:

To find the source of owners of online resources, you can click on the lock button on the search tab or relocate to the bottom of the resources page to find the sources of owners/authors of online resources. Hope it helps!

what types of physical drives does windows disable defragmenting, but provides another method of optimization?

Answers

The type of physical drives does windows disable defragmenting, but provides another method of optimization is known as windows.

What is windows?

It should be noted that windows is a separate viewing area on a computer display screen in a system.

In this case, the type of physical drives does windows disable defragmenting, but provides another method of optimization is known as windows.

Learn more about window on:

brainly.com/question/25243683

#SPJ12

Salesforce cpq the sales operations team at universal containers used the create order button to generate an order with only half of the available quote lines and then the team selects the ordered checkbox. what updates should the sales operations team expect

Answers

The updates  that the sales operations team should  expect is A second Order is generated with the remaining Quote Lines.

What do sales operations teams do?

Sales operations teams are known to be people that work on or monitors the administrative and technical tasks that can be a burden to salespeople.

Therefore, in the case above, The updates  that the sales operations team should  expect is A second Order is generated with the remaining Quote Lines.

See full question below

The sales operations team at Universal Containers used the Create Order button to generate an Order with only half of the available Quote Lines and then the team selects the Ordered checkbox.

What updates should the sales operations team expect?

A. An Order without Order Products is created.

B. The existing Order is updated with the remaining Quote Lines.

C. A second Order is generated with the remaining Quote Lines.

D. An error is thrown informing the user an Order already exists.

Learn more about  sales operations  from

https://brainly.com/question/26175085

#SPJ1

list of history of generation computer?​

Answers

First-generation — 1940–1956used vacuum tubesENIAC, UNIVAC I, IBM 650, IBM 701, etc.Second generation — 1956-1963used discrete transistorsIBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.Third generation — 1964-1971used integrated circuits (but not microprocessors)IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.Fourth-generation — 1971-presentuse microprocessorsPDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.Fifth-generation — (current research)artificial intelligence and quantum computing

Which of the following terms refers to the area of the hard drive used for virtual memory?

A. virtual file

B. data file

C. swap file

D. volatile file

Answers

Answer: C. Swap File

Explanation: Swap files provide some space for programs for the computer and virtual memory.

The term that refers to the area of the hard drive used for virtual memory is a swap file. The correct option is c.

What is virtual memory?

Operating systems use virtual memory, a different set of memory addresses, along with the hardware reserve to increase the total number of addresses (actual memory plus virtual memory). The virtual addresses are changed into actual memory addresses when the application is really run.

A swap file is a hard drive space that serves as a computer's virtual memory expansion (RAM). A computer can use more memory than what is actually installed in it by employing a swap file.

In order to save space, data from RAM is "swapped" onto a file or area on the hard drive. Data is switched back and forth from the RAM to the swap file as you switch between the apps.

Therefore, the correct option is c. swap file.

To learn more about virtual memory, refer to the link:

https://brainly.com/question/13441089

#SPJ2

Before a computer can use a router, what configuration information must it be provided?

Answers

Before a computer can use a router, the default gateway must be configured.

What are routers?

Routers are device that connects two or more packet-switched networks or subnetworks.

A router receives and sends data on computer networks.

The router route the IP addresses of this computer over the internet for effective communication.

The default gateway allows for devices in one network to communicate with devices in another network.

Therefore, the default gateway must be configured before a computer can use a router.

learn more on routers here: https://brainly.com/question/25823209

#SPJ12

PYTHON --- Toll roads have different fees based on the time of day and on weekends. Write a function calc_toll() that has three parameters: the current hour of time (int), whether the time is morning (boolean), and whether the day is a weekend (boolean). The function returns the correct toll fee (float), based on the chart below.Weekday TollsBefore 7:00 am ($1.15)7:00 am to 9:59 am ($2.95)10:00 am to 2:59 pm ($1.90)3:00 pm to 7:59 pm ($3.95)Starting 8:00 pm ($1.40)Weekend TollsBefore 7:00 am ($1.05)7:00 am to 7:59 pm ($2.15)Starting 8:00 pm ($1.10)Ex: The function calls below, with the given arguments, will return the following toll fees:calc_toll(8, True, False) returns 2.95calc_toll(1, False, False) returns 1.90calc_toll(3, False, True) returns 2.15calc_toll(5, True, True) returns 1.05

Answers

The toll program illustrates the use of conditional statements;

As a general rule, conditional statements are used to make decisions

The toll program

The toll program written in Python where conditional statements are used to make several decisions is as follows:

def calc_toll(hour, morning, weekend):

   toll_fee = 0

   if weekend == False:

       if morning == True:

           if hour < 7:

               toll_fee+=1.15

           elif hour < 10:

               toll_fee+=2.95

           elif hour <= 12:

               toll_fee+=1.90

       else:

           if hour < 3:

               toll_fee+=1.90

           elif hour < 8:

               toll_fee+=3.95

           elif hour >= 8:

               toll_fee+=1.40

   else:

       if morning == True:

           if hour < 7:

               toll_fee+=1.05

           elif hour <= 12:

               toll_fee+=2.15

       else:

           if hour < 8:

               toll_fee+=2.15

           elif hour >= 8:

               toll_fee+=1.10

   return toll_fee

   

Read more about conditional statements at:

https://brainly.com/question/24833629

#SPJ1

Restore points are created at regular intervals and just before you install software or hardware by what utility?

Answers

System Protection is a utility that create restore points at regular intervals and just before an end user installs a software or hardware.

What is System Protection?

System Protection can be defined as a utility that is designed and developed to create restore points on a computer system at regular intervals, especially before an end user installs a software or hardware.

This ultimately implies that, System Protection is a utility that create restore points at regular intervals and just before an end user installs a software or hardware.

Read more on System Protection here: https://brainly.com/question/13982988

#SPJ12

Which network lets its users send and receive data as if their devices were connected to the private network even if they are not?

Answers

Answer:

Virtual Private Network, also known as VPN

Explanation:

A VPN connects a private network to a public network like the Internet. It lets users to send and receive data over public network systems as if their electronic systems were directly linked to the private network, benefits from the private network's capabilities, encryption, and administrative rules. A VPN is built by using dedicated connections, virtual tunneling technologies, or data encryption to construct a virtual point-to-point connectivity.

VPNs securely link a company's geographically disparate locations, forming one unified network. Individual Internet users also utilize VPN technology to safeguard their wireless activities, evade geo-restrictions and censorship, and link to proxy servers to secure their personal identity and location. VPN is a security mechanism that is best suited for individual user connections rather than secure connections of a variety of embedded devices.

Which should precede the order on a classified balance sheet

Answers

A Long-term investments should precede the other on a classified balance sheet.

What is the order of a classified balance sheet?

The common classifications that is often employed within a classified balance sheet are:

Current assets Long-term investmentsFixed assets, etc.

Therefore, A Long-term investments should precede the other on a classified balance sheet.

Learn more about balance sheet from

https://brainly.com/question/1113933

#SPJ12

When passing a list of parameters to a stored procedure by name, you can omit optional parameters by:

Answers

When passing a list of parameters to a stored procedure by name, you can omit optional parameters by omitting the parameter name and value from the list.

What is optional parameter?

It should be noted that optional parameter simply means a method that doesn't force pass arguments at calling time.

In this case, when passing a list of parameters to a stored procedure by name, you can omit optional parameters by omitting the parameter name and value from the list.

Learn more about parameter on:

brainly.com/question/13151723

#SPJ12

What type of user can open any subscription level of quickbooks online using the quickbooks online advanced app?.

Answers

Answer:

A Custom user.

Explanation:

I believe this is right. Lol :')

in a relational database application, a(n) ________ key is used to link one table with another.

Answers

In a relational database application, a foreign key is used to link one table with another.

What is a foreign key?

In database management system (DBMS), a foreign key can be defined as a column whose value provides a link between the data that are stored in a table or relational database.

This ultimately implies that, a foreign key is used to link one table with another in a relational database application.

Read more on keys here: https://brainly.com/question/8131854

#SPJ12

Which is not an advantage of replication of data in terms of directory services?

Answers

The statement which isn't an advantage of replication of data with respect to directory services is that it allows you to locally manage user accounts.

What is a directory service?

A directory service is a software system designed and developed to store, organize and provide end users with a name and an access to directory information, so as to effectively and efficiently unify (synchronize) all network resources.

In this context, we can infer and logically deduce that the statement which isn't an advantage of replication of data with respect to directory services is that it allows you to locally manage user accounts.

Read more on directory services here: https://brainly.com/question/15187174

#SPJ12

you have been using snmp on your network for monitoring and management. you are concerned about the security of this configuration. what should you do?

Answers

The thing that should be done is to implement version 3 of SNMP.

How to depict the information?

In this situation, the person has been using snmp on your network for monitoring and management. you are concerned about the security of this configuration.

Therefore, since the person is concerned about the security of this configuration, the thing that should be done is to implement version 3 of SNMP.

Learn more about configuration on:

brainly.com/question/26084288

#SPJ12

A variable, usually a bool or an int, that signals when a condition exists is known as a(n):

Answers

A variable, usually a bool or an integer, that signals when a condition exists is a flag.

What is a variable?

Generally, variables are containers for storing values.

A variable is a memory location where you store a value.

The value that you have stored may change in the future according to the specifications.

Therefore, a a variable usually a bool or an integer, that signals when a condition exists is a flag

learn more on variable here: https://brainly.com/question/14500181

#SPJ2

In the certificate authority trust model known as a hierarchy, where does trust start?

Answers

In the certificate authority trust model known as a hierarchy, the trust start from Root CA.

What does a certificate authority do?

A certificate authority (CA) is known to be a kind of a trusted body that is known to often issues Secure Sockets Layer (SSL) certificates.

Note that In the certificate authority trust model known as a hierarchy, the trust start from Root CA as that is its beginning point.

Learn more about  certificate authority from

https://brainly.com/question/17011621

#SPJ12

Which of the following creates a security concern by using AutoRun to automatically launch malware?

Answers

Answer:

USB device

Explanation:

AutoRun automatically launches malicious software as soon as you insert a USB device

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

Answers

Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

What is Ransom malware?

This is known to be a kind of  malware that hinders users from gaining in or access to their system or personal files and it is one that often demands ransom payment so as to get access.

Therefore, Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

Learn more about Ransom  malware from

https://brainly.com/question/27312662

#SPJ12

Three symptoms of spyware

Answers

Answer:

Random advertisements that pop up on your computer. Unusual slowness of your system. Unusual instability in your system, computer crashes more than usual

Explanation:

People are trying to hack into your computer

There are 4 servers in the checkout area. The interarrival time of customers is 2 minutes (convert to rate/hr). The processing time of a server is 5 minutes/customer (convert to rate/hr). What is the overall utilization of the total server capacity

Answers

Answer:

Explanation:

bwfwgxqsvga

4. Ernesto works in a small office with five other people. What are two possible connection
issues Ernesto might encounter if the company uses a LAN?

Answers

LAN is the networking device and channel that interconnects the local area systems. If the company uses LAN, then issues with speed and connectivity will occur.

What is LAN?

The local area network connects the computers of small and local regions confined to small geographical areas and is seen in the schools, offices, and residences.

If LAN is used between more people then the internet speed and connectivity will be affected as there will be redundancy in the data packet transfer speed.

Therefore, the speed and connectivity will be affected.

Learn more about LAN here:

https://brainly.com/question/14308916

#SPJ1

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.

Answers

Answer:

The service password-encryption command

Explanation:

To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command. This command encrypts all configured passwords in the configuration file

An error in a program that involves a violation of language rules will be detected at

Answers

An error in a program that involves a violation of language (syntax) rules will be detected at compile time.

What is a compiler?

A compiler refers to a software program that is designed and developed to translate the entire source code of program at once, so as to produce object code.

Thus, a compiler translates a software program that is written in a high-level language into low-level language (machine language).

In conclusion, we can deduce that an error in a software program that is associated with a violation of language (syntax) rules will be detected at compile time.

Read more on programs here: brainly.com/question/26324021

#SPJ12

After the execution of the following statement, the variable sold will reference the numeric literal value as (n) ________ data type. sold = 256.752

Answers

The variable sold will reference the numeric literal value as float data type.

What is float Data Type?

The float data type is known to be a kind of data whose Size Description is one that falls from 4 bytes and it is one that saves fractional numbers.

Note that it can save from 6 to 7 decimal digits and as such, The variable sold will reference the numeric literal value as float data type.

Learn more about data type from

https://brainly.com/question/179886

#SPJ1

QUESTION 9 OF 100
What does it means when you see a sign with an "X" and two
letters "R" sign posted on the roadside?

Answers

Answer:

it means go sleep on ur bed

jk

Answer:

the sign means "railroad"

Explanation:

Vani is trying to connect a microphone to her laptop. What are the two way she can connect the microphone?

Answers

Through the audio jack or via Bluetooth
Other Questions
Anyone have an idea how to create a NPV Spreadsheet which intakes a 6% discount factor.My actual question is very similar to this, If someone could give me a step by step breakdown it would be much appreciated HELP PLEASEEEE!!!!If PQRS is a quadrilateral inscribed in a circle then the opposite angles of the quadrilateral are_____?The values of x and y are _____ degrees and ______ degrees respectively. Beverly and Carl are in a race. Their graphs show the data.A graph with horizontal axis time (seconds) and vertical axis velocity (meters per second). An orange line labeled Beverly starts at 0 seconds 0 meters and goes straight to 10 seconds 15 meters and then to 50 seconds 35 meters. A blue line labeled starts at 0 seconds 0 meters and goes straight to 10 seconds 10 meters and then to 50 seconds 30 meters.Which best describes the race? All of the following are factors affecting the rate of photosynthesis except.1. temperature2. ultraviolet radiation3. light intensity 4. carbon dioxide presence. Determine the equation of a line passing through the point (2,-6), with a slope of m=-1 The envelope of air that surrounds the Earth where all weather events happen is called (1) ___________. It isdivided into five layers based on the (2) ____________________ and (3) ____________________.The (4) ____________________ is the layer closest to Earths surface. The temperature just above the groundis hotter than the temperature high above. Weather occurs in the troposphere because this layer has most of the watervapor.The (5) ____________________ is the layer of air that extends to about 50 km from the Earths surface. Manyjet planes fly in the stratosphere because it is very stable. It is in the stratosphere that we find the ozone layer.The layer between 50 km and 80 km above the Earths surface is called the (6) ____________________. Air inthis layer is very thin and cold. Meteors or rock fragments burn up in here.The (7) ____________________ is between 80 km and 110 km above the Earth. Space shuttles fly in this area,and it is also where the auroras are found. Auroras are caused when the solar wind strikes gases in the atmosphereabove the Poles.The upper limit of our atmosphere is the (8) ____________________. This layer of the atmosphere merges intospace. Satellites are stationed in this area, 500 km to 1000 km from Earth.The Earths atmosphere is compared to a greenhouse. The process by which the Earths atmosphere warms upis called (9) ____________________ and the trace gases are referred to as (10) ______________. Which main coronary artery bifurcates into two smaller ones? the hyperledger fabric framework only offers blockchain services? one angle of a triangle measures 80 more than the smallest, while a third angle is twice the smallest. whats the measure of each angle? Which theorist described dreams as having manifest. Sulfuric acid is an important industrial chemical thatis usually produced by a series of reactions. One ofthese involves an equilibrium between gaseous sulfurdioxide, oxygen, and sulfur trioxide.2 SO(g) + O(g) 2 SO(g)If 2.5 mol of sulfur dioxide gas and 2.0 mol ofoxygen gas are placed in a sealed 1.0 L containerand allowed to reach equilibrium, 0.75 mol of sulfurdioxide remains. Use an ICE table to determine theconcentration of the other gases at equilibrium. According to the graph, China's fertility rates have ___ since the one-child policy was introduced.One reason the one-child policy was introduced was to limit ___. A part of a melody, that can be sung on one breath and ends at a point of full or partial rest, is called a ______. multiple choice Find the measure of x.42X17x= [ ?Round to the nearest hundredth. two conducting spheres How many of Earth's spheres doesthe carbon cycle move through?A. oneB. a few of the Earth's spheresC. impossible to knowD. all of the Earth's spheres How many possible electrons can be held in the Bohr model n=8 energy level? Solve the following equations. 2x - y = 8 3x + y = 17 An oxygen cylinder should be taken out of service and refilled when the pressure inside it is less than: Read the excerpt from chapter 10 of Animal Farm.But the luxuries of which Snowball had once taught the animals to dream, the stalls with electric light and hot and cold water, and the three-day week, were no longer talked about. Napoleon had denounced such ideas as contrary to the spirit of Animalism. The truest happiness, he said, lay in working hard and living frugally.How does Orwell use irony in this excerpt?The text shows that if the animals work harder, they will have luxuries they dreamed of.The text shows that Napoleons dreams conflict with the dreams of the animals.The text shows that the animals expected a different outcome than the reality they are facing.The text shows that Snowball and Napoleon never meant to mislead the other animals.