IPSec or internet Protocol Security is an extension of the Internet Protocol. What does IPSec use to provide network security?

Answers

Answer 1

Answer:

In computing, Internet Protocol Security ( IPSec ) is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over on internet protocol network. It is used in virtual private networks ( VPNs ).


Related Questions


State
any three (3) reasons why users attach speakers to their computer?

Answers

Answer:

To complete the computer setup, to hear audio, to share audio.

Explanation:

A computer is not really complete without speakers.

So that you can actually hear the computer's audio.

So that you can have multiple people hear the same audio. (Headphones do not do this)

web analytics can tell you many things about your online performance, but what can analytics tools not tell you​

Answers

Answer:

The answer is below

Explanation:

While web analytics such as Góogle analysts is known to help online marketers to map out a clear strategy and thereby improve their outreach, there are still some specific things the current web analytics can not do for the user. For example:

1. Web Analytics can’t accurately track leads

2. Web Analytics can’t track lead quality

3. Web Analytics can’t track the full customer journey

4. Web Analytics can’t highlight the true impact of payment.

The following Mic1 microcode excerpt shows support for a possible 7 bit opcode, 8 bit integer argument machine instruction (organized like the INSP instruction). This part of the microcode will be reached after the instruction opcode has been parsed and identified by earlier parts of the microcode and while the IR contains the complete instruction from memory (as usual for the IR).

100:a := band(smask, ir);
101:a := a + (-1); if n goto 0;
102:ac := lshift(ac); if n goto 104;
103:goto 101;
104:ac := ac + 1; goto 101;
If this possible instruction had a masm assembly pneumonic of XXXX , and was used in an assembly program as shown below:

.
.
LODD abc:
XXXX 7
HALT
.
.
abc: "lost"

What would the 16 bit content of the AC look like when we hit the HALT instruction?

a. 1 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1
b. 0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0
c. 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1 1
d. 0 0 1 1 0 1 1 1 1 0 1 1 0 1 1 0

Answers

Answer:

The answer is "Option A".

Explanation:

In the first 2 signatures in a string, the "ol" with both the "l" throughout the low byte environment is included, and so the initial bit layout becomes: Number of [tex]0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0[/tex] Its high 7 bits are moved to the lower 7 having come until the correct circular change of 7 is done:

[tex]0 1 1 0 1 1 1 1 0 1 1 0 1 1 0 0 \ \ \ to \ \ 1 0 1 1 0 1 1 0 0 0 1 1 0 1 1 1[/tex]

8.9 Lesson Practice edhesive

Answers

Answer:

1. search

2. False

3. Our algorithm did not find the element we were looking for.

Explanation:

Which item can you add using the tag?
OA.
a movie
OB.
an image
OC.
a documentary
OD.
a music file

Answers

Answer:

The answer to this would be D: A music file

Explanation:

Since this tag is is <audio>, all of the other ones are visual and have sound. This means that a tag would need to be able to display visuals as well. Making a music file the only item you would be able to include with the given tag.

How can the adoption of a data platform simplify data governance for an organization?

Answers

Answer:

by implementing models that predict compliance with data protection and data privacy policies.

Explanation:

A data platform is an IT system that helps an organization to organize, control and coordinate a large volume of data with the aim of making organizational systems faster and optimizing the decision-making process with effective strategic solutions for organizational success .

A database can simplify data governance for an organization by the fact that data is available to users determined by the organization itself, which increases the security and control of business-critical data.

why do we need to settle technology in business?​

Answers

Answer:

Technology has important effects on business operations. No matter the size of your enterprise, technology has both tangible and intangible benefits that will help you make money and produce the results your customers demand. Technological infrastructure affects the culture, efficiency and relationships of a business.

Phone numbers and PIN codes can be easier to remember when you find words that spell out the number on a standard phone keypad. For example, instead of remembering the combination 2633, you can just think of CODE. Write a recursive function that, given a number, yields all possible spellings (which may or may not be real words).

Answers

Answer:

Explanation:

The following is written in Python and the code first creates a simulated keypad with all the characters. Then the function detects the number passed as an input argument and outputs all the possible spelling combinations.

keypad = {

   '2': 'abc',

   '3': 'def',

   '4': 'ghi',

   '5': 'jkl',

   '6': 'mno',

   '7': 'pqrs',

   '8': 'tuv',

   '9': 'wxyz',

}

def word_numbers(number):

 number = str(number)

 wordList = ['']

 for char in number:

   letters = keypad.get(char, '')

   wordList = [prefix+letter for prefix in wordList for letter in letters]

 return wordList

Write a client program Client Sorting and in the main method:
1. Call a method, SelectionSorter() that accepts an integer array as a parameter and sorts the elements in the array using the selection sort algorithm where it picks the maximum value in the array in each pass. Print the array before it is sorted in the main method, then after it is sorted in SelectionSorter().
2. Call a method, BubbleSorter that accepts an integer array as a parameter and sorts the elements in the array in descending order (highest number first, then the second highest and so on) using the bubble sort algorithm. Print the array before it is sorted in the main method, then after it is sorted in BubbleSortero.
3. Call a method, InsertSorter() that accepts an integer array as a parameter and sorts the elements in the array using the insertion sort algorithm. Print the array before it is sorted in the main method, then after it is sorted in InsertSortero.

Answers

Answer:

Explanation:

The following code is written in Java. It creates a method for each of the sorting algorithms and one method to reset the array and print the original, so that all algorithms can be tested with the same array.The entire program code is below.

import java.util.Scanner;

class Brainly {

   static int[] arr;

   public static void main(String[] args) {

       // Print Unsorted Array and Call Selection Sort and print

       resetArray();

       SelectionSorter(arr);

       System.out.print("\nSelection Sort Array: ");

       for (int x : arr) {

           System.out.print(x + ", ");

       }

       //Reset Array and call Bubble Sort and print

       System.out.println('\n');

       resetArray();

       BubbleSorter(arr);

       System.out.print("\nBubble Sort Array: ");

       for (int x : arr) {

           System.out.print(x + ", ");

       }

       //Reset Array and call Insert Sort and print

       System.out.println('\n');

       resetArray();

       InsertSorter(arr);

       System.out.print("\nInsert Sort Array: ");

       for (int x : arr) {

           System.out.print(x + ", ");

       }

   }

   public static void resetArray() {

       arr = new int[]{10, 14, 28, 11, 7, 16, 30, 50, 25, 18};

       System.out.print("Unsorted Array: ");

       for (int x : arr) {

           System.out.print(x + ", ");

       }

   }

   public static void SelectionSorter(int[] arr) {

       for (int i = 0; i < arr.length - 1; i++) {

           int index = i;

           for (int j = i + 1; j < arr.length; j++) {

               if (arr[j] < arr[index]) {

                   index = j;//searching for lowest index

               }

           }

           int smallerNumber = arr[index];

           arr[index] = arr[i];

           arr[i] = smallerNumber;

       }

   }

   static void BubbleSorter(int[] arr) {

       int n = arr.length;

       int temp = 0;

       for (int i = 0; i < n; i++) {

           for (int j = 1; j < (n - i); j++) {

               if (arr[j - 1] > arr[j]) {

                   //swap elements

                   temp = arr[j - 1];

                   arr[j - 1] = arr[j];

                   arr[j] = temp;

               }

           }

       }

   }

   public static void InsertSorter(int arr[]) {

       int n = arr.length;

       for (int j = 1; j < n; j++) {

           int key = arr[j];

           int i = j - 1;

           while ((i > -1) && (arr[i] > key)) {

               arr[i + 1] = arr[i];

               i--;

           }

           arr[i + 1] = key;

       }

   }

}

For two integers m and n, their GCD(Greatest Common Divisor) can be computed by a recursive function. Write a recursive method gcd(m,n) to find their Greatest Common Divisor. Once m is 0, the function returns n. Once n is 0, the function returns m. If neither is 0, the function can recursively calculate the Greatest Common Divisor with two smaller parameters: One is n, the second one is m mod n. Although there are other approaches to calculate Greatest Common Divisor, your program should follow the instructions of this question, otherwise you will not get the credit. Then write a testing program to call the recursive method.

Answers

Answer:

In Python:

def gcd(m,n):

if n == 0:

 return m

elif m == 0:

    return n

else:

 return gcd(n,m%n)

Explanation:

This defines the function

def gcd(m,n):

If n is 0, return m

if n == 0:

 return m

If m is 0, return n

elif m == 0:

    return n

If otherwise, calculate the gcd recursively

else:

 return gcd(n,m%n)

To call the function to calculate the gcd of say 15 and 5 from main, use:

gcd(15,5)

The city of Green Acres is holding an election for mayor. City officials have decided to automate the process of tabulating election returns and have hired your company to develop a piece of software to monitor this process. The city is divided into five precincts. On election day, voters go to their assigned precinct and cast their ballots. All votes cast in a precinct are stored in a data file that is transmitted to a central location for tabulation.

Required:
Develop a program to count the incoming votes at election central.

Answers

Answer:

Explanation:

The following program asks the user to enter the precinct number and then loops to add votes until no more votes need to be added. Then it breaks the loop and creates a file called results to save all of the results for that precinct.

precinct = input("Enter Precinct Number: ")

option1 = 0

option2 = 0

while True:

   choice = input("Enter your vote 1 or 2: ")

   if int(choice) == 1:

       option1 += 1

   else:

       option2 += 1

   endVote = input("Vote again y/n")

   if endVote.lower() != 'y':

       break

f = open("results.txt", "w")

f.write("Precinct " + precinct + ": \nOption 1: " + str(option1) + "\nOption 2: " + str(option2))

Question 4
What methods do phishing and spoofing scammers use? List and explain methods to protect
against phishing and spoofing scams. (10 marks​

Answers

Answer:

The answer is below

Explanation:

There are various methods of phishing and spoofing scammers use, some of which are:

Phishing:

1. Descriptive phishing: here the scammer use fake email to pretend to be a genuine company and steal people's vital details

2. Spear Phishing: here the scammer creates an email that appears there is a connection on the potential victim

3. CEO Fraud: here the scammer target CEO of a company, thereby if successful can fraudulently attack the company due to his access.

Other phishing attacks are vishing, smishing, and pharming, etc.

Spoofing:

1. Email spoofing: here the attacker sends an email through a fake email address to get personal details of a potential victim

2. Caller ID Spoofing: here the attacker makes it appear that he is one specific person, but he is not in the real sense.

3. GPS Spoofing: here the attacker makes it appear he is in a specific location, whereas, he is not.

Others include website spoofing, text message spoofing, Io spoofing etc.

what is the determinant of the identity matrix I?​

Answers

Answer:

Explanation:

The ith column of an identity matrix is the unit vector ei (the vector whose ith entry is 1 and 0 elsewhere) It follows that the determinant of the identity matrix is 1, and the trace is n. When the identity matrix is the product of two square matrices, the two matrices are said to be the inverse of each other.

Which language paradigm interacts well with database systems in business environments that use SQL? (I WILL GIVE BRAINLIEST TO THE RIGHT ANSWER

aspect-oriented
data-oriented
fourth-generation
logic-based

Answers

Answer:

I think it is fourth-generation.

Explanation:

Which of the following is true about media production? A. All media elements contain a certain type of editorial viewpoint. B. Producing a media text involves both print and images C. Every type of media has a different set of tools and devices available. D. Media producers are all trying to confuse their audience

Answers

Answer:

C

Explanation:

Every form of media has different resources.

what is the relationship between a base and the number of symbols in a positional number system​?

Answers

Answer:

the value of a symbol is given by the weight of it's position expressed in the bases of the system (or radices)

What are some examples and non-examples of digital etiquette?

Answers

Answer:

saying hello to strangers and standing up to cyber bullies

using all caps. cyber bullying. cursing. stalking

dont download that file

Cuál es el objetivo principal de una clave primaria?

Answers

La clave principal le permite crear un identificador único para cada fila de su tabla. Es importante porque le ayuda a vincular su tabla a otras tablas (relaciones) utilizando la clave principal como vínculos.

In which category would Jamal most likely find an appropriate template for his report?

Designs
Diagrams
Education
Personal

Answers

Answer:

Education

Explanation:

What is the first thing you should do when you discover a computer is infected with malware? The second thing?

Answers

Answer:

Quarantine the computer.

Explanation:

Malware can be characterized with negative software capable of causing various damages to a computer, such as theft of data and information, in addition to damage to devices.

In order to avoid having your computer infected with malware, it is essential to have installed reliable malware-checking software, in addition to taking all appropriate security measures when accessing the internet and never clicking on unknown or suspicious links.

Therefore, when realizing that the computer has been infected by malware, it is necessary to quarantine the computer and immediately disconnect from a network so that it does not infect other computers. The quarantine acts as an action where the infected file is moved to an encrypted folder where the malware cannot be executed and spread by the operating system.

Explain what an IM is, and what is the technology shown in the accompanying figure

Answers

Answer: Instant Message

Explanation:

Answer:the technology that is shown is a ch't rooms, a website or application that permits users to ch't with others who are online at the same time. as you type others can see what you type may i get brainiest plz

Explanation:

help asapp!!!!!! give the technical name means (write the name in one word) . the feature of virus which copies itself..​

Answers

Answer:

if a computer is made out of many copies it can cause a virus with a definition of a tro Jan by a virus

Explanation:

what follows is a brief history of the computer virus and what the future holds for this once when a computer is made multiple copies of it's so several reducing malicious intent here but animal and prevade fit the definition of a Trojan buy viruses worms and Trojans paint the name Malwar as an umbrella term

which service is a major commercial cloud platform?
a. Microsoft SQL Services
b. SAP Cloud Services
c. Amazon Web Services
d. Oracle Enterprise Services

Answers

Answer: Amazon Web Service

Explanation:

The service that's a major commercial cloud platform is the Amazon Web Service.

Amazon Web Services offers global cloud based products which include databases, storage, networking, IoT, developer tools, analytics, mobile, develo management tools, security applications etc.

The services are of immense benefit to organizations as they help them in achieving their goals as it helps in lowering IT costs, increase speed, enhance efficiency and revenue.

Three reasons why users attach speakers to their computers.

Answers

Answer:

Iv'e answered this question 2 times already lol. The purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.

Explanation: I hope this helps!

Which best describes the possible careers based on
these employers?
Yoshi worked in Logistics Planning and Management
Services, Dade worked in Sales and Service, Lani
worked in Transportation Systems/Infrastructure
Planning, Management, and Regulation, and Miki
worked in Transportation Operations.
Yoshi worked in Transportation Operations, Dade
worked in Logistics Planning and Management
Services, Lani worked in Sales and Service, and Miki
worked in Transportation Systems/Infrastructure
Planning, Management, and Regulation
Yoshi worked in Health, Safety, and Environmental
Management, Dade worked in Transportation
Operations, Lani worked in Facility and Mobile
Equipment Maintenance, and Miki worked in
Warehousing and Distribution Center Operations.

Answers

Answer:

It's c bodie I'm fr on this question rn lol

Answer:

the guy above is right, its c

Explanation:

edge 2021

Write a C++ function for the following:
Suppose that Account class has a method called withdraw, which will be inherited by Checking and Savings class. The withdraw method will perform according to account type. So, the late bind is needed. Declare the withdraw method in Account class. The method should take a double input as withdraw amount and output true if the withdraw successfully and false if the withdraw unsuccessfully.

Answers

Solution :

class Account

[tex]$ \{ $[/tex]

public:

[tex]$\text{Account}()$[/tex];

double [tex]$\text{getBalance}$[/tex]();

void [tex]$\text{setBalance}$[/tex]();

[tex]$\text{bool withdraw}$[/tex](double bal);

[tex]$\text{private}:$[/tex]

double [tex]$\text{balance}$[/tex];

}:

[tex]$\text{Account}()$[/tex] {}

double [tex]$\text{getBalance}$[/tex]()

[tex]$ \{ $[/tex]

[tex]$\text{return balance}$[/tex];

}

void [tex]$\text{setBalance}$[/tex](double [tex]$\text{balance}$[/tex])

[tex]$ \{ $[/tex]

this.[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex];

}

[tex]$\text{boolean}$[/tex] withdraw([tex]$\text{double bal}$[/tex])

[tex]$ \{ $[/tex]

if([tex]$\text{balance}$[/tex] >= bal)

[tex]$ \{ $[/tex]

[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex] - bal;

[tex]$\text{return}$[/tex] true;

}

[tex]$\text{return}$[/tex] false;

}

}

Create a class to represent light bulbs
Create a class called Bulb that will represent a light bulb. It should have instance variables for the manufacturer (String), part number (String), wattage (int) and lumens (int). Get and Set methods should be included. Override the equals and to String methods from class Object.
List of Bulbs
Create a class called BulbNode which has fields for the data (a Bulb) and next (BulbNode) instance variables. Include a one-argument constructor which takes a Bulb as a parameter. (For hints, see the PowerPoint on "Static vs. Dynamic Structures".)
public BulbNode (Bulb b) {...}
The instance variables should have protected access. There will not be any get and set methods for the two instance variables.
Create an abstract linked list class called BulbList. This should be a linked list with head node as described in lecture. Modify it so that the data type in the nodes is Bulb. The no-argument constructor should create an empty list with first and last pointing to an empty head node, and length equal to zero. Include an append method in this class.
Create two more linked list classes that extend the abstract class BulbList: One called UnsortedBulbList and one called SortedBulbList, each with appropriate no-argument constructors. Each of these classes should have a method called add(Bulb) that will add a new node to the list. In the case of the UnsortedBulbList it will add it to the end of the list by calling the append method in the super class. In the case of the SortedBulbList it will insert the node in the proper position to keep the list sorted by wattage.
Instantiate two linked lists, and for every Bulb read from the file, add it to the unsorted and sorted lists using the add method. You will end up with the first list having the Bulbs from the input file in the order they were read, and in the second list the Bulbs will be in sorted order.
Display the unsorted and sorted Bulbs in a GUI with a GridLayout of one row and two columns. Put the unsorted Bulbs in the left column, and the sorted Bulbs in the right column.
The input file
There will be an input file provided on Blackboard which contains information about bulbs, one per line, with the manufacturer, part number, wattage and lumens separated by commas, such as:
Phillips, 1237DF2, 100, 1200
You can separate the four items using a StringTokenizer.
Submitting the Project.
You should now have the following files to submit for this project:
Project2.java
Bulb.java
BulbGUI.java
BulbNode.java
BulbList.java
UnsortedBulbList.java
SortedBulblist.java
Submit a jar file.
Rather than upload all the files above separately, we will use Java's facility to create the equivalent of a zip file that is known as a Java Archive file, or "jar" file.
Instructions on how to create a jar file using Eclipse are on Blackboard. Create a jar file called Project2.jar and submit that. Be sure the jar file contains source code, not classes.

Answers

Answer:

umm

Explanation:

In the recursive function findMatch(), the first call is findMatch(array, 0, 4, key) . What are the remaining function calls to find the character 'e'?
public class FindMatch {
public static int findMatch(char array[], int low, int high, char key) {
if (high >= low) {
int mid = low + (high - low) / 2;
if (array[mid] == key) {
return mid;
}
if (array[mid] > key) {
return findMatch(array, low, mid, key);
}
else {
return findMatch(array, mid + 1, high, key);
}
}
return -1;
}
public static void main(String args[]){
char array[] = {'a','b','c','d','e'};
char key = 'e';
int result = findMatch(array, 0, 4, key);
if (result == -1) {
System.out.println("Element not found!");
}
else {
System.out.println("Element found at index: " + result);
}
}
}
a. (array, 2, 4, key) and (array, 3, 4, key)
b. (array, 2, 4, key), (array, 3, 4, key) and (array, 4, 4, key)
c. (array, 3, 4, key)
d. (array, 3, 4, key) and (array, 4, 4, key)

Answers

Answer:

The answer is "Option D".

Explanation:

In the given question "(array, 3, 4, key) and (array, 4, 4, key)", the element 'e' to also be searched is concentrated mostly on the right-hand side of the array since it is in the last place. This same middle value is 2 but findMatch(array, mid + 1 high, key) is labeled twice to move the center pointer to its last position, that is, so move that search item's 'e.'

Which of the following enables robots to do things such as understand itself, walk, talk, and develop skills?
Group of answer choices

self-modeling

gigabit ethernet

political awareness

social distancing

binary verificationism

Answers

Answer:

self-modeling

Explanation:

Robots, which are man-made machines which mimics the actions of man like walking, talking, rendering assistance are part of the future plans to make the society easier. It was mans' attempt to improve the society but still happens to be work in progress.

For the robots to be able to carryout its function, there is need for it to be self modelling in the sense of initiating and executing the commands which was already programmed into it. For example, telling it to walk will be initiated by him as a command, after processing the command, it will execute it without any other information.

Consider a model of a drone to deliver the orders of the customers within the range of 20 km of the coverage area.

Identified at least 5 factors (inputs) required to experiment with the above mention system model (e.g. speed of the drone).


Write down the levels (range or setting) for each factor mentioned above. (e.g. speed ranges from 10km/h to 30km/h).


On what responses (results) will you analyses the experiment’s success or failure (e.g. drone failed to deliver the package on time), mention at least 3 responses

Answers

Answer:

Explanation:

suna shahani kesa a ..

Other Questions
What is the volume of a cylinder with a height of 18.5 m and a base with a diameter of 5.2 m, to the nearest tenth of a cubic meter? Swimming burns more calories per hour than aerobics and cycling. T or F? IM IN A HURRY PLEASE BE QUICK Quayer?A. harsB. harC. hagasD. hicisteEs bueno que ustedes (blank) espanolA. aprendenB. aprendisteC. aprendabaD. aprendanYo que t, (blank) loahora.A. hiciera B. haraC. hiceD. haras Can I get held back in ninth grade with two Fs and two Cs?? IMMEDIATE ANSWERS NEEDED!! (chose random subject to post this) 10.) Find values of x and y for which ABCD mustbe a parallelogram. A x=2 y=4B x=2 y=6C x=2 y=16D x=6 y=2 Which factors of -24 are used to factor x^{2}+2x-24 Weekly Assessment #9Insects, arachnids, worms, and mollusks all belong to which group?verterbrateclassificationinvertebratevascular A base is labeled on the triangle below (look at picture!) What is 7(2b + 3) - 2bPls I need help fast I need the the 4 leaders All of the following explains why solar energy a better source of energy except:Solar energy produces less toxic gas in the atmosphere.Solar energy can be mined with less damage to ecosystems.There is less environmental impact when collecting solar energy.Solar energy is unlimited and easily captured from the Sun. Kelly has two dogs, Pixie and Fifi.Pixie weighs 8.5 kilogramsFifi is 720 grams lighter than Pixie.Work out how much Fifi weighs. Sweat is made by very manymaybe several millionlittle sweat glands scattered around your skin. They are more tightly packed on the palms of your hands and the soles of your feet. When seen in a microscope, each gland looks like a coiled-up tube with an opening on the surface of the skin. Its job is to make sweat. Sweat evaporates from the skin and cools your body.Which best describes the main idea of the passage? A. the purpose of skin B. the skin on feet and hands C. how to use a microscope D. how sweat glands work how can we improve natural resources Rewrite as an exponential equation.In7 = y If an atom of Phosphorous has 17 neutrons, what is its mass number?a) 31b) 32c) 15D) 17 Exit ticket: In the space below, write one similarity and one difference between circle graphs and bar graphsPLEASE HELP ME! I need to turn in my exit ticket right now! Water is to be heated from 10C to 80C as it flows through a 2-cm-internal-diameter, 13-m-long tube. The tube is equipped with an electric resistance heater, which provides uniform heating throughout the surface of the tube. The outer surface of the heater is well insulated, so that in steady operation all the heat generated in the heater is transferred to the water in the tube. If the system is to provide hot water at a rate of 5 L/min, determine the power rating of the resistance heater. Also, estimate the inner surface temperature of the pipe at the exit. How many grams of solid iron will be produced from 32.1 grams of iron (III) oxide? Hint: Balance the equation first Joanne is a 16-year-old girl. She just discovered that she is pregnant. What is the best course of action for her to take?OA.tell her partner and parents and seek help and guidanceOB.hide her pregnancyOC. sue her partner and file a defamation caseOD. stop her education and concentrate only on raising the childOE accept her mistake, move out of her parents' home, and fend for herself