Pat is asked to automate critical security functions like responding to detected threat patterns in an enterprise network. Which of the following should be done by Pat?

a. Use virtual desktop infrastructure
b. Use software-device visibility
c. Implement subnetting
d. Use a software-device network

Answers

Answer 1

The option to be done by Pat is to Use a software-device network.

What is Software-device networking?

Software device networking is known to be a kind of technology approach to a network management.

It is one that helps to have a dynamic, programmatically efficient type of network configuration  so that one can have a better network performance and monitoring.

Learn more about  software-device network from

https://brainly.com/question/4171513


Related Questions

how do you create 2 dimensional array with c++?

Answers

2 dimensional arrays in C++ are arrays that have 2 dimensions i.e. rows and columns

How to create the array?

To create a 2-dimensional array in C++, you make use of the following syntax

data_type array_name[rows][columns];

Assume the following parameters:

The data type of the array is integerThe array name is StudentsThe array has 10 rows and 20 columns.

The declaration of an array with the above properties would be:

int Students[10][20];

Read more about arrays at:

https://brainly.com/question/22364342

You're a consultant for a large enterprise that needs a comprehensive IP addressing and DNS management solution for its physical and virtual networks. The enterprise has a primary office in Pittsburgh and three branch offices in Los Angeles, New York, and Miami. It has IT support staff only in the branch offices.The enterprise's server specialists are located in Pittsburgh. The IT directory in Pittsburgh wants to offload some of the IPAM management functions to some of the IT staff without giving them broader domain or forest administrative right. Which type of IPAM architecture do you recommend? Which features of IPAM are you likely to recommend using to address the requirements?

Answers

The type of IPAM architecture that I will recommend is the Centralized IPAM. The centralized IPAM server when deploy can help to address the issue.

What is IPAM?

IPAM (IP Address Management) is known to be a kind of administration of DNS and DHCP. This is known to be a network services that helps and handles IP addresses to machines in a TCP/IP network.

The Centralized Repository can help administrators to maintain or keep a good, correct and current records of all their IP assignments and left over addresses.

Learn more about IPAM from

https://brainly.com/question/24930846


________ can contain stacked images, text, and other elements which collectively comprise a Photoshop file.

Answers

If you don’t mind can u add the picture it helps me Answer the question better

Why do you want to work for Rev?

Answers

People do have reasons why they want to work for a particular company. It may be due to what they company stands for, what they make or about your dream.

I can therefore say that I want to work for Rev because they are revolutionizing the industry and I want to be part of the change process.

How do you answer why do you want to work?

Note that when looking for a job, job experience do matter. When ask the reason for looking for this job.

One can answer that they have the experience or the needed expertise and skills required for this job as they want to be aligned with what the company stands for.

Learn more about work  from

https://brainly.com/question/25573309

Which item is used in Excel to identify the row of a particular cell?
letter
number
type
sheet

The answer is B) number

Answers

Answer:

B) number

Explanation:

you are correct! for instance the cell E3 has the column E and the row 3

Draw a rectangle, give its perimeter and Area
Ask the user for a length and width of a rectangle.
Draw the rectangle
find and show the perimeter
find and show the Area

Answers

I am assuming this is in python, so I will use comments to explain each step

l=int(input('What is the length of the rectangle')

w=int(input('What is the width of the rectangle')

#here use whatever graphics code required to draw the rectangle

#will probably be similar to rect=Rectangle(l,w)

print('Perimeter is' +(2*l+2*w))

print('Area is' +(l*w))

Dalton completed a research project with Word Online. He would like to print and show it to a family member. Which ribbon tab does Dalton need to select to print a document with Word Online a review b file c home d view

Answers

The ribbon tab that Dalton needs to select to print a document with Word Online is: B. file.

What is Word Online?

Word Online can be defined as a word processing software application that is designed and developed by Microsoft Inc., so as to enable its end users type, format and save text-based documents over the internet.

Generally, the print command is located in the file section of the ribbon tab in Word Online and as such Dalton needs to select it from there.

Read more on Word Online here: https://brainly.com/question/18272535

You work as an assistant in your school’s computer lab. A student asks you to help her install a program on her laptop using an installation disc she borrowed from a friend. You read the EULA and notice that it provides only a single-user license. What are the ethical and legal issues surrounding using a single-user license on more than one computer? What should you do?

Answers

The ethical and legal issues surrounding using a single-user license on more than one computer is that if caught, it can lead to termination of the software package that you are in.

The ethical implication is that one cannot be trusted, our integrity has have brought down to zero. The right thing to do is to explain to the student and if you can, get her another software.

What is single user License agreement?

Single User License is a term that connote that there shall be only one person to use, receive and access a product or software  and it cannot be shared with other individuals.

In Single user, the software is said to be licensed for a single user and not for Multi-user.

Learn more about User License  from

https://brainly.com/question/13502276

True or false: the HTTPs means that the information on a website has been fact-checked
True
False

Answers

Answer:

False

Explanation:

Complete the sentence.
For self-driving cars, both the programmers of the software and governments who regulate them must adhere to
intellectual property laws
ethical principles
noncompete agreements
- to safeguard that the software that controls the car is capable of making life-or-death

Answers

Answer:

[ C ]  governments who regulate the car industry

[ D ]  the programmers who create the software that control the car

Proof:

Governments who regulate the car industry, the programmers who create the software that control the car are the complete sentence.

What is car industry?

Car industry is the place where the manufacturing of the cars and automobile parts are placed. Car industry  do manufacturing work for the selling purpose. The company may be directly or indirectly engage in the selling industry.

Thus, sentences are completed.

For more details about car industry, click here:

https://brainly.com/question/1139792

#SPJ2

When you are hired to develop a system for an organization. Is it important to follow all the requests/wants of the system owner rather than of the system user?

Answers

If you are hired to develop a system, note that Is it vital to follow all the requests or needs of the system's owner.

The company knows what they want and it is good you do comply with their directives. You can only give your suggestions if need be.

Who can develop an information system?

The information systems field is one that is made up of people in organizations that are skilled and can design and build information system.

Note that to be  hired to develop a system, one has to follow all the requests/wants of the system owner instead of the system user as the one who needs it knows what he or she wants so you have to comply with it. You can only give your suggestions.

Learn more about system from

https://brainly.com/question/13603602

A person can only give blood to someone with compatible blood antigens. If a person receives blood from someone with an incompatible blood type, it can cause a life threatening immune system reaction. The blood transfusion will likely fail.
Your program should ask a user’s blood type first, then if she/he want to learn about giving or receiving blood. Based on the blood type and choice of give or receive, your program will print the corresponding compatible blood types.
NOTE, if the blood type or give/receive choice entered doesn’t exist, the program should promote the user to re-enter it again.

Answers

The antibodies will see the blood donor as foreign and attack the donated blood

Write the pseudocode for the following scenario. The final exam marks for 10 students are 65, 45, 78, 65, 89, 65, 79, 67, 75, and 63. The marks are stored in an array. Find: • The student with the highest mark. • The student with the lowest mark. • The total marks for all the students. • The overall average.

Answers

The pseudocode of the program serves as a prototype of the program

How to determine the pseudocode?

The pseudocode of the program is as follows:

StartDeclare array MARKSInput MARKS[0] to MARKS[9]Sort MARKSPrint MARKS[9] ----- this prints the highest markPrint MARKS[0] ----- this prints the least markFOR I = 0 TO 9; ADD MARK[I] TO TOTALPrint TOTALPrint TOTAL/10Stop

The above pseudocode gets input for the array; then sorts the array before performing the required operations

Read more about pseudocodes at:

https://brainly.com/question/24735155

You have been asked to investigate a web server for possible intrusion. You identify a script with the following code. What language is the code in and does it seem likely to be malicious? import os, sockets, syslog def r_conn(ip) s=socket.socket(socket.AF_INET,socket.SOCK_DGRAM) s.connect(("logging.trusted.foo",514))

Answers

The code below is written in JavaScript and does not seem malicious.

What is a Malicious Code?

A Malicious code is one that is not designed for any productive end but to cause disruptions in the computer with the objective of

harming the workstation; or destroying the data stored therein.

There are numerous classifications of malicious codes and they can be identified and removed by an application called an Anti-Virus or malicious app remover.

Learn more about JavaScript at:
https://brainly.com/question/16698901

You ran your email by a few colleagues, and they think it is perfect for your audience – professional, technical, and informative. Your email is ready to send out, so you schedule it for 8AM the next day to reach customers’ inboxes as they start their day. How should you include the email addresses?

Answers

You should include in the email addresses by CC all recipients.

What does it mean to CC recipients?

The CC abbreviation is a term that stands for “carbon copy.”

The CC recipients is known to get or receive also the same copy of the email and any kinds of other “Reply All” responses that one can see in the thread. Note that all recipients of the email will also see who has been given the CC' message.

See options below

-CC all recipients.

-BCC all recipients

Learn more about email from

https://brainly.com/question/14236855

answer quickly!!!!! please answer as soon as you see this!
Which feature of a database displays data in a certain sequence, such as alphabetical order?

Chart
Filter
Search
Sort

Answers

Sort is the answer to this

IM a bit confused on what this is asking for exactly.

Answers

Answer:

im not sure can you ask someone for help

Explanation:


Which part of the Word application window should the user go to for the following activities?:

Answers

Answer:

what are the activities

when doing a complex presentation which of the fallowing will be the best tool to begin designing your presentation

Answers

Answer:

Explanation:

The options are:

a) Open Office Writer

b) Open Office Impress

c) an outline

d) photographs

The most commonly used presentation software is Microsoft PowerPoint but it is not always available; as is the case here. Of the options, Open Office Impress is the closest in its functions to PowerPoint and is a good tool to design a complex presentation.

A new robot is created to explore volcanoes on other planets. Which robot is
most likely to have been referenced in the design of the new robot?
A. Dante
B. Roomba
C. ASIMO
D. Sophia

Answers

Answer:

A

Explanation: Dante II is a unique walking robot that provides important insight into high-mobility robotic locomotion and remote robotic exploration. Dante's uniqueness stems from its combined legged and rappelling mobility system, its scanning laser rangefinder and its multi-level control scheme.

Which statement best characterizes under what circumstances you should add your social media profile to a resume? You should add your profile even if it is not entirely professional. You should add your profile even if it is not entirely professional. You should add your profile, but it should be entertaining and help you stand out. You should add your profile, but it should be entertaining and help you stand out. You should not add your profile under any circumstances—it is unprofessional. You should not add your profile under any circumstances—it is unprofessional. You should add your profile, but it should be professional and positive.

Answers

Answer:

You should add your profile, but it should be professional and positive.

Explanation:

this is the most reasonable response... resumes are for careers and professions.. so you must be professional and positive (if it is for example linkedin)

This is an example of what type of formula? =AVERAGE(D1:D17) A. ADDITION
B.SUBTRACTION C.RANGE D.AVERAGE

Answers

Answer:

d average

Explanation:

average as it already shows it says average

What is the purpose of memory address?​

Answers

Answer:

A memory address is a unique identifier used by a device or CPU for data tracking.

A memory address is a unique identifier used by a device or CPU for data tracking. This binary address is defined by an ordered and finite sequence allowing the CPU to track the location of each memory byte.



A memory address is an exact assigned location in RAM used to track where information is stored. On a single computer memory IC, there can be 1 million, 2 million, or more memory addresses that can be accessed at randomly, which is why memory is called RAM (random access memory).

5. How would you reorder the animation on a slide using the Animation
Pane?

Answers

Answer:

undo button

Explanation:

I hope this helps

Suppose that you have a computer with a memory unit of 24 bits per word. In this
computer, the assembly program’s instruction set consists of 198 different operations.
All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
1. How many bits are needed for the opcode?
2. How many bits are left for the address part of the instruction?
3. How many additional instructions could be added to this instruction set without
exceeding the assigned number of bits? Discuss and show your calculations.
4. What is the largest unsigned binary number that the address can hold?

Answers

Answer:

a )   The amount of bits required for the opcode

 8 bits

2^8=  256        

 256>198

 We get the next lower number, which is 2^7 = 128 bits, because it is greater than 198. As a result, the operation code necessitates 8 bits.

b)   The number of bits reserved for the instruction's address.

 16 bits

 24-8  =  16

c)  

 65536

2^16  =  65536

 Maximum number =  65535

  2^15 = 32768-1

 =  32767

Explanation:

13. In cell B16, use the SUMIF function and structured references to display the total wins for teams in the Youth league.

Answers

Using the SUMIF function and structured references to display the total wins for teams in the Youth league is gotten as; 65

How to make use of the SUMIF Function?

The SUMIF function in excel combines a condition and a sum of the values which meets the stated condition. That is; SUMIF(row_range, condition)

From the attached image we can see the number of times youth won the league in column D. Also, we can see the total number of youth wins in column H under Total.

Thus, using SUMIF function for the total number of wins, we have;

B6 = SUMIF(SwimTeams[League], "youth",H3:H12

B6 = 21 + 16 + 12 + 9 + 7

B6 = 65

Read more about the SUMIF Function at; https://brainly.com/question/19595606

An IT infrastructure manager is reviewing his company's computer assets, particularly the mean time to failure (MTTF) of the PC and server hard drives. The manufacturer of the hard drives typically used in the company states that the MTTF is approximately 11 years. Because servers and some high-priority workstations must operate continuously except for brief periods of maintenance, how many hours, on average, can these hard drives be expected to operate before failure

Answers

The numbers of  hours, on average, can these hard drives be expected to operate before failure is 24 hours a day, also seven days a week and 365 days a year.

How many hours can Hard drive last?

The total life-time of a hard disk is said to be 5 years" that is about 43,800 hours of been in constant use.

Note that a key  reliability-linked criterion for the selection of storage components is based on its operating duty that is the numbers of  many hours in a day a drive can be active for.

A lot of HDDs used by Enterprise-class applications are said to be optimized for constant use that is 24 hours a day, seven days a week, and 365 days a year.

Note that a Managed Service Provider (MSP) have to plan for a failure in every 1000 hours that is about 42 days.

Learn more about hard drives from

https://brainly.com/question/1558359

Discussion 5
Kris Allen runs a pet daycare center. She needs to keep track of contact information for her customers, their animals, the services provided (such as walking and grooming), and the staff who are assigned to care for them. She also must send out invoices for payment each month. What features of spreadsheets and/or database software might she use to facilitate her business?

Answers

The features of spreadsheets and/or database software that she can use to facilitate her business are;

Rows and columns in spreadsheet's can make her information to be neatly organized.The use of Formulas and functions. Data filtering Accounting.Analytics, etc.

Why does business use database software?

Businesses can known to use database software to make a good and well manage data output. They also use it to work with their data.

Note that in almost all kinds of businesses, there is the use database software just to keep a track of contacts, addresses, payrolls and other  kind of functions to is linked to business and customers.

Learn more about database software  from

https://brainly.com/question/1022352

state the name of the following computer components​

Answers

Answer:

Memory.

Hard Drive or Solid State Drive.

Video card.

Motherboard.

Processor.

Power Supply.

Monitor.

Keyboard and Mouse.

Explanation:

Memory
Hard Drive or Solid State Drive
Video card
Motherboard
Processor
Power Supply
Monitor
Keyboard and Mouse
Optical Drive DVD/RW
Ethernet or Wireless card


Central Processing Unit (Cpu)
Random Access Memory (Ram)
Motherboard
Solid State Drive (Ssd)
Three
Games User Interface
Floppy Drive
Conclusion
The Motherboard
Usb Ports
Hardware And Software
Disk Drive
Optical Disk Storage
Scsi
Laser Printer
Processing Devices
Keyboard And Mouse
Lcd
Internal
External
Stylus
Code
Non Volatile Memory
Utility Software

Similarities in off-site and On-site

Answers

Answer:

Off prevents the page from finding your easy search terms; basically what you search for, while On page will help you improve the quality of your newly designed web page.

▬▬▬Casual Terms▬▬▬

Off page means that you are not actively viewing a page; unlike On, it would mean the exact opposite.

▬▬▬Conclusion▬▬▬

I Hope you have a great day!

Answer:

onsite is on or at a site while offsite is away from a mail location in a place not owned by a particular organization.

Other Questions
In a plant with genotype Gg for pod color, what percentage of the gametes will have:the dominant (G) allele? _________, the recessive )g) allele? _______ Need help with his geometry question. Find the value of x All changes saved 16. The Abdul family is comparing the costs of two different high-speed Internet services. With plan A, equipment installation is $199, and the monthly fee is $50. With plan B, the installation is $50, with a $90 monthly fee. The cost of Part A is given by f(x) = 50x + 199 and the cost of Part B is given by g(x) = 90x + 50, where x is the number of months of service. Part A: Make two tables that you could use to graph the functions. Let x = 0, 1, 2, 3, 4, 5, and 6. Part B: Graph both functions. Part C: The Abduls plan on using the Internet service for one year. Based on cost, which plan would you recommend? Explain. "A ball with a mass of 0.1 kg is rolling at a velocity of 5 m/s. What is itsmomentum?" What Given is the 5 in this problem? *massvelocityaccelerationmomentum Which of these best identifies the shift of mood in this sentence?Jamie is playing outside in the rain, so will he not catch a cold? A. from indicative to interrogative B. from imperative to conditional C. from imperative to indicative D. from interrogative to conditionalHELP DUE TOMMOROW The____grew on theThesuccess of the ScientificRevolution.A. EnlightenmentB. Age of EmpiresC. Protestant Reformation I CANT FIGURE THIS OUT I NEED HELPSolve and graph the inequality: [tex]-1/2x + 8\geq 6[/tex] Although Enrique continues to make poor decisions and is even imprisoned, he has what the author calls enormous luck. Using details from the story, explain what ultimately happens to Enrique. 1. In the sentence below,identify the subject(s),select all that apply:Winnie-the-Pooh gave Piglet a pot of golden honey.Question 4 options:PigletWinnie-the-Poohpothoney2. In the sentence below, identify theobject(s), select all that apply:Winnie-the-Pooh gave Piglet a pot of golden honey.Question 5 options:potPiglethoneyWinnie-the-Pooh3. To find a main noun and verb in a sentence, it's best practice to find theverb(s)first.Question 8 options:TrueFalse4. How do you test a word to see if it's a main verb? (select all that apply)Question 10 options:Find the subject and try words to see if there's a verb.Find all words with "ing" endings.Ask who/what before the word, followed by the rest of the clause.If the question makes sense as a question (without adding extra words), you've found a verb.Determine what the word isdoing/beingin the sentence.5. Which of the following are "watch out words" for verbs, words thatlooklike verbs but are not main verbs? (Select all that apply)Question 11 options:Participles are not main verbsIf a verb follows an object it is not a main verb.Verbs ending in "ed" are not main verbs.Gerunds are not main verbs.If a verb follows a relative pronoun it is not a main verb.If a verb follows a subject it is not a main verb.If a verb follows the word "to" it is not a main verb.6. Determine themain verb(s)in the sentence below, select all that apply:As soon as he saw the big boots, Pooh knew that an adventure was going to happen, and he brushed the honey off his nose with the back of his paw, and spruced himself up as well as he could, so as to look ready for anything.Question 14 options:knewbrushedwas goingsprucedsawhappenlook7. Determine themain verb(s)in the sentence below, select all that apply:Pooh sat down, dug his feet into the ground, and pushed hard against Christopher Robin's back, and Christopher Robin pushed hard against his, and pulled and pulled at his boot until he had got it on.Question 15 options:had gotdugpushedpulledsat8. In the sentence below, determine themain verb(s), select all that apply:Piglet was sitting on the ground at the door of his house blowing happily at a dandelion, and wondering whether it would be this year, next year, sometime or never.Question 16 options:wassittingblowingwondering9. In the sentence below, determine thesubject(s), select all that apply:Piglet was sitting on the ground at the door of his house blowing happily at a dandelion, and wondering whether it would be this year, next year, sometime or never.Question 17 options:yearhousePigletdandelion Environmentalists are monitoring an area of tropical forest that is being deforested because of human activities. The graph here shows the scientists' predictions based on the data they have collected. How is the ecosystem likely to change as a result? Select the two correct answers.A. decrease in biodiversityB. gain in oxygenC. gain of speciesD. loss of habitat The basic elements of the nervous system are called:. What is juan's plan after writing the letter to mariana?a. to move to paris and be with marianab. to get a job at the censorship office and intercept the letter.c. to wait and hope that the letter never makes it to mariana. A boy walks up a hill. His displacement from his starting point is (800, 150) m. How much gravitational potential energy has he gained? 100 POINTS!! Pls help! (I messed up putting the points on the other one)Down syndrome, the most common genetic condition in the United States, is also known as Trisomy 21. What does this mean.A. A person with Down syndrome has three copies of chromosome 21 instead of two copies. An extra chromosome 21 was present in either the sperm or the egg cell. 2. The following table provides information about the production possibilities frontier of a Country.(4)Computer Wheat 0 42010 40030 36050 30070 20090 0a. Plot and connect these points to create Country's production possibilities frontier.b. If the Country currently produces 10 computers and 400 kg wheat, what is the opportunity cost of an additional 20 computers?c. Suppose that a technological advancement allows the country to produce computers more efficiently. What would be the effect on the PPF? Draw it. In a math class with 28 students, a test was given the same day that an assignment was due. There were 18 students who passed the test and 19 students who completed the assignment. There were 15 students who passed the test and also completed the assignment. What is the probability that a student passed the test given that they completed the homework I need help please. Find the volume of the composite solid. Explain how many solutions this system of equations has. Please please please help me really quick i just need help please! Theresa entered a photo contest. Each entry was judged by three judges in four different categories. Each category was a percent of the overall score: Originality was 20%, technique was 35%, composition was 20%, and impact was 25%. Entries could earn up to 50 points in each category.Theresa's scores are shown in the table.Judge Originality Technique Composition ImpactA 40 45 30 45B 45 45 40 40C 35 40 35 40This equation can be used to find her weighted score for each judge.weighted score = (weightoriginality)+(weighttechnique)+(weightcomposition)+(weightimpact)What was Theresa's weighted score from each judge?Enter your answers in the boxes.Theresa's weighted score for Judge A was .Theresa's weighted score for Judge B was .Theresa's weighted score for Judge C was .Question 2What is Theresa's overall average score from the three judges?Enter your answer in the box. Round your answer to the nearest tenth. points