Which is not a way the network operating sys-
tem provides security?
a
user authe...
![subject](/tpl/images/cats/informatica.png)
Computers and Technology, 05.11.2019 00:31 ri069027
Which is not a way the network operating sys-
tem provides security?
a
user authentication
b
anti-virus software
c
router
d
encryption
![ansver](/tpl/images/cats/User.png)
Answers: 1
![](/tpl/images/ask_question.png)
![](/tpl/images/ask_question_mob.png)
Other questions on the subject: Computers and Technology
![image](/tpl/images/cats/informatica.png)
![image](/tpl/images/cats/informatica.png)
Computers and Technology, 24.06.2019 18:00, janeou17xn
Which of the following is an example of synchronous communication? a) e-mail b) voicemail c) telephone conversation d) text message.
Answers: 1
![image](/tpl/images/cats/informatica.png)
Computers and Technology, 24.06.2019 21:30, asimms8504
Suppose a router has built up the routing table shown in the table. subnet number 128.96.39.00 28.96.39.128 128.96.40.00 192.4.153.0 default) subnet mask 255.255.255.128 255.255.255.128 255.255.255.128 255.255.255.192 nexthop interface 0 interface 1 r2 r3 r4. the router can deliver packets directly over interfaces 0 and 1, or it can forward packets to routers r2, r3, or r4. describe what the router does with a packet addressed to each of the following destinations: (a) 128.96.39.10 (b) 128.96.40.12 (c) 128.96.40.151 (d) 192.4.153.17 (e) 192.4.153.90
Answers: 3
You know the right answer?
Questions in other subjects:
![Konu](/tpl/images/cats/mat.png)
![Konu](/tpl/images/cats/fizika.png)
![Konu](/tpl/images/cats/himiya.png)
![Konu](/tpl/images/cats/mat.png)
Mathematics, 03.03.2021 21:50
![Konu](/tpl/images/cats/mat.png)
![Konu](/tpl/images/cats/mat.png)
![Konu](/tpl/images/cats/mat.png)
![Konu](/tpl/images/cats/himiya.png)
Chemistry, 03.03.2021 21:50
![Konu](/tpl/images/cats/mat.png)
Mathematics, 03.03.2021 21:50
![Konu](/tpl/images/cats/mat.png)
Mathematics, 03.03.2021 21:50