Explain different types of networking-based attacks

Answers

Answer 1

Answer:

Network-based cyber attacks. ... These may be active attacks, wherein the hacker manipulates network activity in real-time; or passive attacks, wherein the attacker sees network activity but does not attempt to modify it


Related Questions

Lets say if my computer shut down every 10 minutes. What can you do to solve the problem. Hint: Use these word in you answer: handy man, restart, shut down, call, and thank you.

Answers

Answer:

You should restart your computer

Answer:

You could call a handy man to take a look at your computer if you are having drastic issues. You could also restart or shut down you computer a few times because it might need a massive update. You might need to call the company  you bought your computer from and ask about what to do when that problem is happening. Thank you for reading my answer!

Explanation:

I think these answers make since.

It is important to create a strong password because it will

let someone steal your personal information
allow your friends to easily guess it
keep your private information safe and secure
give your computer a virus

Answers

Keeps your private information safe and secure...
PLP 2021

when you value stored in a variable its previous value gets _________.
a) Accepted b) Overwritten c) Overlapped​

Answers

Answer:

B

Explanation:

You wore more a thu friends

name 20 input device​

Answers

Answer:

I wish that is helpful

.........

Answer:

Some Input devices are;

KeyboardMouseLight penMicrophoneDocument scannerCharacter readerBar-Code readerTrack pointTouch padTrack ballDigital cameraMagnetic Ink Character readerMagnetic stripTouch screen

____________ reference is used when you want to use the same calculation across multiple rows or columns.

Answers

Answer:

relative cell

Explanation:

So, if you want to repeat the same calculation across several columns or rows, you need to use relative cell references. For example, to multiply numbers in column A by 5, you enter this formula in B2: =A2*5. When copied from row 2 to row 3, the formula will change to =A3

Answer:

Relative

Explanation:

Relative  reference is used when you want to use the same calculation across multiple rows or columns.

Advantages of special purpose computer

Answers

Answer:

The main advantage of the special-purpose systems is the possibility to utilize a much higher fraction of available silicon to actually do calculations. ... All the rest of the calculation, such as the time integration of the orbits of particles, I/O, and diagnostics are handled by a general-purpose host computer..

Explanation:

what is the file extension if the file editing​

Answers

Explanation:

"A file extension (or simply "extension") is the suffix at the end of a filename that indicates what type of file it is. For example, in the filename "myreport. txt," the . TXT is the file extension.Sometimes long file extensions are used to more clearly identify the file type."

list out various computer generation long with their basic characteristic ​

Answers

Answer:

1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ... 1956 – 1963: Second Generation – Transistors. ... 1964 – 1971: Third Generation – Integrated Circuits. ... 1972 – 2010: Fourth Generation – Microprocessors

Explanation:

there are 4 generations ok

please mark me as brainlist

The given SQL creates a Movie table with an auto-incrementing ID column. Write a single INSERT statement immediately after the CREATE TABLE statement that inserts the following movies:
Title Rating Release Date
Raiders of the Lost Ark PG June 15, 1981
The Godfather R March 24, 1972
The Pursuit of Happyness PG-13 December 15, 2006
Note that dates above need to be converted into YYYY-MM-DD format in the INSERT statement. Run your solution and verify the movies in the result table have the auto-assigned IDs 1, 2, and 3.
CREATE TABLE Movie (
ID INT AUTO_INCREMENT,
Title VARCHAR(100),
Rating CHAR(5) CHECK (Rating IN ('G', 'PG', 'PG-13', 'R')),
ReleaseDate DATE,
PRIMARY KEY (ID)
);
-- Write your INSERT statement here:

Answers

Answer:

INSERT INTO Movie(Title,Rating,ReleaseDate)

VALUES("Raiders of the Lost ArkPG",'PG',DATE '1981-06-15'),

("The Godfaher",'R',DATE '1972-03-24'),

("The Pursuit of Happyness",'PG-13',DATE '2006-12-15');

Explanation:

The SQL statement uses the "INSERT" clause to added data to the movie table. It uses the single insert statement to add multiple movies by separating the movies in a comma and their details in parenthesis.

In MS Excel, a function is written as =FUNCTION_NAME(_____________________).​

Answers

Explanation:

A function is a predefined formula that performs calculations using specific values in a particular order. All spreadsheet programs include common functions that can be used for quickly finding the sum, average, count, maximum value, and minimum value for a range of cells. In order to use functions correctly, you'll need to understand the different parts of a function and how to create arguments to calculate values and cell references.

1
When collection of various computers
look like a single coherent system to its
client, then it is called​

Answers

Answer:

The appropriate answer is "Distributed system".

Explanation:

Whenever used by linking several autonomous computers as a single system, considered as distributed system. It could be consist of several kinds of  mainframes, processors as well as stationary machines, it can be programmed. A distributed machine has massive program modules, which operate as a single device on many machines.

Convert (24) 10 to binary​

Answers

Answer:

Decimal 24 to Binary Conversion

The base-10 value of 24 10 is equal to base-2 value of 110002.

I hope it's helpful!

Answer:

The binary of 24 is 11000


What are examples of object types that can be viewed in the Navigation pane? Check all that :

commands
forms
options
queries
tasks
tables

Answers

Answer:

2.) Forms

4.) Queries

6.) Tables

Explanation:

One of the following represent class B IP address? A.255.255.255.0 B. 125.123.132 C.24.67.11.8 D.191.23.21.54​

Answers

Answer:

D.191.23.21.54

Explanation:

Class B networks use a default subnet mask of 255.255. 0.0 and have 128-191 as their first octet. The address 191.23.21.54 is a class B address

(Please heart the answer if you find it helpful, it's a motivation for me to help more people)

Under foreign corrupt practices act, under what conditions is a bribe not unlawful explain and provide an example

Answers

Answer:

ex. telling your children if you clean up you get new toys

A company utilizes a specific design methodology in the software design process. They utilize concepts of encapsulation in design. Which design
methodology would they be using?
A
structured design
B.
modular design
C.
object-oriented design
rapid application development
D
E
use-case design

Answers

Answer:

C. object-oriented design

Explanation:

Answer:

c. object- oriented design.

Explanation:

i took the test.

Create the HTML code for this
1.Font size for the text is 20px2.Background color for table dataiscyan and table headeris lightgrey.3.Text is center aligned.4.Height of the table is 200px andwidth is 500px.5.Border thickness 2px,colour black and collapsed

Answers

Answer:

index.html:

<!DOCTYPE html>

<html>

 <head>

   <title>Brainly</title>

   <link href="style.css" rel="stylesheet" type="text/css" />

 </head>

 <body>    

   <table id="myTable">

     <caption>Duty Roster for last two days</caption>

     <tr><th>Day</th><th>Morning</th><th>Afternoon</th></tr>

     <tr><td>Monday</td><td colspan="2">John</td></tr>

     <tr><td>Tuesday</td><td rowspan="2">Tom</td><td>Peter</td></tr>

     <tr><td>Wednesday</td><td>simon</td></tr>

   </table>

 </body>

</html>

style.css:

#myTable {

 background-color: Cyan;

 border-collapse: collapse;  

 height: 200px;

 width: 500px;

 font-size: 20px;

}

#myTable td,th {

 border: 2px black solid;

 text-align: center;

}

#myTable td:first-child, th {

 background-color: lightgray;

 font-weight: bold;

}

What happens when two users attempt to edit a shared presentation in the cloud simultaneously? The second user is unable to open the presentation. When the second user logs on, the first user is locked out. A presentation cannot be shared in the cloud for this reason. A warning notice will alert the users that the presentation is in use.

Answers

Answer:

a warning notice will alert the users that the presentation is in use

Explanation:

I did it on edge

Answer:

D; A warning notice will alert the users that the presentation is in use.

Explanation:

Edge

Use the five-step decision-making process discussed in Chapter 1 to analyze the following situations and recommend a course of action.

You are a new salesperson at a large software manufacturing firm. It is three weeks from the end of the sales quarter and you and your sales manager are sitting pretty—you have both already met your sales quota for the quarter. In addition, you just closed another deal with a new customer for $100,000 of software and customer service. This order would put you way over your sales quota for the current quarter. Your manager suggests that you hold this new order so it gets recorded against next quarter. She explains that because sales during the next three months tend to slow down, salespeople frequently miss their quotas and associated sales bonuses for that quarter. Holding this large order to next quarter would help you get an excellent start and almost guarantee that you meet your quota. What would you do?

Answers

Answer:

The responses to this question can be defined as follows:

Explanation:

Yeah, their numerous sponsorships brands have potential. Every business does have its Trademarks for a commodity, that distinguishes others. It's an infringement for trademarks, it has only provided to those trivialities, which success and if I would plan this for my friend. I would never list or show those points of his accomplishments I never would Numerous sponsors. This should include all its information using its trademarks as well as other Site partners are excluded even though they are or are browsing their trademarks where the law is prohibited.

1. What characteristics are common among operating systems? List types of operating systems, and
examples of each. How does the device affect the functionality of an operating system?

Answers

The fundamental software applications running upon that hardware allow unauthorized to the interface so much with the equipment because then instructions may be sent and result obtained.

Some characteristics of OS are provided below:

Developers provide technology that could be suitable, mismatched, or otherwise completely at odds with several other OS categories throughout various versions of the same similar OS.Throughout two different versions, the OS's are often 32 as well as 64-Bit.

Type of OS:

Distributed OS.Time-sharing OS.Batch OS.

Learn more about the operating system here:

https://brainly.com/question/2126669

full meaning of ENDVAC

Answers

Answer:

EDVAC was one of the earliest electronic computers. Unlike its predecessor the ENIAC, it was binary rather than decimal, and was designed to be a stored-program computer. ENIAC inventors John Mauchly and J. Presper Eckert proposed the EDVAC's construction in August 1944.

Explanation:

Here is the full meaning

Companies sometimes pay search engine companies to have their websites located at the top of the search results. Do you think this is fair/ethical?

Answers

Answer:

I really don't think that it is fair or ethical.

Explanation:

When companies pay to put their websites at the top it is known as an ad. They are in top search engines like the ones we use every day. I believe this is unethical because it often results in confusion and sometimes misleads the user as the titles often use clickbait.


Name the eight areas in which computers are used.
1.
2.
3.
4.
5.
6.
7
8.
s Review (Page 121​

Answers

Answer:

pakistan

india

usa

china

uk

afghanistan

iran

iraq

israel

Which statement is true for slide or positive film?
A.
Slides or positive films give low color saturation and contrast.
B.
Slides or positive films give high quality pictures with higher color saturation and contrast.
C.
Slide or positive films cannot be used to digitize and scan pictures.
D.
Slide or positive films are useful for cheaper compact cameras.

Answers

Answer:

B.

Slides or positive films give high quality pictures with higher color saturation and contrast.

Explanation:

The above is true for slides with positive film. This is because, the positive film happens to have a high resolution when it was been used thereby giving out a high quality video at the end of the recording. The higher colour saturation and contrast are also an attribute of a slide  or positive film.

Answer:

B

Explanation:

why is it important to give files name that are descriptive of their content​

Answers

Answer:

Provide a descriptive document file name and title

A unique, descriptive file name helps individuals understand the general topic of a document. Include similar information when writing the title of the document, and apply appropriate punctuation, e.g., no underscores.

Explanation:

Please give thanks to all my answers and please mark as brilliant and please follow me

algorithm and flowchart of detect whether entered number is positive, negative or zero​

Answers

What is this how many times are you going to say that unless it’s a visual glitch on my part?

Implement the function permutations() that takes a list lst as input and returns a list of all permutations of lst (so the returned value is a list of lists). Do this recursively as follows: If the input list lst is of size 1 or 0, just return a list containing list lst. Otherwise, make a recursive call on the sublist l[1:] to obtain the list of all permutations of all elements of lst except the first element l[0]. Then, for each such permutation (i.e., list) perm, generate permutations of lst by inserting lst[0] into all possible positions of perm.

>>> permutations([1, 2])

[[1, 2], [2, 1]]

>>> permutations([1, 2, 3])

[[1, 2, 3], [2, 1, 3], [2, 3, 1], [1, 3, 2], [3, 1, 2], [3, 2, 1]]

>>> permutations([1, 2, 3, 4])

[[1, 2, 3, 4], [2, 1, 3, 4], [2, 3, 1, 4], [2, 3, 4, 1],

[1, 3, 2, 4], [3, 1, 2, 4], [3, 2, 1, 4], [3, 2, 4, 1],

[1, 3, 4, 2], [3, 1, 4, 2], [3, 4, 1, 2], [3, 4, 2, 1],

[1, 2, 4, 3], [2, 1, 4, 3], [2, 4, 1, 3], [2, 4, 3, 1],

[1, 4, 2, 3], [4, 1, 2, 3], [4, 2, 1, 3], [4, 2, 3, 1],

[1, 4, 3, 2], [4, 1, 3, 2], [4, 3, 1, 2], [4, 3, 2, 1]]

Answers

Answer:

def permutations(myList: list)-> list:  

   if len(myList) <= 1:  

       return [myList]  

   perm = []  

   for i in range(len(myList)):  

      item = myList[i]  

      seglists = myList[:i] + myList[i+1:]  

      for num in permutations(seglists):  

          perm.append([item] + num)  

   return perm

 

data = [1,2,3]  

result = permutations(data)  

print(result)

Explanation:

The program defines a python function that returns the list of permutations. The program checks if the length of the input list is less than or equal to one. The function declaration identifies the input and output as lists.

The for loop iterate through the list and the permutations are saved in an empty list in the next loop statement. At the end of the program, the list of lists is returned.

A local real estate company can have its 25 computers upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?

Answers

Answer:

it is

Explanation:

400 dollars for 10 systems and 200 dollars for 5 systems

explanation

first

find the price of 1 system or computer which is done by dividing 1000 by 25

25)1000(40

100

____

00

00

__

0

then multiple it by 10 =40 ×10=$400

Answer:

400!!

Explanation:

What is one way to use proper netiquette when communicating online? Ask permission before posting private information. Post a message when you are angry Use CAPS when sending a message. Use unreliable sources.

Answers

Answer: A

Explanation:

Being a responsible netizen you must respect anyone using internet. Be mindful of what you share which include fake news, photos and video of others. Watch you're saying, if you wouldn't say something in real life dont say it online. You must think before you click not to hurt others.

Answer:

Ask permission before posting private information.

Explanation:

Just the most logical answer

What are the inputs and outputs of the app "Spotify"?

Answers

Hey the I/O for Spotify would be. for I or input keyboard and mouse.

and for O or output the sound files being sent from the server to the pc

Hope this helps.

-Toby  aka scav

Answer:

Input is for mics and other tools, output is your audio interface, speakers, headphones, so on. 3. At the top you'll find general system-wide settings, below you find dedicated settings for each open app. You'll need to have Spotify open to see it there.

Explanation:

Other Questions
Item 4 Find the distance between the two points. (4, 5), (1, 7) What is the value of f(-5)? Guys please help me I am dead confused Protein are digested and transported by fellow protein. Give vivid examples to support the statement plz I need this tonight help me what groups fought the wars from the mid 1300's to 1485 and why? What is one of the major conclusions made from the study of line spectra of various elements?A)the movement of electrons outside the nucleusB)absorption and emission of energy is quantizedC)the presence of energy beyond the visible spectrumD)the presence of electrons outside the nucleus of an atom Please help me if you dont help me I will get in big trouble :( Can someone help me please Ill mark as brainliest hi can u please help solve this. something with conjugnates. Find the value of x. I will give brainliest if you get it right!, please double check your work! Thannks! Which of the following about writing and revising business documents is most accurate? a. Experienced business writers rarely need to revise. b. Revision is not necessary for informal documents such as internal memos or e-mail messages. c. The real work of revision should happen in the writing stage as you select words and form sentences. List out fifteen ways of how you use water in your everyday life forma de los materiales que no cambian de al manipularlos Triangle A is similar to triangle B.If the scale factor of triangle A to triangle B is 4 to 5,what is the ratio of the perimeter of triangle A to triangle B? HELP ME PLEASE ILL GIVE BRAINLY IF U GET IT RIGHT PLEASE!!!! What is the value of (-4) (68) (1/4 NO ONE IS HELPINNGGGG PLZZZZ 30 PTS +brainliest School Questions 1. What should you do if you feel an earthquake happening? 2. Explain why a rural area might be a safer place to experience an earthquake than a large city.3. Describe the three kinds of waves that are produced in an earthquake. All of the trees in an ecosystem are examples the _______________ in an ecosystem.Mammals Abiotic factorsHeterotrophsBiotic Factors