Answer:
An attempt to generate a large number of session IDs and have a server process them as part of a session hijack attempt is known as
TCP Session Hijacking.
Explanation:
TCP Session Hijacking is a cyber-attack in which illegitimate access is acquired to a client's server in the network. The attacker then hijacks the TCP/IP session by reading and modifying transmitted data packets and also sending requests to the addressee's server. To achieve this attack effectively, the hacker generates a large number of session IDs, thereby confusing the client's server to process them as a part of the users' sessions. Sessions (a series of interactions between two communication end points) are used by applications to store user parameters and, they remain alive until the user logs off.
Overflow and roundoff errors result from real-world limitations in representing . . . (10 points)
A. number systems
B. fractions
C. place values
Answer:
C. place values
Explanation:
Place value can be defined as the numerical value representing a digit owing to its position in a number. Some examples of the various place values used in representing each digit are tenths, hundredths, thousandths, unit, tens, hundreds, thousands etc.
For example, in the number 316.2;
The place value of 3 is hundreds. The place value of 1 is tens. The place value of 6 is units. The place value of 2 is tenths.In the real-world, their instances where there are limitations in counting and representing real numbers that are infinite (too small or too large). In order to overcome these limitations or barriers, we use place values.
An overflow error arises when a real number cannot be represented because it is too large and exceeds the upper limits of a range chosen.
Also, a roundoff error can be defined as the difference between the output generated from an algorithm using an exact or actual numbers and the output generated using rounded or finite-precision numbers.
Hence, overflow and roundoff errors result from real-world limitations in representing place values.
Squared Age as Year - A person born in 1980 can claim "I will be x years old in the year x squared." Write a python program to calculate how old a person born in 1980 will be when the value of their age (x) squared is equal to the year they are x years old on their birthday.
Answer:
40
Explanation:
its simple math
When you go to Starbucks, you note that your IP address is 192.168.104.2, and that your netmask is 255.255.240.0. . How many bits are in the host portion of this subnet
Answer:
The correct answer is 4 bits.
Explanation:
First we must identify what class it belongs to and we see the first octet on the left side of the IP address, which is 192 and we can determine that it is a Class C address, therefore its mask is:
Default mask 255.255.255.0 => 24 bits.
IP mask 255.255.255.240 => 28 bits.
We can conclude that I borrow 4 bits to calculate subnets.
We can conclude the following:
[tex]2^{n} --> 2^{4} -->[/tex]16 subnets maximum.
What is a program? - define and explain
Answer:
a series of coded software instructions to control the operation of a computer or other machine.
Explanation:
a set of instructions that process input, manipulate data, and output a result. For example, Microsoft Word is a word processing program that allows users to create and write documents.
Which form of data does the image represent? (10 points)
A. Analog data
B. Digital data
The function changeLocation is also called a _____.
class bike:
def __init__(self,size,idNum,color ):
self.size = size
self.location = 10
self.color = color
self.idNum = idNum
def changeLocation(self,newLocation):
self.location = newLocation
manipulator
initiator
method
constructor
Answer:
The answer is a method
Explanation:
Answer:
class and self
Explanation:
class Bike:
def __init__(self, str, float):
self.color = str
self.price = float
Hardcoding numbers (unnamed, literal constants) in code without explanation is a bad programming practice. What are these hardcoded numbers known as
Answer:
Magic numbers.
Explanation:
In Computer programming, hardcoding can be defined as a software development process which typically involves directly embedding or infusing data into the source code of a computer software application or program rather than generating the data at runtime or sourcing (obtaining) it from an external source.
Hence, hardcoding numbers (unnamed, literal constants) in code without explanation is a bad programming practice. These hardcoded numbers are known as magic numbers.
A magic number refers to a hard-coded value embedded into the source code of a software program without explanation and as such are very difficult to update.
1. An output device sends data to a computer.
(YALL PLEASE I NEED HELP I GOT AN F ON THIS, I HAVE 1 MORE CHANCE)
Answer: False. Input device does not receive data either.
Explanation:
Which hard drive type would be best to use by the army when writing operational data while traveling in a jeep in rough terrain?
Answer:
They should use an SSD.
Explanation:
The fact that the writing operation takes place in a jeep in rough terrain suggests that they should be using an SSD (Solid State Drive) which unlike HDD's, don't have a spinning disk and a head that writes data on it. So there are no moving parts in an SSD, and they have about 30 times more resistance to shock/vibration damage which is really helpful in this situation.
I hope this answer helps.
Importance of individual differences in difference in work potential with examples
Individual differences are how people differ from one another. Each individual in an organization has their own style of behavior. Individual differences are crucial for supervisors to comprehend because they influence employees' feelings, thoughts, and behavior.
What is work potential?The innate ability of every person to live and perform in alignment with their highest self is referred to as work potential.
Overall, studying individual differences helps us understand not only what makes humans similar, but also what makes them different.
We can best understand the full range of human behavior by taking into account the variations that can occur from one person to the next.
Thus, individual differences in difference in work potential is crucial.
For more details regarding work potential, visit:
https://brainly.com/question/24947234
#SPJ1
Cassette tape is an example of ____ memory
Cassette tape is an example of computer memory.
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Write a recursive method that takes four inputs: a 1-D array of Strings (i.e., exams), the length of this 1-D array (i.e., n), an index to access array elements (i.e., i) and a 2-D array containing double values (i.e., ret).
Answer:
import java.util.*;
public class Main
{
public static void main(String[] args)
{
String [] exams = {"1;2;3;4;" , "5;6;7;8;" , "9;10;11;12;" };
double[][] n = new double[exams.length][4];
examArray = convert(exams , exams.length , 0 , n);
for(int i = 0 ; i < exams.length ; i++)
{
for(int j = 0 ; j < 4 ; j++)
{
System.out.print(n[i][j] + "\t");
}
System.out.print("\n");
}
}
/* recursive function convert defined here */
public static double[][] convert(String[] exams , int number , int x , double [][] result)
{
if(x==number)
return result;
else
{
String total = exams[x];
String currentScore = "";
int p = 0;
for(int j = 0 ; j<totalScore.length() ; j++)
{
char ch = total.charAt(j);/
if(ch==';')
{
result[x][p] = Double.parseDouble(currentScore);
p++;
currentScore = "";
}
else
{
currentScore = currentScore + Character.toString(ch);
}
}
return convert(exams , number , x+1 , result);
}
}
}
Explanation:
The Java source code defines a recursive function or method called convert that converts the results of three students that sat for four examinations to double or float number and screens their individual results for the four exams on the screen.
A business that helps people find jobs for a fee
career coaches is a business that help people to find job for free
PLEASE ANSWER ASAP! THANKSSSSS
ark titanoboa taming
it is a passive tame throw the an egg down and it will eat it if it attacks you or gets attacked it will reset the taming process
Explanation:
59. When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration. What type of an alert is this
Answer:
False Positive
Explanation:
A false positive or false positive error may be defined as a result which indicated that the given conditions seems to exists when it actually does not. It is classified as a type I error. It tests a check for a single condition and then falsely provides a positive or affirmative decision.
In the context, a false positive type of error occurred when the external router of the system administrator was accessed from the computer of the administrator that was used to update the configuration of the router.
"Write an SQL query that displays the Ssn and Last name of all employees who is a supervisor of a Department Manager"
Answer:
SELECT Ssn,
Last_name
FROM employees
WHERE position = supervisor;
Explanation:
SELECT is an SQL query statement that is used to initiate the display of wanted variables.
The names of the variables often succeed the SELECT statement and they are separated by commas.
FROM is an SQL query statement that indicates the table fro which the selected variables be displayed.
WHERE is used to filter your search and return only rows that meet the criteria.
; signifies the end of a query and calls for an execution.
You should not be more than 5 minutes early to your interview because it makes you look desperate to get the job. A. True B. False
Answer: I believe this is false. When you arrive early for an interview, you give the impression that you are a responsible and punctual person, and that you take other people's time with respect.
Answer:
B
Explanation:
Using E-commerce , how you can make Secure payments
Answer:
requesting a receipts for every payment
Explanation:
after making a payment you have to request a receipt it might be printable or electronic
.A card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected to a network via cables is called
Answer: Network interface controller
Explanation:
A network interface controller is also referred to as the network adapter or LAN adapter. It is simply a component of the computer hardware that is used to connects a computer system to a particular network.
It is a card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected to a network via cables.
fill in the blanks y'all-
-------- is a pictorial representation of a step-by-step algorithm
I will give brainliest, just answer quick :)
k I don't need it anymore
Answer:
Flowchart
Explanation:
Flowchart is a pictorial representation of a step-by-step algorithm.
It comprises of the various steps involved in a process which are usually well arranged in an orderly and sequential manner.
It is also referred to how algorithms are diagrammatical put up for better analysis .
You wrote a program to allow the user to guess a number. Complete the code to generate a random integer from one to 10.
from random import *
# Generate and save a random number.
correct =
(1,10)
NEED HELP FAST
The code to generate a random number from 1 to 10 is as follows:
import random
print(random.randint(1,10))
The code is written in python.
Code explanation:The first line of code is used to import a module name "random". The random module is use to generate the random numbers.The second line of code, we use the object in random to generate integers from 1 to 10. The print statement is then used to print the random numbers from 1 to 10. Running the code we generate random numbers between 1 to 10 as required.learn more on python code here: https://brainly.com/question/26104476?referrer=searchResults
Answer:
randint
Explanation:
Got it correct on edge
is anyone a robIox creator?
me and some of my friends are going to work on a robIox game and we need someone to help us build and script it.
anyone wanna help?
Well, I am now getting into making Robl. games, so I would be able to help.
But the only downside is that my computer isn't working at the moment and may take a while to fix. But i'm sure when i am done with it, I could help.
How would you maximize the use of a class?
Answer:
can't understand your qs.......
The Ntds. dit file is a database that stores Active Directory data, including information about user objects, groups, and group membership. It includes the password hashes for all users in the domain.
Just take the points.
Answer:
I hate it
Explanation:
Mark it as the brainliest if u love god
Natasha's laptop has long-term storage that uses a magnetic arm to move over a platter to read and write data. It is cheaper than other storage options and has a high capacity of storage, but because of its moving parts, it is not as durable than other options and runs very loudly. What type of long-term storage does her computer have?
A.
read-only memory (ROM)
B.
hard disk drive (HDD)
C.
random access memory (RAM)
D.
solid-state drive (SSD)
SSD
Explanation:
But I prefer SSD rather than HDD , because there are soo many benifits of SSD like very fast read and write speed , small in size , it did not corrupt your data easily , did not get damage by any physical impact . SSD is like bigger version of smartphone’s sd card. Only one thing is that SSD is too most costly than HDD
3. Sum of Numbers Assume that a file containing a series of integers is named numbers . dat and exists on the computer's disk. Design a program that reads all of the numbers stored in the file and calculates their total.
Answer:
The program written in Python is as follows:
file_handler = open("numbers.dat","r")
nums = 0
for line in file_handler:
try:
nums+=int(line)
except ValueError:
continue
file_handler.close()
print("Sum: "+str(nums))
Explanation:
The file handler is used to enable the program reads content of the file numbers.dat
file_handler = open("numbers.dat","r")
This initializes the sum of numbers to 0
nums = 0
This iterates through the line of the file
for line in file_handler:
The try exception is used to prevent program crash if data other than integer is read
try:
This adds numbers on each line
nums+=int(line)
This exception is returned for data other than integers
except ValueError:
continue
This closes the file handler
file_handler.close()
This prints the calculated sum
print("Sum: "+str(nums))
Write a function that returns the info of the kth element of the linked list. If no such element exists terminate the program. (getKThElement)
Answer:
Explanation:
The following code is written in Java and creates a function that takes a LinkedList as a parameter then the function asks the user for which position element they would like to retrieve, loops through the LinkedList, and returns the info on that element position. If that position is not found then the program ends. Position variable is subtracted by 1 in the loop since elements start at 0 in data structures.
public static void searchForElement(LinkedList<String> myArr) {
Scanner input = new Scanner(System.in);
System.out.println("What position do you want to search for?");
int position = input.nextInt();
for (int x = 0; x < myArr.size(); x++) {
if (position > myArr.size()) {
break;
}
if (x == position - 1) {
System.out.println(myArr.get(x));
}
}
}
Help meee pleaseeee
Answer:
1. DO, RECEIVE
2. PERFORM
3. STORE, TAKE IN, CALCULATE
4. EXPRESS
5. COMPUTE, DISPLAY
Explanation:
1. A computer DO or RECEIVE data
2. Modern automatic digital computers PERFORM more than 100 mln operations in each second
3. A computer STORE information or data, TAKE IN a sequence of operations on information and CALCULATE answers.
4. The hardware inside the computer EXPRESS arithmetical operations or logical relations
5. When the computers COMPUTE results, they DISPLAY them.
1. DO, RECEIVE
2. PERFORM
3. STORE, TAKE IN, CALCULATE
4. EXPRESS
5. COMPUTE, DISPLAY