A DoS attack is known as attempts to slow down or stop a computer system or network by sending repetitive requests for information.
What is a DoS attack?A DoS attack is known to be a form of system attack that is often launched from a lot of compromised devices. It is said to be distributed in the world as a kind of botnet.
This is known to be a form of denial of service attacks, where there is the use of a single Internet-connected device that is the use of one network connection to drown a target with a deadly form of traffic.
Learn more about DoS attack from
https://brainly.com/question/13068595
whats happens when you add the numbers 1 and 1 together (1+1)
11
32
2
9
Answer:
2
Explanation:
The mathematical answer would be 2. To get 11, one would simply put the 1's next to each other but there is an addition symbol. 32 is an irrational number to think of for an answer because there are no other numbers to add or multiply with the 1's to achieve 32. 9 is also irrational for the same reason.
Why have Social Security numbers traditionally been used as primary keys for database tables that store personal data on individual people
What are three ways to protect yourself from identity theft when using your smartphone or computer?.
Answer:
1. Always download the latest updates .
2. Don’t click on rogue links .
3.Secure your devices (long, complex password on your computer and phone, using Anti-virus/Anti-Malware program) .
A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue
An increase in the ping response periods (host to host time) might be depicting a possible latency issue.
What is a latency issue?In computers, a latency issue is a problem capable of delaying digital communications in the network.
Latency issues are a subject of concern and there are several alternatives to improve this aspect of digital networks.
Latency issues are associated with the time in which data can be captured and processed in the network.
Learn more about latency issues here:
https://brainly.com/question/27013190
GlobalMan Tech purchased raw material from NewBizTr Co. When the sales team at NewBizTr Co checked the system, there was no payment
detall in the system, though the order-delivery details were present. Also, it seemed that someone had tampered with the details of the previous
order. Which Important data-management features were compromised?
The Important data-management features were compromised is maintaining Data Security.
What does data management made up of?Data management is known to be a kind of administrative method that is often used in acquiring, validating, storing, etc., of data for system users.
Note that Maintaining Data Security is one key feature of data-management and it is the one that has been tempered with.
Learn more about data-management features from
https://brainly.com/question/24027204
#SPJ1
Answer:
1 security 2 accuracy
Explanation:
A _________ , also known as a trapdoor, is a secret entry point into a program that allows someone who is aware of the door to gain access without going through the usual security access procedures.
The trapdoor is a method that breaches the security of the system and bypasses the authentication. The trapdoor is also called the backdoor.
What is a backdoor?A backdoor or the trapdoor is the method of a security breach that bypasses the authentication check of the system to access the cryptographic systems through unauthorized means.
It is a secret entry point known by someone to gain entry by bypassing the security check for harming the system and is also used to test and debug programs.
Therefore, the correct blank is the backdoor.
Learn more about backdoor here:
https://brainly.com/question/14315309
#SPJ1
Michael is doing research to find information about a pet fish. He finds a website that says fish do not make good pets. Michael should not use this information because it is
a belief
a fact
an opinion
informative
Answer:
It is a opinion not a fact so it should not be used
Explanation:
What are the possible values you can store in the C# "bool" data type?
a
A or B
b
true or false
c
more or less
d
1 or 2
Answer:
d are the values that can be stored in the c#"bool"data type
The Android operating system (OS) is targeted by attackers much more often than Apple iOS and Windows Phone. What reason does NOT contribute to this situation
The week security system is the reason which makes Android operating system (OS) is targeted by attackers much more often than Apple iOS and Windows Phone.
Why Android operating system targeted more by attackers?Android is the mobile operating system and mostly targeted by the hackers and attackers. The reasons by which it is often targeted by attackers are listed below.
Android is most famous operating system and most of the people has mobile phone bases on this system.The security level of android is week compare to Apple iOS and Windows Phone makes is easy to crack.The risk of malware and virus is more in android.The week security system is the reason which makes Android operating system (OS) is targeted by attackers much more often than Apple iOS and Windows Phone.
Learn more about the Android OS here;
https://brainly.com/question/4121093
#SPJ1
________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. Data acquisition Data entry Data mining Data encryption
Answer:
_______ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A Data acquisition B Data mining C Data encryption D Data scrubbing E Data entry
✓ A Data Acquisition
Explanation:
Which wireless technology will John use to provide wide-range cellular service that focuses on indoor coverage, low cost, long battery life, high connection density, and has a low-power wide-area network
Wireless technology is the method used to communicate and transfer data without wires and cables. John will use Narrowband IoT to provide cellular services.
What is Narrowband IoT?Narrowband Internet of things is a Low power WAN technology developed for cellular services, and devices are used to balance power consumption and spectrum efficiency in providing coverage.
Narrowband IoT gives increased coverage, has long battery life and is not expensive as other networking systems, and has low power wide region networking.
Therefore, John should use Narrowband IoT.
Learn more about wireless technology here:
https://brainly.com/question/14618006
#SPJ1
What is most likely to happen to the purchasing power of money over time?
• A. It will increase.
•
B. It will decrease.
C. It will stay the same.
•
D. It will go up and down.
Answer:
The answer is B. It will decrease
Explanation:
I took the test
The purchasing power of money over time will decrease. The correct option is B.
What is purchasing power?The worth of a currency is determined by how many goods or services one unit of that currency can be used to purchase. Inflation may cause it to deteriorate over time. This is due to the fact that you may acquire fewer items or services as a result of increased pricing.
Unevenly growing prices in an inflationary environment unavoidably lower some customers' purchasing power, and this depreciation of real income is the single biggest cost of inflation.
For both those who receive and pay fixed interest rates, inflation might over time affect their ability to make purchases.
Therefore, the correct option is B. It will decrease with inflation.
To learn more about purchasing power, visit here:
https://brainly.com/question/14892961
#SPJ2
A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem
Answer:
A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem? The PC default gateway address is missing or incorrect. The PC has an incorrect IP address. The network cable connected to the user PC is faulty.
Explanation:
A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem? The PC default gateway address is missing or incorrect. The PC has an incorrect IP address. The network cable connected to the user PC is faulty.
A possible cause of the problem is that the default gateway address of this personal computer (PC) is missing or incorrect.
What is a default gateway address?A default gateway address can be defined as an internet protocol address that is designed and developed to allow a particular device to communicate with other networks and equipment, including the Internet.
In this scenario, a possible cause of the problem is that the default gateway address of this personal computer (PC) is missing or incorrect and as such must be provided or configured.
Read more on printers here: https://brainly.com/question/17100575
#SPJ2
Which of the following is an example of machine learning?
Answer: auto correct
Explanation: The iPhone can determine what you are going to type because of your past history.
An example of machine learning is autocorrect. The correct option is c.
What is machine learning?Machine learning is a branch of artificial intelligence that is widely described as a machine's ability to mimic intelligent human behavior.
Autocorrect is a word processing technology that detects misspelled words and utilizes algorithms to identify the words most likely to have been intended before editing the text.
In the context of machine learning, autocorrect relies solely on Natural Language Processing (NLP). It is programmed to fix spellings and errors when inputting text, as the name implies. Auto-Correction spellchecks your keyboard dictionary as you type, automatically fixing misspelled words. Simply enter text into a text area to use it.
Therefore, the correct option is C, autocorrect.
To learn more about machine learning, refer to the link:
https://brainly.com/question/16042499
#SPJ2
A technician is installing RG6 cable and asks you to retrieve a connector from the parts drawer. What type of connector do you need
The type of connector, which is needed when a technician is installing RG6 cable and asks to retrieve a connector from the parts drawer, is F-connector.
What is F-connector?The F-connector is a type of RF connector which is used to connect the Video equipments to the antennas and setup box.
A technician is installing RG6 cable.
The RG6 cable is a coax cable.This cable is used in satellite signal transmission, generally for TV and setup box.Now the technician is ask to retrieve a connector from the parts drawer. Here, we use F type connector for this RG6 cable.
Thus, the type of connector, which is needed when a technician is installing RG6 cable and asks to retrieve a connector from the parts drawer, is F-connector.
Learn more about the connector cable here
https://brainly.com/question/9082842
#SPJ1
in china speaking your mind on the internet can cause what problems
It is found that in china speaking your mind on the internet might get you arrested.
How does internet affect China?In China, mobile internet access is one that restrict the freedom of speech.
Note that one cannot speak freely or post things on the internet there and as such, It is found that in china speaking your mind on the internet might get you arrested.
See options below
A. is allowed by the government. B. might get you arrested. C. is protected as free speech. D. is difficult to do in Chinese script.
Learn more about china from
https://brainly.com/question/24717901
#SPJ1
Answer:
it can get you arrested
Explanation:
got it correct for pennfoster! God bless! Hope this helps!
________ generally processes the largest quantities of data. Group of answer choices Operational databases Transaction processing Big data Data marts
transaction processing
generally processes the largest quantities of data. Big data Data marts Operational databases Transaction processing QUESTION 2 According to your text, NoSQL stands for: Numeric Only SQL Not Only SQL Numbered SQL No SQL QUESTION 3 Big data includes: Targe volumes of entity relationship diagrams (ERD) with many different data types that are processed at very high speeds. large volumes of data with many different data types that are processed at very high speeds.
What is the difference between basic auth and oauth.
Answer:
Basic auth is an authentication where username and password are sent with an HTTP request unencrypted (just base64 encoded).
OAuth is a scheme whereby you perform a login at an IAM server, which gets you a token, and then you provide the token with requests to another server.
If html is used to specify the content of the webpage, then what do you use css for?.
Answer:
css for styling.. means for making websites looks beautiful and attractive
Explanation:
html is like skeleton which defines websites structure whereas css is like cover to the skeleon.. css is responsible for fonts, colors, position of elements, responsiveness of websites.. it makes websites looks beautiful and prettier by adding background colors, hover effects, animation, etc
What is RAM?
Contained on a chip on the motherboard that does the computing to execute commands
Circuit boards that attach to the motherboard so you can connect components outside the case, such as a mouse, keyboard, speakers, or microphone
Random access memory, which are chips where information is stored temporarily while processing is taking place
Answer:
Random-access memory.Explanation:
Random-access memory is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code._____ means collecting vast amounts of data from a host of websites.
A. Relating
B. Visualizing
C. Querying
D. Web scraping
Answer:
D
Explanation:
D. Web Scraping is the answer
You are a game designer and are going to give a presentation to a group of high school students to try to get them interested in a career in the video game industry. You decide you will use a PowerPoint presentation to guide you through your discussion. Your PowerPoint presentation must include:
an explanation of what a video game is;
some history of video games and the video game industry;
why a career in the video game industry is a good choice; and
some examples of what students could do to begin to prepare themselves for an application to college and a career in gaming
Answer:
Pick a concept. Generate a few game concepts to see what kind of game you want to make. ...
Gather information. Game creation involves extensive research. ...
Start building. ...
Refine your concept. ...
Test your game. ...
Market the finished product.
Explanation:
A video game immerses players in a virtual environment and is an interactive form of electronic entertainment. It involves story-telling, user experience, aesthetics, sound design, and gaming mechanics.
The earliest arcade machines and home consoles like the Atari may be found in the history of video games. As technology developed over time, 3D graphics, virtual reality, and augmented reality experiences were introduced.
For those who are passionate, a career in the video game industry offers fascinating options. The sector is renowned for its quick expansion, with new platforms and technologies appearing on a regular basis.
Technical expertise and the creation of a solid portfolio are prerequisites for pursuing a career in the video game industry.
For the creation of games, learning programming languages like C++, Java, or Python is useful. Additionally, learning 3D modelling, animation, and game design fundamentals can be helpful.
For people who love games and creativity, a career in the video game industry provides intriguing opportunities.
Thus, you can contribute to the creation of engaging and innovative games that engage gamers all over the world if you have the necessary abilities, portfolio, and commitment.
For more details regarding gamers, visit:
https://brainly.com/question/25829996
#SPJ5
When you use a number such as 45 in a C# program, the number is a
a. figurative constant
c. literal variable
b. literal constant
d. figurative variable
Answer:
b it has to be if u look in and use a cauclator
Letters, memos, and computer printouts of numerical information are examples of formal reports.Group startsTrue or False
Letters, memos, and computer printouts of numerical information are examples of formal reports is a false statement.
What are formal reports?Formal reports are known to be a type of report that has elements such as a title page, a transmittal, a table of contents, etc. An example are:
Inspection Report.Safety and Health Report.Conclusively, Letters, memos, and computer printouts of numerical information are examples of formal reports is a false statement because they are all examples of informal reports.
Learn more about formal reports from
https://brainly.com/question/11599232
Select the correct answer.
A company has recently learned of a person trying to obtain personal information of employees illegally. According to which act will be the person punished?
A.
I-SPY
B.
CFAA
C.
Digital Millennium Act
D.
SOPA
The answer is D.
Answer:
A: I-SPY
Explanation:
The I-SPY Act criminalises the unauthorised use of phishing, spyware and other techniques of utilising the Internet to gain sensitive personal information without the consent and knowledge of any person.
A ______ system spreads data across several disks and stores parity information that can be used to reconstruct data if a disk drive fails. Select the two correct answers, then click Done.
A disc stripping system spreads data across several disks and stores parity information that can be used to reconstruct data if a disk drive fails.
What is a stripping system?Disk striping has been around for a long time. To improve disk performance, data can be "striped" across multiple disks.
Instead of using a single disk read/write head to write data, multiple heads from multiple disk drives can be used to improve performance.
Thus, the correct option is a disc stripping system.
Learn more about stripping system
https://brainly.com/question/14924341
#SPJ1
You've been hired to create an application. This application requires that you ask for and record the user's first name, last name, and age in years. What would you do to ensure that the data that is entered is valid
Answer:
Notification must take place at least four times during the process—upon receipt of the application, when the application is evaluated against the requirements for the job
Explanation:
Notification must take place at least four times during the process—upon receipt of the application, when the application is evaluated against the requirements for the job
14 AP Computer Science Principles
3. Consider the following code segment.
first 100
second 200
temp first
second + temp
first second
What are the values of first and second as a result of executing the code segment?
(A) first = 100, second
= 100
(B) first = 100, second = 200
(C) first = 200, second
=
100
(D) first = 200, second =
200
The values of first and second as a result of executing the code segment are (c) first = 200 and second = 100
How to determine the value of the variables?From the code segments, we have the following assignment operations
first = 100 and second = 200
The variable first is assigned to variable temp.
So, we have:
temp = first = 100
The variable temp is assigned to variable second
So, we have:
second = temp = 100
Lastly, the variable second is assigned to variable first
first = 200
Hence, the values of first and second as a result of executing the code segment are (c) first = 200 and second = 100
Read more about code segments at:
https://brainly.com/question/14284157
#SPJ1
Size of a request header field exceeds server limit.
A ____________________ is based on the use of one or more resource pools, in which identical IT resources are grouped and maintained by a system that automatically ensures that they remain synchronized.
A resource pooling architecture is based on the use of one or more resource pools, in which identical IT resources are grouped and maintained by a system that automatically ensures that they remain synchronized.