An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. What kind of exploit has been used in this scenario

Answers

Answer 1
DDoS hope this helps :3

Related Questions

8. Compare the advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report.​

Answers

Answer: the advantage of using a smartphone rather than a laptop computer is that you can talk to people across the world, call people, make texts, and get easy access to the internet. but the disadvantages are that a lot of people stay inside their house because of phones, not getting enough exercise.

Explanation:

The advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report. have been compared below.

The advantages of using a smartphone rather than a laptop computer are;

Portability; Smartphones are portable enough that they can fit into pockets and some purses and as such can be taken with you anywhere easily unlike a laptop computer that doesn't have such physical property.Cost; Smartphones are largely cheaper than the average laptop computer. Thus, cost is a good factor.

Disadvantages of using a smartphone rather than a laptop computer are;

Screen size; Smartphone screen size are always smaller than that of laptop computers .Software's; Smartphones can't run many of the type of powerful software's that can run on laptop computers.Data entry and user input; Due to the portability of smartphones, their keyboards are usually smaller than that of laptop desktops which makes data entry more difficult for those that have big fingers.

Read more about smartphones and laptops at; https://brainly.com/question/21283135

You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action to stop or prevent the attack, if possible. Which tool should you use

Answers

Answer:

Intrusion Prevention System (IPS)

Explanation:

Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer

Thus, the tool you should use is an intrusion prevention system (IPS).

Define Data communication​

Answers

Explanation:

Data transmission and data reception is the transfer and reception of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses. 

are the exchange of data between two devices For data communications to occur, the communicating devices must be part of a communication system made up of a combination of hardware

What are the advantages of Radio waves over micro waves?​

Answers

Answer:

radio frequencies can penetrate deeply into the material and thus heat thick products. They heat more slowly than microwaves and thus make it possible to treat more delicate products which require a slower heating.

(e) Give the output of the following:
String n="Computer Knowledge";
String m = "Computer Applications";
System.out.println(n.substring(0,8).concat(m.substring(9)));​

Answers

Answer:

Computer Applications

true

Answer:

Computer Applications

Explanation:

true

PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!

can someone help me please?

Answers

Answer:

see below picture

Explanation:

You can work your way through the formula from the inside out, mapping every operation to a gate.

who is the father of computer



Answers

Answer:

Charles Babbage is the father of computer

Explanation:

Charles Babbage is know as father of computer.

hope this help!

Computers work on the garbage-in, garbage-out concept. Comment

Answers

Stands for "Garbage In, Garbage Out." GIGO is a computer science acronym that implies bad input will result in bad output.

Because computers operate using strict logic, invalid input may produce unrecognizable output, or "garbage." For example, if a program asks for an integer and you enter a string, you may get an unexpected result. Similarly, if you try to open a binary file in a text editor, it may display unreadable content.

GIGO is a universal computer science concept, but it only applies to programs that process invalid data. Good programming practice dictates that functions should check for valid input before processing it. A well-written program will avoid producing garbage by not accepting it in the first place. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

NOTE: Because the related terms FIFO and LIFO are pronounced with a long "i," GIGO is typically pronounced "guy-go" (not gih-go). This also helps avoid confusion with the prefix "giga," which is pronounced with a soft "i."

Write a program to input the TotalCost and display the Assured gift as per the following criteria TotalCost(TC) Assured Gift Less than or up to 2000 Wall Clock 32001 to 5000 School Bag 5001 to 10,000 Electric Iron More than 10,000 Wrist Watch​

Answers

Answer:

The program in Python is as follows:

TotalCost = int(input("Total cost: "))

if TotalCost <= 2000:

   print("Wall Clock")

elif TotalCost >= 2001 and TotalCost <= 5000:

   print("School Bag")

elif TotalCost >= 5001 and TotalCost <= 10000:

   print("Electric Iron")

else:

   print("Wrist Watch")

Explanation:

This gets input for total cost

TotalCost = int(input("Total cost: "))

If the total cost is up to 2000, print wall clock as the assured gift

if TotalCost <= 2000:

   print("Wall Clock")

If the total cost is between 2001 and 5000 (inclusive), print school bag as the assured gift

elif TotalCost >= 2001 and TotalCost <= 5000:

   print("School Bag")

If the total cost is between 5001 and 10000 (inclusive), print electric iron as the assured gift

elif TotalCost >= 5001 and TotalCost <= 10000:

   print("Electric Iron")

If the total cost is more than 10000, print wrist watch as the assured gift

else:

   print("Wrist Watch")

You notice a growing number of devices, such as environmental control systems and wearable devices, are connecting to your network. These devices, known as smart devices, are sending and receiving data via wireless network connections.
Which of the following labels applies to this growing ecosystem of smart devices?
A. The smartnet
B. Internet of smart devices
C. *Internet of things*
D. Dynamic environment

Answers

Answer:

*Internet of things*

Explanation:

A network with multiple physical smart devices are known as things on the network

write fade in shorthand​

Answers

Answer:

"Fade In is a Class Act" Macworld says: "Fade In makes it easy to just write...It has all the features you'd find in the more expensive apps, such as Final Draft and Movie Magic Screenwriter, and there's even free and paid iPhone, iPad, and Android apps available

Explanation:

Short Questions: a) What is website? How can we browse internet using website?​

Answers

Answer:

A website is a set of related web page or pages located under a single domain name. These pages contain specific information which was all provided by one person or entity and traces back to a common Uniform Resource Locator or (URL).

Explanation:

There are millions of Websites around the world and contain information about everything.

what is a computer in daily life​

Answers

Answer:

The use of computers on a regular basis in our life is very important. Technically in daily life computer is used to convert raw facts and data into meaningful information and knowledge. Computer science is explored and challenged by humans daily. The computer is like an electronic magical device for our life.

Explanation:

Richard needs to copy information from another slide presentation that uses a different design template. To ensure that the information he is copying looks right, which option should he choose?

Answers

Answer:

Yes, you can copy the slides over into a presentation with master slide. Then, right-click each slide, and choose to apply an appropriate template from the master slide

(from vik7336: Hi, I'm not sure about my answer for your question. So I hope this might help)

pasagot po please need lang po

Answers

me I can not see it oooo re write it

When you evaluate the use of digital media, how has it affected the newspaper business? The rise of digital media has caused newspaper subscriptions to decline significantly because people are finding their news online. The rise of digital media has had no measurable effect on newspaper subscriptions. The rise of digital media has caused newspaper subscriptions to increase because it has inspired people to care more about news. The rise of digital media has caused newspaper subscriptions to fluctuate depending on the time of year.

Answers

Answer:

The rise of digital media has caused newspaper subscriptions to decline significantly because people are finding their news online.

It is A

Answer:

The rise of digital media has caused newspaper subscriptions to decline significantly because people are finding their news online.

Once the CPU has fetched the data requested, what are the next steps in the process?

A
execute, articulate

B
perform, execute

C
decode, analyze

D
decode, execute

MULTIPLE CHOICE

Answers

Answer:

D. decode execute

Explanation:

a program in matchine language is called​

Answers

Answer:

mcq

Explanation:

machine code is a computer program written in a machine code

Next, Sue decides to embed a chart from Microsoft Word. She copies and pastes data from a table that she has already created in a Word document. The table includes the results of her paper towel experiment. After reviewing her work, she realizes she needs to update one of the values.
How can she change that value so it is reflected in the chart in her presentation?
She can change the value in the original table in Word.
She can change the value directly on the chart in PowerPoint.
She can change the value using the Current Selection command group.
She can change the value in the mini- spreadsheet for the chart in PowerPoint.

Answers

Answer:

She can change the value in the mini- spreadsheet for the chart in PowerPoint.

Answer:

Answer is D

Explanation:

Assume the existence of a Building class. Define a derived class, ApartmentBuilding that contains four (4) data members: an integer named numFloors, an integer named unitsPerFloor, a boolean named hasElevator, and a boolean named hasCentralAir. There is a constructor containing parameters for the initialization of the above variables (in the same order as they appear above). There are also two function: the first, getTotalUnits, accepts no parameters and returns the total number of units in the building; the second, isLuxuryBuilding accepts no parameters and returns true if the building has central air, an elevator and 2 or less units per floor.

Answers

Answer:

Explanation:

The following code is written in Java. The class ApartmentBuilding extends the assumed class of Building but does not call any of its methods since we do not have access to it. The ApartmentBuilding class contains all of the variables listed, as well as constructor and methods, including getter and setter methods for each variable. A test case for the class is provided in the image below with it's output.

class ApartmentBuilding extends Building {

   int numFloors, unitsPerFloor;

   boolean hasElevator, hasCentralAir;

   public ApartmentBuilding(int numFloors, int unitsPerFloor, boolean hasElevator, boolean hasCentralAir) {

       this.numFloors = numFloors;

       this.unitsPerFloor = unitsPerFloor;

       this.hasElevator = hasElevator;

       this.hasCentralAir = hasCentralAir;

   }

   public int getTotalUnits() {

       int total = this.numFloors * this.unitsPerFloor;

       return total;

   }

   public boolean isLuxuryBuilding() {

       if ((this.hasCentralAir == true) && (this.hasElevator == true) && (this.unitsPerFloor <= 2)) {

           return true;

       } else {

           return false;

       }

   }

   public int getNumFloors() {

       return numFloors;

   }

   public void setNumFloors(int numFloors) {

       this.numFloors = numFloors;

   }

   public int getUnitsPerFloor() {

       return unitsPerFloor;

   }

   public void setUnitsPerFloor(int unitsPerFloor) {

       this.unitsPerFloor = unitsPerFloor;

   }

   public boolean isHasElevator() {

       return hasElevator;

   }

   public void setHasElevator(boolean hasElevator) {

       this.hasElevator = hasElevator;

   }

   public boolean isHasCentralAir() {

       return hasCentralAir;

   }

   public void setHasCentralAir(boolean hasCentralAir) {

       this.hasCentralAir = hasCentralAir;

   }

}

Consider the following scenario. As you troubleshoot the problem, what motherboard device would be the first to check? A user reports that his computer fails the POST upon startup. ROM CMOS RAM Power supply Processor

Answers

Answer:

The correct answer Power Supply

Explanation:

Online retailers can and should encourage every customer to sign up for regular emails from the retailer. To avoid spam filters, retailers should Group of answer choices automatically send regular emails to all customers send emails to all customers except those who request to be taken off the email list provide a check box that is checked by default during the checkout process for customers to sign up for emails provide a check box that is unchecked by default during the checkout process for customers to sign up for emails ANS:DPTS:1

Answers

Answer:

Provide a check box that is checked by default during the checkout process for customers to sign up for emails

Explanation:

I've seen this used the most so I would go with this answer.

The way online retailers get you is by showing you a prechecked email subscription with an unchecked TOS agreement. Your attention is then focused on the TOS agreement and not the agreement for promotions sent to you via email.

A is a distinctive characteristic of a virus or virus family.

Answers

Answer:

Assuming your talking about a computer virus(because your under the Computers and Technology section)

Also assuming you meant "What is a distinctive characteristic of a virus or virus family."

A computer virus is a software that was created with the intent of damaging a computer. Computer viruses can replicate them selves by modifying other software on the computer. Viruses such as file infectors can override the machine code of another application and inject its own malicious machine code to perform malicious acts. This is especially dangerous for the OS as the virus can override essential files.

Explanation:

BIOS has two jobs. One is to boot up, or start, the computer. What is the other? Maintain the computer’s software firewall. Ensure the fastest possible Internet speed. Provide the basic interface for the hardware. Perform regularly scheduled memory backups.

Answers

Answer:

Provide the basic interface for the hardware.

Explanation:

Audience centered public speakers are inherently sensitive to the

Answers

diversity of their audiences

Answer:

the diversity of their audiences

Explanation:

Which option is used to insert a table in PowerPoint from another Office application?

In the Insert Object dialog box, choose Create from file.
In the Design tab, choose the Table Styles option.
In the Insert Table dialog box, choose Insert Table.
In the Layout tab, choose the Merge option.

Answers

Answer: In the Insert Object dialog box, choose Create from file.

Explanation:

To insert a table into PowerPoint from another Office application, go to the Insert Tab. In the Text ribbon on the far right, you will see "Object" next to Equation.

After clicking on that, select the "Create from File" option. It will allow you to browse a file you want to import from. PowerPoint will import the data from this file.

Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I 1 V 5 X 10 L 50 C 100 D 500 M 1,000 Numbers are formed according to the following rules: a. Only numbers 1 to 3,999 (inclusive) are represented. b. As in the decimal system, the thousands, hundreds, tens, and ones are express separately. c. The numbers 1 to 9 are expressed as I 1 II 2 III 3 IV 4 V 5 VI 6 VII 7 VIII 8 IX 9 As

Answers

Answer:

Explanation:

#include <stdio.h>  

int main(void)  

{    

   int num, rem;

   printf("Enter a number: ");

   scanf("%d", &num);

   printf("Roman numerals: ");        

   while(num != 0)

   {

       if (num >= 1000)       // 1000 - m

       {

          printf("m");

          num -= 1000;

       }

       else if (num >= 900)   // 900 -  cm

       {

          printf("cm");

          num -= 900;

       }        

       else if (num >= 500)   // 500 - d

       {            

          printf("d");

          num -= 500;

       }

       else if (num >= 400)   // 400 -  cd

       {

          printf("cd");

          num -= 400;

       }

       else if (num >= 100)   // 100 - c

       {

          printf("c");

          num -= 100;                        

       }

       else if (num >= 90)    // 90 - xc

       {

          printf("xc");

          num -= 90;                                              

       }

       else if (num >= 50)    // 50 - l

       {

          printf("l");

          num -= 50;                                                                      

       }

       else if (num >= 40)    // 40 - xl

       {

          printf("xl");            

          num -= 40;

       }

       else if (num >= 10)    // 10 - x

       {

          printf("x");

          num -= 10;            

       }

       else if (num >= 9)     // 9 - ix

       {

          printf("ix");

          num -= 9;                          

       }

       else if (num >= 5)     // 5 - v

       {

          printf("v");

          num -= 5;                                      

       }

       else if (num >= 4)     // 4 - iv

       {

          printf("iv");

          num -= 4;                                                            

       }

       else if (num >= 1)     // 1 - i

       {

          printf("i");

          num -= 1;                                                                                    

       }

   }

   return 0;

}

What is a compiler?
a tool used to integrate multiple software programs
a tool used to extract a single software program from an integrated collection of programs
a computer software application that translates binary computer machine language into a computer programming language
a computer software application that translates a computer programming language into a binary computer machine language

Answers

Answer:

A computer software application that translates a computer programming language into a binary computer machine language

Explanation:

ita in the answer

Answer:

c

Explanation:

im god

how to convert binary number into decimal number​

Answers

Answer:

Multiplying by 2

Explanation:

The binary num number to decimal conversion is made by making the sum of each binary digits multiplying by 2 with raised to the power of the positional notation of digits .

Hope it is helpful to you

Answer:

HOW TO CONVERT BINARY INTO DECIMAL SYSTEM.

The decimal number is equal to the sum of binary digits (dn) times their power of 2 (2n):

decimal = d0×20 + d1×21 + d2×22 + ...

Example #1.SEE,

Find the decimal value of 1110012:

binary number: 1 1 1 0 0 1

power of 2: 25 24 23 22 21 20

1110012 = 1⋅25+1⋅24+1⋅23+0⋅22+0⋅21+1⋅20 = 5710

Explanation:

YOU WILL LEARN MORE IN HIGHER CLASSES.

Which of the following statements about RAID is correct? Group of answer choices All RAID configurations provide fault tolerance for up to one disk failure A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration RAID 5 allows up to two disk failures During a RAID 5 disk failure, read performance is not impacted A RAID 1 configuration of four 1TB disks has a storage capacity of 2TB

Answers

Answer:

A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration

Explanation:

Redundant Array of Independent Disks(RAID) are multiple physical drives arranged in logical units to provide data redundancy and increased performance. They are

RAID 1 configuration duplicates data storage, albeit of lower performance than RAID 0. Also called disk mirroring because it mirrors data on two or more disks, it provides at least two drives that are used interchangeably or together.

A RAID 1 is the configuration of the 4 disks that has higher storage capacity than a RAID 0 configuration. This option A is correct.

What is the RAID ?

The RAID is a redundant array of the inexpensive disks and refers to the storage visualization technology that combines multiple physical disk drives. Its contract with earlies highly reliable mainframe disk drives.

The RAID one needs mini of two physical drives as the data is given simultaneously in two places. These drives are mirror images as ne fails the other can take over.

Find out more information about the RAID.

brainly.com/question/26980060.

Other Questions
They (know) the result in a couple of day( future indefinite form) A circular parallel-plate capacitor whose plates have a radius of 25 cm is being charged with a current of 1.3 A. What is the magnetic field 11 cm from the center of the plates redacta un manifiesto personal ayudda tengo que hacer eso Use the distributive property to find the product of the rational number. 5/2 (- 8/5 + 7/5) mercury is commonly used in thermometer give reasons Read the information below then answer the questions which follow:To grow, plants require water. They cannot get this water unless it is available in the soil. Plantsobtain water from the soil through their roots. It then passes up the stem and to the leaves andflowers. The plant does not take all the water available in the soil. Much of the remaining waterevaporates into the surrounding air.In an experiment, a stem which contained several flowers were placed in a beaker of watercontaining red ink.QUESTION 1(1 mark)What is the purpose of the experiment? Help please .zzzz 9. Which of the following is NOT a recommendation to help you succeed in this course?Consistently and actively work in the course on a daily basis.Wait until the end of the semester to complete all work.Complete all assignments in a timely manner.Contact your instructor if you have questions. what do yall do when yall brainly says locked and wont show anymore answers !??? President George Washington took the oath of office on April 30,1789.Abraham Lincoln was sworn in as president on March 4, 1861. These events are an example of I need help figuring out this equation what is the reactant(s) in the chemical equation below3CO(g) + Fe2O3(s) 2Fe(s) + 3CO2(g) price elasticity of demand Measure to modernize agriculture in nepal A woman gave birth 48 hours ago to a healthy infant girl. She has decided to do not breastfeeding. During your assessment you notice that both of her breasts are swollen, warm, and tender on palpation. The woman should be advised that this condition can best be treated by: You need 675 mL of a 90% alcohol solution. On hand, you have a 25% alcohol mixture. How much of the 25% alcohol mixture and pure alcohol will you need to obtain the desired solution? Which of these best describes how to reduce wordiness in this sentence?? compare and contrast the conflict and functionalist apporach to deviance a car gets 27 miles per gallon in the city and 35 miles per gallon on the highway. what range of miles can the car travel on 3 gallons of gas Dilbert invests a total of $26,000 in two accounts paying 14% and 2% annual interest, respectively. How much was invested in each account if, after one year, the total interest was $2,560.00