Viruses and Malware Complete the case project on page 82 of the textbook by researching two types of viruses, two types of malware, and two types of denial of service attacks using the internet or any other type of resource available to you. Next, write at least a two page paper in current APA format that lists each of the researched items, how they are used to attack a system or network, and what types of defenses can be put in place to protect against those attacks. Find an article which describes the compromise of a company organization through a virus or malware. Write a one page paper in APA format summarizing the security incident and how it was resolved or what actions could have been taken to prevent it.

Answers

Answer 1

Hi, I provided you a general guide on how to go about your writing your research paper.

Explanation:

Note, the current APA (American Psychological Association) format is the APA 7th Edition. This format details how a researcher should state the findings, sources, conclusion, etc.

Hence, you can begin writing the assigned paper only after gathering the needed data.


Related Questions

Which of the following best explains how an analog audio signal is typically represented by a computer?
a. An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.
b. An analog audio signal is measured as a sequence of operations that describe how the sound can be reproduced. The operations are represented at the lowest level as programming instructions.
c. An analog audio signal is measured as input parameters to a program or procedure. The inputs are represented at the lowest level as a collection of variables.
d. An analog audio signal is measured as text that describes the attributes of the sound. The text is represented at the lowest level as a string.

Answers

Answer:

A. An analog audio signal is measured at regular intervals. Each measurement is stored as a sample, which is represented at the lowest level as a sequence of bits.

Explanation:

I took the test

is used for finding out about objects, properties and methods​

Answers

Answer:

science

Explanation:

Which line of code will use the overloaded multiplication operation?

class num:
def __init__(self,a):
self.number = a

def __add__(self,b):
return self.number + 2 * b.number

def __mul__(self, b):
return self.number + b.number

def __pow__(self, b):
return self.number + b.number

# main program
numA = num(5)
numB = num(10)

Which line of code will use the overloaded multiplication operation?

class num:
def __init__(self,a):
self.number = a

def __add__(self,b):
return self.number + 2 * b.number

def __mul__(self, b):
return self.number + b.number

def __pow__(self, b):
return self.number + b.number

# main program
numA = num(5)
numB = num(10)

a) product = numA * numB
b) product = numA.multiply(numB)
c) product = numA.mul(numB

Answers

For multiplication one: product = numA * numB

For the addition: result = numA + numB

got 100 on this ez

(searched all over internet and no one had the answer lul hope this helps!)

Answer: First option: product = numA * numB

second option-numA + numB

Explanation:

A line beginning with a # will be transmitted to the programmer’s social media feed.

A.
True

B.
False

Answers

Answer:

True?

Explanation:

Answer:

The answer is false.

Explanation:

A “#” doesn’t do that in Python.

3.4 code practice question 2 edhesive

Answers

???????????????????
Is there more to this question??

who would benefit from using self-driving cars

Answers

Answer:

self independent

no need to depend on others

Answer:

Door dash employee's/Uber eat employees

would benefit from this

You have been given an encrypted copy of the Final exam study guide here, but how do you decrypt and read it???

Along with the encrypted copy, some mysterious person has also given you the following documents:

helloworld.txt -- Maybe this file decrypts to say "Hello world!". Hmmm.

hints.txt -- Seems important.

In a file called pa11.py write a method called decode(inputfile,outputfile). Decode should take two parameters - both of which are strings. The first should be the name of an encoded file (either helloworld.txt or superdupertopsecretstudyguide.txt or yet another file that I might use to test your code). The second should be the name of a file that you will use as an output file. For example:

decode("superDuperTopSecretStudyGuide.txt" , "translatedguide.txt")

Your method should read in the contents of the inputfile and, using the scheme described in the hints.txt file above, decode the hidden message, writing to the outputfile as it goes (or all at once when it is done depending on what you decide to use).

Hint: The penny math lecture is here.

Another hint: Don't forget about while loops...

Answers

Answer:

                                               

Explanation:

               

There used to be a popular type of pulp book for younger readers. They were called "Choose Your Own Adventure" novels. The idea was pretty simple. You'd start reading and then a few pages into the book, there would be a plot development that required a choice. The book might describe that you've entered a spooky house and the door has locked behind you. It would then ask you if you want to try to exit by going through the kitchen or exploring upstairs. If you chose to go into the kitchen, you'd turn to page 200, if you chose to go upstairs, you'd turn to page 43. This would repeat maybe five or six times though the book. You could re-read it a few times and try different outcomes.
In this lab you are going to create a choose your own adventure application using navigation controllers. The introduction screen to your application will contain a few lines of text to set up a story and then leave the user with a choice. Below the text, you will present two buttons that correspond to the different choices.
For example, you might see the following text on the main screen:
You are walking down the street when a tiger runs up and takes your lunch and then runs away...
Do you want to chase the tiger or run away?
Chase
Run Away
The user must then tap one of the buttons. This will move the user to a new screen with a few more lines of the story and another choice and two more buttons. You will create three (3) turning points in your story. This means that your story will have eight (8) different possible outcomes and a total of 15 screens.
Requirements
The story must ask three (3) questions, no matter how the user answers the previous question. All the questions must be different and result in a different story text.
The story must have eight (8) possible different final outcomes.
The story must include a minimum of 15 screens in total.
Create content that is appropriate and not-offensive. We will share these and play them together.
For extra credit you can add an extra screen and use inputs to capture data from the user such as a name, favorite food, or lucky number and use this data in the story.

Answers

Answer:

click on the link

Explanation:

link is somewhere hidden

what connect webpages?​

Answers

Anchor tags or hyperlinks are used to connect webpages.

Answer:

"Hypertext links are those words that take you from one web page to another when you click them with your mouse. Although the same HTML tag you study in this hour is also used to make graphical images into clickable links, graphical links aren't explicitly discussed here" I got this from https://www.informit.com/articles/article.aspx?p=440289 sorry I couldnt take the time myself here to help :(

Explanation:

17. What are the basic modes of operation of 8255?Write the features of mode 0 in 8255?

Answers

Answer:

There are two basic operational modes of 8255:

Bit Set/Reset mode (BSR mode).

Input/Output mode (I/O mode).

Features of 8255 Microprocessor:

Mode 0 : Simple Input/Output.

Mode 1 : Input/Output with handshake.

Mode 2 : Bi-directional I/O data transfer.

It has three 8-bit ports : Port A, Port B, and Port C, which are arranged in two groups of 12 pins.

The 8255 can operate in 3 I/O modes : (i) Mode 0, (ii) Mode 1, & (iii) Mode 2.

You want a cable that could be used as a bus segment for your office network. The cable should also be able to support up to 100 devices. Which cable should you use?

A.
RG-6
B.
RG-8
C.
RG-58U
D.
RG-59

Answers

Answer: C

Explanation:

Which work habits should you follow to increase work efficiency and avoid health issues?

Answers

Answer:

Just get good sleep, eat breakfast, and exercise.

Answer:

take periodic breaks and alternate between tasks

Page Setup options are important for printing a PowerPoint presentation a certain way. The button for the Page Setup dialog box is found in the
File tab.
Home tab.
Design tab.
Slide Show tab.

Answers

Answer: Design tab

Explanation:

The page setup simply refers to the parameters which are defined by a particular user which is vital in knowing how a printed page will appear. It allows user to customize the page layout. The parameters include size, page orientation, quality of print,margin etc.

It should be noted that page setup options are vital for printing a PowerPoint presentation in a certain way and the button for the Page Setup dialog box can be found in the design tab.

A decimal number is called a float.
True
False

Answers

Answer: True

Explanation:

The term floating point is derived from the fact that there is no fixed number of digits before and after the decimal point; that is, the decimal point can float. There are also representations in which the number of digits before and after the decimal point is set, called fixed-pointrepresentations.

Answer:

It's true

Explanation:

Factory Design Pattern Assignment This assignment will give you practice in using the Factory/Abstract Factory Design Pattern. You are going to create a Terraforming program. What does terraform mean

Answers

Answer:

Terraform is an open-source infrastructure as code software tool that enables you to safely and predictably create, change, and improve infrastructure.

write the C program
The function turn_to_letter decides on the letter grade of the student according to the table below from the visa and final grades sent into it and returns it, write it together with a main function which the turn_to_letter function is called and prints the letter equivalent on the screen. -Success score = 40% of midterm + 60% of final,
-F for the success score below 50, D for between 50 and 59, C for between 60 and 69, B for between 70 and 79, A for 80 and above.

Answers

Answer:

The program in C is as follows:

#include <stdio.h>

char turn_to_letter(double score){

   char lettergrade = 'A';

   if(score>=80){        lettergrade = 'A';    }

   else if(score>=70){        lettergrade = 'B';    }

   else if(score>=60){        lettergrade = 'C';    }

   else if(score>=50){        lettergrade = 'D';    }

   else{lettergrade = 'F';}

   return lettergrade;

}

int main(){

   int midterm, final;

   double score;

   printf("Midterm: ");    scanf("%d", &midterm);

   printf("Final: ");    scanf("%d", &final);  

   score = 0.4 * midterm + 0.6 * final;

   printf("Score: %lf\n", score);

   printf("Letter Grade: %c",turn_to_letter(score));

   return 0;

}

Explanation:

The function begins here

char turn_to_letter(double score){

This initializes lettergrade to A

   char lettergrade = 'A';

For scores above or equal to 80, grade is A

   if(score>=80){        lettergrade = 'A';    }

For scores above or equal to 70, grade is B

   else if(score>=70){        lettergrade = 'B';    }

For scores above or equal to 60, grade is C

   else if(score>=60){        lettergrade = 'C';    }

For scores above or equal to 50, grade is D

   else if(score>=50){        lettergrade = 'D';    }

Grade is F for other scores

   else{lettergrade = 'F';}

This returns the letter grade

   return lettergrade;

}

The main begins here

int main(){

This declares the midterm and final scores as integer

   int midterm, final;

This declares the total score as double

   double score;

These get input for midterm score

   printf("Midterm: ");    scanf("%d", &midterm);

These get input for final score

   printf("Final: ");    scanf("%d", &final);  

This calculates the total score

   score = 0.4 * midterm + 0.6 * final;

This prints the calculated total score

   printf("Score: %lf\n", score);

This calls the turn_to_letter function and prints the returned letter grade

   printf("Letter Grade: %c",turn_to_letter(score));

   return 0;

}

what is the best plugin for subscription sites?

Answers

Answer:

Explanation:

MemberPress. MemberPress is a popular & well-supported membership plugin. ...

Restrict Content Pro. ...

Paid Memberships Pro. ...

Paid Member Subscriptions. ...

MemberMouse. ...

iThemes Exchange Membership Add-on. ...

Magic Members. ...

s2Member.

a) Why is eavesdropping done in a network?
b) Solve the following using checksum and check the data at the
receiver:
01001101
00101000​

Answers

Answer:

An eavesdropping attack is the theft of information from a smartphone or other device while the user is sending or receiving data over a network.

Missing: checksum ‎01001101 ‎00101000

Write a MIPS assembly language program that prompts for a user to enter a series of floating point numbers and calls read_float to read in numbers and store them in an array only if the same number is not stored in the array yet. Then the program should display the array content on the console window.
Consult the green sheet and the chapter 3 for assembly instructions for floating point numbers. Here is one instruction that you might use:
c.eq.s $f2, $f4
bc1t Label1
Here if the value in the register $f2 is equals to the value in $f4, it jumps to the Label1. If it should jump when the value in the register $f2 is NOT equals to the value in $f4, then it should be:
c.eq.s $f2, $f4
bc1f Label1
To load a single precision floating point number (instead of lw for an integer), you might use:
l.s $f12, 0($t0)
To store a single precision floating point number (instead of sw for an integer), you might use:
s.s $f12, 0($t0)
To assign a constant floating point number (instead of li for an integer), you might use:
li.s $f12, 123.45
To copy a floating point number from one register to another (instead of move for an integer), you might use:
mov.s $f10, $f12
The following shows the syscall numbers needed for this assignment.
System Call System Call System Call
Number Operation Description
2 print_float $v0 = 2, $f12 = float number to be printed
4 print_string $v0 = 4, $a0 = address of beginning of ASCIIZ string
6 read_float $v0 = 6; user types a float number at keyboard; value is store in $f0
8 read_string $v0 = 8; user types string at keybd; addr of beginning of string is store in $a0; len in $a1
------------------------------------------
C program will ask a user to enter numbers and store them in an array
only if the same number is not in the array yet.
Then it prints out the result array content.
You need to write MIPS assembly code based on the following C code.
-------------------------------------------
void main( )
{
int arraysize = 10;
float array[arraysize];
int i, j, alreadyStored;
float num;
i = 0;
while (i < arraysize)
{
printf("Enter a number:\n");
//read an integer from a user input and store it in num1
scanf("%f", &num);
//check if the number is already stored in the array
alreadyStored = 0;
for (j = 0; j < i; j++)
{
if (array[j] == num)
{
alreadyStored = 1;
}
}
//Only if the same number is not in the array yet
if (alreadyStored == 0)
{
array[i] = num;
i++;
}
}
printf("The array contains the following:\n");
i = 0;
while (i < arraysize)
{
printf("%f\n", array[i]);
i++;
}
return;
}
Here are sample outputs (user input is in bold): -- note that you might get some rounding errors
Enter a number:
3
Enter a number:
54.4
Enter a number:
2
Enter a number:
5
Enter a number:
2
Enter a number:
-4
Enter a number:
5
Enter a number:
76
Enter a number:
-23
Enter a number:
43.53
Enter a number:
-43.53
Enter a number:
43.53
Enter a number:
65.43
The array contains the following:
3.00000000
54.40000153
2.00000000
5.00000000
-4.00000000
76.00000000
-23.00000000
43.52999878
-43.52999878
65.43000031

Answers

Explanation:

Here if the value in the register $f2 is equals to the value in $f4, it jumps to the Label1. If it should jump when the value in the register $f2 is NOT equals to the value in $f4, then it should be

-1
Draw a flowchart to input two
numbers in variables M and N and
print the multiplication table from 1*1
to M*N​

Answers

Answer:A flowchart is a diagram that depicts the steps involved in solving a problem. The following flowchart shows how to output the multiplication table ( n * 1 to m * 1) of a number, n and m:

short note about micro miniaturzation​

Answers

Answer:

the manufacture of extremely small versions of electronic devices.

Explanation:

asks

mxskssssksskwlwslskamzmzmsmsmz

What’s unique about windows 8 compared to earlier windows

Answers

New Interface, features like start screen, faster boot time, dynamic desktop, improved search function, windows love syncing, windows to go, and improved security.

What is the hamming distance between the following bits? Sent
bits: 101100111, Received bits: 100111001
Select one: 5. Or 3 or 6 or4​

Answers

I think

the hamming distance between the following bits its 5

This program exercise #4 wants the user to write a program in python that contains a list of movies titles, years and movie rating. You will need to display a menu option that allows the user to list all of the movies, add a movie, delete a movie and exit out of the program. This will be done using lists and the functions to add an element to a list and how to delete an element to a list. The program should be written utilizing functions in python for the main function, the display_menu function, the delete function, the add function and the list movie function. You can place this all in one python file or include them in various python files that include them into the main program. Let me know if you have any questions with this exercise. Output Screen: COMMAND MENU list - List all movies add - Add a movie del - Delete a movie exit - Exit program Command List: list 1. Monty Python and the Holy Grail, 1979, R 2. On the Waterfront, 1954, PG 3. Cat on a Hot Tim Roof, 1958, R Command: add Name: Gone with the Wind Year: 1939 Rating: PG Gone with the Wind was added.

Answers

Answer:

The program in Python is as follows:

def display_menu(titles,years,ratings):

   for i in range(len(titles)):

       print(str(i+1)+". "+titles[i]+", "+str(years[i])+", "+str(ratings[i]))

   

def delete(titles,years,ratings):

   del_item = input("Movie: ")

   if del_item in titles:

       print(del_item,"was deleted")

       index = titles.index(del_item)

       titles.pop(index)

       years.pop(index)

       ratings.pop(index)

   return(titles,years,ratings)

   

def add(titles,years,ratings):

   title = input("Title: ")

   year = int(input("Year: "))

   rating = int(input("Ratings: "))

   print(title,"was added")

   titles.append(title)

   years.append(year)

   ratings.append(rating)

   

   return(titles,years,ratings)

titles = []

years = []

ratings = []

print("COMMAND MENU list\nlist - List movies\nadd - Add movie del\ndel - Delete movie exit\nexit - Exit program")

menu = (input("Command List: "))

while(menu.lower() == "list" or menu.lower() == "add" or menu.lower() == "del"):

   if menu.lower() == "list":

       display_menu(titles,years,ratings)

   elif menu.lower() == "add":

       titles, years, ratings = add(titles,years,ratings)

   elif menu.lower() == "del":

       titles, years, ratings = delete(titles,years,ratings)

   menu = (input("Command List: "))

   elif menu.lower() == "exit":

       break

print("Exited!!!")

Explanation:

See attachment for complete program where comments are used to explain some lines of the program

what does this mean on a tamagotchi lol (this is the hello kitty one)

Answers

I not sure but I think it’s an apple.

I don't have that tamagotchi

But I do have 2 tamagotchi's

I think it's a cherry on your tamagotchi

Hoped this helped!

Have a wonderful day-

which shortcut can we use to make directional heading of a cuboid more obvious while in the lidar view​

Answers

Answer:

cutting across

Explanation:

explain three main steps in mail merging (6 marks) ​

Answers

Answer:

Explanation:

The mail merging process generally requires the following steps:

Creating a Main Document and the Template.

Creating a Data Source.

Defining the Merge Fields in the main document.

Merging the Data with the main document.

Saving/Exporting.

Python program
You are given the following text file called Mytext.txt. Write a Python function called search_file that accepts the name of the file (i.e. filename) and a string to look for in the file (i.e. mystring) as parameters. The function then looks for mystring in the file. Whenever it finds the string in a line, it saves the line number and the text for that line in a dictionary. Finally, it returns the dictionary after reading all the lines in the file and populating the dictionary with all matching line numbers and line text. If an empty string or a blank string is passed as mystring then an empty dictionary is returned.
Sample Input: search_file("Mytext.txt","python")
Sample Input: search_file("Mytext.txt","")
Contents of Mytext.txt
Python is an interpreted, high-level, programming language.
Python is dynamically typed and garbage-collected.
Python was conceived in the late 1980s.
Python 2.0, was released in 2000.
Python 3.0, was released in 2008.
The interpreters are available for many operating systems.

Answers

Answer:

The function in Python is as follows:

def search_file(filename,mystring):

my_dict = {}

count = 0

file = open(filename)

lines = file.readlines()

for line in lines:

 count+=1

 if mystring.lower() in line.lower():

  my_dict[count] = line.rstrip('\n')

return my_dict

Explanation:

This defines the function

def search_file(filename,mystring):

This initializes an empty dictionary

my_dict = {}

This initializes the number of lines to 0

count = 0

This opens the file

file = open(filename)

This reads the lines of the file

lines = file.readlines()

This iterates through the lines

for line in lines:

This increments the number line

 count+=1

This checks if the string exists in the line

 if mystring.lower() in line.lower():

If yes, the line number and the string are added to the dictionary

  my_dict[count] = line.rstrip('\n')

This returns the dictionary

return my_dict

list the main industries in Sierra Leone​

Answers

Answer:

The main industries in Sierra Leone are: Diamond mining

Petroleum refining

Small - scale manufacturing (beverage, textiles,footwear)

Explanation:

They also engage in commercial ship repair

Which of the following protocols help IP in multicast service?
Select one:

ORARP
O CMP
O ARP
O IGMP​

Answers

Answer:

I guess IGMP.............

Answer:

IGMP

Explanation:

The correct answer is actually IGMP snooping.

so from your options it's IGMP

are you interested in cyber security?

Other Questions
Fill in the blank in the following sentence with the appropriate preposition below. Note the hint in parentheses. Sus libros estn __ (on top of) la mesa. A. con B. encima de C. contra D. a please help id.k what to do i was on a typing thing then i got eiji's letter to ash and now im crying 3) (Infer) What would happen if two kinds of animals living in the same habitat had the same niche?4) Why might an animal need to move to a different habitat? I report people who add links in there answer or use safariHave a good day! :) Need help finding the answer Here is my question. Solve for x. Round your answer to the nearest tenth. What mass of iron(III) oxide will be formed if 9.30 L of oxygen at STP react with excess iron? please help me to find this out i really really need help. The diagram shows a triangular prism ABCDEF with a horizontal base ABEF.Give your answer correct to 3 significant figures. How is feminism from today similar to and different from first and second-wave feminism? Please help this is due today. Help plz will mark brainliest Need answer ASAP Ill mark brainliest if correct How can you create a class without any methods, yet call a method from that class? The class can___ methods from another class 1. My uncle Julio ___ be more than 90 years old.2. But he __ lift more weight than my dad can.3. He __ try to win a contest.4. With his muscles, he __ win any contest!5. If I lift weights, I __ be very careful. HELPP will give brainliest NO LINKSSS DID I GET THIS RIGHT PLEASE HELP ITS DUE IN 10 MINUTES ( DONT GIVE ME A LINK PLEASE) Simplify the Expression and EXPLAIN what you did and WHY.-3(4m+3)+2m What is the volume of the composite object below? HELP ME PLEASE WILL GIVE BRAINLY NO BAD ANSWERS The RANGE of the function shown isA) [4,1]B) [4, )C) [1,)D) [0,) What would be considered "unruly" behavior? 21 POINTSGroup of answer choicesmurdervandalismterroristic threatssmoking cigarettes