Answer
C
Explanation:
In a system you have to send on input data, then the application processes it and then it returns your output
You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the information you need?
Answer:
Vulnerability scanner
You require a "vulnerability scanner" to provide you with the information to be able to identify the services running on a set of servers on your network.
What is a vulnerability scanner?Vulnerability scanning, commonly known informally as 'vuln scan,' is an automated technique for finding network, application, and security problems ahead of time. The IT department of a company or a third-party security service provider often does vulnerability scanning. Attackers use this scan to find points of access to your network.
A vulnerability scanner can provide features that a port scanner cannot: sending notifications when new systems are connected to the network.
If you want to be able to identify the services running on a set of servers on your network then you need a "vulnerability scanner" to equip you with the details.
To learn more about vulnerability scanners click here:
https://brainly.com/question/10097616
#SPJ12
Which type of attack cripples the network and prevents legitimate users from accessing network resources
Answer:
A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.
Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.
1
What is a DDoS attack?
1.1 – Understanding a DDoS Attack
The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.
1.2 – What is the Goal Behind a DDoS Attack?
The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:
The website can become slow to respond to legitimate requests.
The website can be disabled entirely, making it impossible for legitimate users to access it.
The primary advantage of hexadecimal notation, compared with binary notation, is its ____________________.
Answer:
Compactness
Explanation:
Have a nice day!
define Microsoft Excel 2010
Answer:
a very very old Microsoft application that only people on old pc's use now
Explanation:
Answer:
Microsoft Excel is a Microsoft software program that allows users to organize, format, and calculates data using the formulas of a tablet.
This program is part of the Microsoft Office Suite and supports other Office Suite applications. Microsoft Excel can now be purchased on subscription via cloud via office 365, as can other Microsoft Office products.
Explanation:
In Excel, entering a value column and clicking on a cell in the low sheet below allows the cell to add all of the numbers entered above to the "auto sum" button. This takes place in the manual leader counts, which before the development of the modern table were a labor-intensive part of the business.
Microsoft Excel is also a key user technology, useful in training and professional development, in various types of simple case applications. MS Excel has been included in basic corporate computer graduation training for several years, and temporary employment agencies may examine individuals for a wide variety of clerical duties on their skills with Microsoft Word and Microsoft Excel.
The data visualization principle has changed the Microsoft Excel usage cases. Where companies have used Microsoft Excel for, say, hundreds of records in the past, most business cases today involve tablets containing less than a dozen values for each particular project.
A__________is a system that incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.
Answer:
global information system (GIS)
Explanation:
A global information system (GIS) is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data ...
Write a basic notation for
[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]
Answer:
[tex]a = (b + c)/(2 * c)[/tex]
[tex]z = x/(y + c)[/tex]
[tex]c = (9 * c + 32)/5[/tex]
Explanation:
Required
The expression in basic
To do this, we use () to group items, / as divide and * to combine factors
So, we have:
[tex](a)\ a = \frac{(b + d)}{2c}[/tex]
In basic, it is:
[tex]a = (b + c)/(2 * c)[/tex]
[tex](b)\ z = \frac{x}{y + c}[/tex]
In basic, it is:
[tex]z = x/(y + c)[/tex]
[tex](c)\ c = \frac{9c + 32}{5}[/tex]
[tex]c = (9 * c + 32)/5[/tex]
1. digital ink pen
a miniature electronic circuit or device that electricity flows through. The circuit is made of silicon. It may also be called a chip
2. Electronic Paper Display
a pocket-sized card that can store data and process information
3. integrated circuit
an automatic identification device that lets you store and retrieve information
4. radio transceiver
a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor
5. RFID
display or sign with the ability to update the information electronically
6. smart card
an electronic device that uses an antenna to read and send information by way of a radio signal
Answer:
1. Integrated circuit.
2. Smart card.
3. RFID.
4. Digital ink pen.
5. Electronic Paper Display.
6. Radio transceiver
Explanation:
1. Integrated circuit: a miniature electronic circuit or device that electricity flows through. An integrated circuit (IC) is typically of a semiconductor element such as silicon. Also, it may be referred to as a chip.
2. Smart card: a pocket-sized card that can store data and process information. It's usually used in cable television decoder, transportation terminals, e-commerce services, etc.
3. RFID: an automatic identification device that lets you store and retrieve information. RFID is an acronym for radio frequency identification.
4. Digital ink pen: a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor.
5. Electronic Paper Display: display or sign with the ability to update the information electronically.
6. Radio transceiver: an electronic device that uses an antenna to read and send information by way of a radio signal in the field of telecommunications.
What is the purpose of "display:table"?
Answer:
Modern browsers use CSS to style all their markup.
How would they render a <table> element if CSS had nothing that could express the appearance of one?
(That, and you might have non-tabular data that you want to render like a table, there are enough people using tables for layout to see a demand for it).
They can be used to format content in a tabular manner when the markup does not use the table element, e.g. because the markup was written by someone who was told not use tables or because the markup is generic XML and not HTML.
You can also design a page using e.g. div elements so that some stylesheet formats them as a table, some other stylesheet lets them be block elements or turns them to inline elements. This may depend e.g. on the device width
can I play the game the last of us with this spec:
Cuando se introduce una fórmula en una celda primero que hay que introducir es
Answer:
El signo =.
Explanation:
La pregunta refiere a las fórmulas que se utilizan en el programa Excel. Esta es una hoja de cálculo desarrollada por Microsoft para computadoras que utilizan el sistema operativo Windows. Es, con mucho, la hoja de cálculo más utilizada para estas plataformas. Microsoft Excel se utiliza como hoja de cálculo y para analizar datos, así como para crear una base para la toma de decisiones. En Excel, se pueden realizar cálculos, configurar tablas, crear informes y analizar volúmenes de datos.
Además, dentro de sus celdas existe la posibilidad de realizar fórmulas, que emulan las fórmulas matemáticas y realizan cálculos específicos entre distintas celdas.
You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal
Answer:
Answer would be, PSTN (public switched telephone network)
Communication media that use an antenna for transmitting data through air or water are called _____.
Answer:
Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.
Explanation:
douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html
copy and paste that it might help!
You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.Which method of NAT translation should you implement for these servers?
Answer: Static
Explanation:
Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.
Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.
In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.
Answer:
case-based.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Testing.
6. Implementation and execution.
7. Maintenance.
A case-based reasoning application refers to a knowledge-based system that is designed and developed to use previous case scenarios (similar past problems) to interprete or proffer a solution to a problem.
In design and implementation of any case-based reasoning application, there are four (4) Rs involved: retrieve, reuse, revise, and retain.
#include
int main()
{
char ch;
printf("Enter any letter");
ch=getch
();
printf("\nYou Pressed %c",ch);
return 0;
}
whats the error not giving the correct output
Answer:
#include<studio.h>
#include<conio.h>
void main()
{
char ch;
printf("Enter any letter");
scanf("%c",&ch);
what is the use of a piano
Answer the following questions in your own words on how you understand the lesson.
differentiate the following pairs of terms.
1.Save and Save As
2.Blank Document and Template
3. Existing File and Recently Open File
Answer:
Explanation:
1.Save and Save As
The main difference between Save and Save As is that Save helps to update the lastly preserved file with the latest content while Save As helps to store a new file or to store an existing file to a new location with the same name or a different name
2.Blank Document and Template
Templates in Panda Doc are used for generic content that you intend on using multiple times, while documents are used for specific information. In order to send a document, you must first create it from an existing template
3. Existing File and Recently Open File
Opens a file for writing and reading in binary mode. a: opens a file for appending new information to it . ... A new file is created if one with the same name doesn't exist
6. By default,how the table headings are placed. (2 Points)
bold and italic
bold and centered
bold and underlined
bold and aligned
explain the importance of using onedrive in windows 10, and how knowledge of it will have an impact on today's workplace
Answer:
The importance of using Onedrive it helps save stuff if you have no more room on your computer it helps with schooling and works for jobs you have Microsoft Teams, Onedrive, Outlook, Office 365. It gives all sorts of things that you can use for anything contacts on Outlook and Teams.
Write a program, which will take 20, inputs from the user and find how many
odd and even numbers are there.
Pseudocode & Python
Answer:
user_input = [int(input()) for i in range(20)]
even = []
odd = []
for i in user_input:
if i%2:
even.append(i)
else:
odd.append(i)
print("odd : ", len(odd), "even : ", len(even))
Explanation:
The above code is written in python :
Using a list comprehension we obtain a list of 20 values from the user and store in the variable user_input.
Two empty list are defined, even and odd which is created to store even and odd values.
A for loop is used to evaluate through the numbers in user_input. Even values leave no remainder when Divided by 2 and are appended to the even list while those those leave a raunder are automatically odd values. The elements each list are counted using the len function and are displayed using the print statement.
The logical structure in which one instruction occurs after another with no branching is a ____________.
Answer:
sequence
Explanation:
The logical structure in which one instruction occurs after another with no branching is a sequence.
i am doing 7th grade coding 3.02 assignment can anybody help me it says bad input on line 3 and this is what it is can someone help me
grade = int(input("What grade are you in?"))
Answer:
grade = int(input("What grade are you in?")
if grade == 9:
print ("Freshman")
elif grade == 10:
print ("Sophomore")
elif grade == 11:
print ("Junior")
elif grade == 12:
print ("Senior")
else:
print ("Invalid")
Explanation:
You fail to provide the complete code. So, I will rewrite the code from scratch
The complete question requires that the level is printed based on the input grade.
The code has been added in the answer section.
The explanation is as follows:
[Thus gets input for grade]
grade = int(input("What grade are you in?")
[If grade is 9, this prints Freshman]
if grade == 9:
print ("Freshman")
[If grade is 10, then level is sophomore]
elif grade == 10:
print ("Sophomore")
[If grade is 11, then grade is Junior]
elif grade == 11:
print ("Junior")
[If grade is 12, then level is senior]
elif grade == 12:
print ("Senior")
[All other inputs are invalid]
else:
print ("Invalid")
Convert to different number system as mentioned.(17)10=(?)2
a computer takes a lot of time to do complex calculation
Question:
A computer takes a lot of time to do complex calculation.
Answer:
False!
Hope it helps you
You connect your computer to a wireless network available at the local library. You find that you can access all of the websites you want on the internet except for two. What might be causing the problem?
Answer:
There must be a proxy server that is not allowing access to websites
Explanation:
A wireless network facility provided in colleges, institutions, or libraries is secured with a proxy server to filter websites so that users can use the network facility for a definite purpose. Thus, that proxy server is not allowing access to all of the websites to the user on the internet except for two.
7. The message on a diamond-shaped sign might be
a. Pass With Care, Trucks Use Right Lane, or
Do Not Pass.
b. Curve, Hill, or Winding Road.
One Way, Wrong Way, or No Trucks.
d. No Turn, Speed Zone Ahead, or Left Lane
Must Turn Left.
Answer:
a. pass with care, trucks use right lane, or do not pass
A two-dimensional array of ints, has been created and assigned to a2d. Write an expression whose value is the number of rows in this array.
Explanation:
oi.........................
Write code using the range function to add up the series 3, 6, 9, 12, 15, ..... 66 and print the resulting sum. Expected Output 759
Answer:
The program is as follows:
total = 0
for i in range(3,67,3):
total += i
print(total)
Explanation:
This initializes the sum of the series to 0
total = 0
This iterates through the series with an increment of 3
for i in range(3,67,3):
Add up all elements of the series
total += i
Print the calculated sum
print(total)
you press the F9 key to convert an object to a symbol true or false
Answer:
False,
Reason
F8 key is used for the coversion of object to symbol
Human Resources can be classified into four groups namely________, ________, _______ and _____________.
A. skilled, advanced, professional and services.
B. semi-skilled, simple, services and sustain.
C. professional, advanced, unskilled and simple.
D. professional, unskilled, semi-skilled and skilled.
as i said before they have no topic for fcm but can you help plzz
Answer:
Option D
Explanation:
Human resources can be classified into four groups namely professional, unskilled, semi-skilled and skilled.