A customer connects to your business network. The customer uses a packet sniffer to intercept network traffic in an attempt to find confidential information. This is an example of which type of attack

Answers

Answer 1

Answer:

Self Attack

Explanation:

I pick self attack because the person is trying to harm you.


Related Questions

Write a C++ program that tests whether the array has four consecutive numbers with the same values. bool isConsecutive(int values[], int size) In the main() program you should prompt the user to enter a series of integers and display if the series contains four consecutive numbers with the same value. Your program should first prompt the user for the number of integers in the list or number of values in the series. Assume the maximum array size is 20. No global variables may be used Use a function prototype for said function The function can not do any cin or cout The main() function will do all the cin and cout You may assume the list contains positive integers only Sample runs (bolded text is output) : Enter the number of values: 6 Enter a value: 3 Enter a value: 4 Enter a value: 5 Enter a value: 5 Enter a value: 5 Enter a value: 5 The list has consecutive four numbers! Enter the number of values: 9 Enter a value: 3 Enter a value: 4 Enter a value: 5 Enter a value: 50 Enter a value: 5 Enter a value: 6 Enter a value: 5 Enter a value: 5 Enter a value: 6 The list has no consecutive fours numbers!

Answers

Answer:

#include <iostream>

using namespace std;

bool isConsecutive(int values[], int size){

   bool r = false;

   int count=0;

   for(int i=0;i<size;i++){

       if(values[i]==values[i+1]){

           count++;

           if(count==3)

           r=true;

       }

       else{

           count=0;

       }

   }

   return r;

}

int main() {

   // Write C++ code here

   int size;

   

   cout<<"enter the number of integer in list"<<endl;

   cin>>size;

   int arr[size];

   for(int i=0;i<size;i++){

       cout<<"enter the value of number"<<endl;

       cin>>arr[i];

   }

  bool result= isConsecutive(arr,size);

  if(result){

      cout<<"The list has consecutive fours numbers!"<<endl;

  }

  else{

      cout<<"The list has no consecutive fours numbers!"<<endl;

  }

   return 0;

}

Explanation:

Above program is written in C++ language.

All bold-faced words and letters are C++ keywords.

Write a program that gets a list of integers from a user. First, the user should be asked to enter the number of integers to be stored in a list. Then your program should ask for these integers and store them in the list. Finally, the program should ask the user to enter a sentinel value that will be used to search through the integers in the list which are greater than the sentinel value. For example: If the input is: 7 50 60 140 200 75 100 172 70 the output is: 140 200 75 100 172 The 7 indicates that there are seven integers in the list, namely 50 60 140 200 75 100 172. The 70 indicates that the program should output all integers greater than 70, so the program outputs 140 200 75 100 172. You should use methods in addition to the main method. getListValues to get and store the values from the user printListValuesGreaterThanSentinal to print the values found to be greater than the sentinel value.

Answers

Answer:

#include <iostream>

using namespace std;

void insert(int *arr, int num);

int n;

void returnGT(int arr[]);

int main(){

   cout<< "Enter the number of integers: "<<endl;

   cin>>n;

   int num[n];

   insert(num, n);

   returnGT(num);

}

void insert(int *arr, int num){

   for (int i = 0; i < num; i++){

       cout<< "Enter item "<< i + 1 << " : ";

       cin>> arr[i];

   }

}

void returnGT(int arr[]){

   int sentinel;

   cout<< "Enter sentinel: ";

   cin>> sentinel;

   for (int i = 0; i < n; i++){

       if (arr[i] > sentinel){

           cout<< arr[i] << " ";

       }

   }

}

Explanation:

The C++ source code defines an array of integer values, the program prompts for user input for the array size and the sentinel value to fill the array with input values and output integer values greater than the sentinel.


A browser is an example of a. :
general-purpose application
specialized
program
system application
utility program​

Answers

a browser is an example of a system application

Write a program that declares a two-dimensional array named myFancyArray of the type double. Initialize the array to the following values: 23 14.12 17 85.99 6.06 13 1100 0 36.36 90.09 3.145 5.4 1. Create a function that will return the sum of all elements in the array. Call this function from main and print out the result. 2. Create a function that will use a nested loop to display all the elements in the array to the screen. Call this function from main.

Answers

Answer:

This solution is provided in C++

#include <iostream>

using namespace std;

double sumFancyArray(double myarr[][6]){

   double sum = 0.0;

   for(int i = 0;i<2;i++)    {

       for(int j = 0;j<6;j++){

       sum+=myarr[i][j];    

       }}    

   return sum;

}

void printFancyArray(double myarr[][6]){

   for(int i = 0;i<2;i++)    {

       for(int j = 0;j<6;j++){

       cout<<myarr[i][j]<<" ";    

       }

   }

}

int main(){

   double myFancyArray[2][6] = {23, 14.12, 17,85.99, 6.06, 13, 1100, 0, 36.36, 90.09, 3.145, 5.4};

   cout<<sumFancyArray(myFancyArray)<<endl;

   printFancyArray(myFancyArray);

   

   return 0;

}

Explanation:

This function returns the sum of the array elements

double sumFancyArray(double myarr[][6]){

This initializes sum to 0

   double sum = 0.0;

This iterates through the row of the array

   for(int i = 0;i<2;i++)    {

This iterates through the column

       for(int j = 0;j<6;j++){

This adds each element

       sum+=myarr[i][j];    

       }}    

This returns the sum

   return sum;

}

This method prints array elements

void printFancyArray(double myarr[][6]){

This iterates through the row of the array

   for(int i = 0;i<2;i++)    {

This iterates through the column

       for(int j = 0;j<6;j++){

This prints each array element

       cout<<myarr[i][j]<<" ";    

       }

   }

}

The main starts here

int main(){

This declares and initializes the array

   double myFancyArray[2][6] = {23, 14.12, 17,85.99, 6.06, 13, 1100, 0, 36.36, 90.09, 3.145, 5.4};

This calls the function  that returns the sum

 cout<<sumFancyArray(myFancyArray)<<endl;

This calls the function that prints the array elements

   printFancyArray(myFancyArray);

   

   return 0;

}

Please!! I need help, this is due by tonight!!!

Answers

Answer:

sorry if it is too late but I think it is d

Explanation:

(20 points). Some matrixes have very special patterns, for example, in the following matrix, the numbers in the first row are equal to the number of their respective column; the numbers in the first column are equal to the square of the number of their respective row; when the row number equals to the column number, the elements are equal to 1; the rest elements are the sum of the element just above them and the one to their left. Write a user-defined function program in the program, you need to use while loops), and then use the function you write to create the following matrix (show the command you use). 1 4 9 16 2 1 10 26 3 4 1 27 4 5 8 13 9 22 1 23

Answers

Answer:

#include <iostream>

using namespace std;

void matrix(){

   int row = 5, col = 6;

   int myarr[row][col];

   for (int i = 0; i < 5; i++){

       for (int x = 0; x < 6; x++){

           if (i == 0){

               myarr[i][x] = (x+1)*(x+1);

          }else if ( x == 0){

               myarr[i][x] = (i+1)*(i+1)*(i+1);

           } else if ( i == x){

                myarr[i][x] = (i+1);

           } else{

                myarr[i][x] = myarr[i-1][x] + myarr[i][x-1];

           }

        }

   }

   for (int i = 0; i < 5; i++){

       for (int x = 0; x < 6; x++){

           cout<< myarr[i][x] << " ";

       }

       cout<< "\n";

}

}

int main(){

   matrix();

}

Explanation:

The C++ source code defines a two-dimensional array that has a fixed row and column length. The array is a local variable of the function "matrix" and the void function is called in the main program to output the items of the array.

Add a clause for identifying the sibling relationship. The predicate on the left handside of the rule should be sibling(X, Y), such that sibling(alice, edward) should be true, and X, Y do not need to be different.

Answers

Answer:

following are the solution to this question:

Explanation:

For Siblings (X,Y);

Alice(X),

Edward(Y),

parent(Edward,Victoria,Albert) //Albert is the father F

parent(Alice,Victoria,Albert)  //Victoria is the Mother M

Therefore,

X is siblings of Y when;

X is the mother M and father is F, and  Y is the same mother and father as X does, and satisfing the given condition.

It can be written as the following prolog rule:

Siblings_of(X,Y):

parents(X,M,F)

parents(Y,M,F)

Siblings_of(X,Y): parents(X,M,F), parents(Y,M,F)

|? - sibling_of(alice,edward).

yes

|? - Sibling_of(alice,X).

X=Edward

|? - Sibling_of(alice,alice).

yes

Calculate the heat energy required to raise the temperature of 5 kg of water from 20℃ to

40℃. Specific heat capacity of water is 4200 J kg-1 k-1​

Answers

Given that,

Mass of water, m = 5 kg

The temperature increases from 20℃ to  40℃.

Specific heat capacity of water is 4200 J kg⁻¹ k⁻¹

To find,

Heat energy required to raise the temperature.

Solution,

The formula for the heat energy required to raise the temperature is given by :

[tex]Q=mc\Delta T\\\\=5\times 4200\times (40-20)\\\\=420000\ J\\\\=420\ kJ[/tex]

So, the heat energy required is 420 kJ.

What will be result of below if statement.
if (Grade >= 90)
puts("A");

What’s the answer?

Answers

Explanation:

pls check it ur answer hp u understand this

A hacker posing as a potential customer has connected to your network and has discovered that a server running Windows Server has a configuration that a misconfiguration on a Windows Server that exposes the PowerShell prompt. The hacker executes a script to log valuable information about the server. Which vulnerabilities did the hacker exploit

Answers

Answer:

Lack of ips

Insecure configuration

Explanation:

Lack of IPS

This is fully known as intrusion prevention softwares this works by enabling the firewall and protecting the computer system from unauthorised users and potential attackers and it prevents data from being stolen by identifying potential attacks. It monitors the network continuously, thereby looking for possible malicious threats and also capturing informations about these threats.

Insecure configuration

Obviously if you have power shell enabled then you would have a secure configuration. Attackers can easily access your system in the presence of this flaw.

What is the purpose of a report?
A. To organize data into a table
B. To display data returned from a query in a specially formatted way
C. To design a custom form to create a new table
D. To search for specific information in a table

Answers

The one that makes most sense would be B since a report is based upon returned data

Answer:

B. To display data returned from a query in a specially formatted way

Requests to retrieve data written in a language such as SQL are called…


A. Data
B.queries

Answers

B. Queries

Queries can be fairly broad or written to focus on time frames, types of data, ranges etc.

Consider the following declaration: (1, 2) double currentBalance[91]; In this declaration, identify the following: a. The array name b. The array size Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 8 Exercises | 593 c. The data type of each array component d. The range of values for the index of the array e. What are the indices of the first, middle, and the last elements

Answers

Answer:

Following are the solution to the given choices:

Explanation:

Given:

double currentBalance[91];//defining a double array  

In point a:  

The name of the array is= currentBalance.  

In point b:  

91 double values could be saved in the array. It requires 8bytes to hold a double that if the array size is 91*8 = 728

In point c:  

Each element's data type is double.

In point d:  

The array index range of values is between 0 and 90 (every array index starts from 0 and ends in N-1, here N=91).  

In point e:  

To access first element use currentBalance[0], for middle currentBalance[91/2] , for last currentBalance[90]

You have been asked to write a program that involves animals. Some animals are herbivores. Within this program, any animal that is not a herbivore is a carnivore. Which set of class definitions is most appropriate for this program

Answers

Incomplete question. The options:

class Animal :

class Herbivore(Animal):

class Carnivore(Herbivore) :

class Animal (Herbivore, Carnivore) :

class Herbivore :

class Carnivore

class Animal

class Herbivore (Animal) :

class Carnivore (Animal) :

class Animal:

class Carnivore (Animal) :

class Herbivore (Carnivore) :

Answer:

class Animal

class Herbivore (Animal) :

class Carnivore (Animal) :

After reading through the code, what will happen when you click run?​

Answers

Answer:

B.) Laurel will try to collect treasure when there is not any and it causes an error

Explanation:

Laurel is at the top right corner of the map. When you click run, laurel moves 1 step ahead. This spot is right above the coordinate of the very first diamond. There is no treasure at this spot.

Therefore, when the next command calls for collecting, there will be an error, as there is no treasure at the spot right above the first diamond.

Which file extension indicates a text document? .ppt .tst .pdf .txt

Answers

Answer:

The answer is .txt

Explanation:

Answer:

.txt

Explanation:

odesseyware 2021

what command in cisco IOS allows the user to see the routing table

Answers

Answer:

show ip route [[ipAddress [mask]] [bgp | connected | mpls [ipAddress] [ipAddress/PrefLen] [ipAddress mask] [detail] | isis | ospf | static | summary | multicast |unicast]

Explanation:

the show ip route command will show the entire ip route table.  If you put in no arguments it will display them all.

Rosa is building a website for a multimedia company. She wants to add a drop-down menu functionality to the website's main page. Which
markup language or technology will allow Rosa to add this element?

OA. HTML
OB. Semantic HTML
OC. DHTML
OD. XML

Answers

The answer is: OC: DHTM
Explanation: PLATOLIVESMATTER

Answer:

The correct answer is C. DHTML.

Explanation:

I got it right on the Edmentum test.

what command in cisco IOS allows the user to see the routing table

Answers

Answer:

Show IP route command

Explanation:

write a technical term for following statements
1.The method applied to increase the life of computer and its assets.
2.The power regulating device this supplies constant power to the computer from its backup system.
3.The software used to scan, locate and detect the disk for viruses.

Answers

Answer:

1. Hardware Maintenance

2. Uninterrupted Power Supply (UPS)

3. Antivirus software

Explanation:

Antivirus software, or Anti-virus software (also known as AV software), otherwise called anti malware, is a PC program used to forestall, distinguish, and eliminate malware.

Antivirus software was initially evolved to identify and eliminate PC infections, thus the name. Be that as it may, with the expansion of different sorts of malware, antivirus software began to give security from other PC dangers. Specifically, current antivirus software can shield clients from: noxious program criminals.

A few items additionally incorporate security from other PC dangers, for example, tainted and noxious URLs, spam, trick and phishing assaults, online identity (privacy), web based financial assaults, social engineering techniques, advanced persistent threat (APT).

Where can a client identify the instant deposit options for their QuickBooks Payments account?

Deposits tab
Account and Settings
Invoices tab
Create Invoice screen
Banking Center

Answers

Answer:

Banking centre

.

.

..

.

.

.

.

.

.

.

y'+2y = 5-e^(-4x), y(0)=-11

Use Euler's Method with a step size of h = 0.1 to find approximate values of the solution as x= 0.1, 0.2, 0.3, 0.4, and 0.5. Compare them to the exact values of the solution at these points.

Answers

Answer:

  see attached

Explanation:

A differential equation solver says the exact solution is ...

  y = 5/2 -14e^(-2x) +1/2e^(-4x)

The y-values computed by Euler's method will be ...

  y = ∆x·y' = 0.1(5 - e^(-4x) -2y)

The attached table performs these computations and compares the result. The "difference" is the approximate value minus the exact value. (When the step size is decreased by a factor of 10, the difference over the same interval is decreased by about that same factor.)

Suppose that we want to enhance the processor used for Web serving. The new processor is 10 times faster on computation in the Web serving application than the original processor. Assuming that the original processor is busy with computation 40% of the time and is waiting for I/O 60% of the time, what is the overall speedup gained by incorporating the enhancement

Answers

Answer:

The overall speedup gained by incorporating the enhancement is 1.563

Explanation:

Using Amdahl's Law;

The overall speedup  [tex](N) =\dfrac{1}{(1-P) + ( \dfrac{P}{n})}[/tex]

where;

P = Fraction Enhanced for Old Processor

n = speedup enhancement as a result of the new processor

P = 40% = 0.40  and n = 10

The overall speedup (N) is:

[tex]=\dfrac{1}{(1-0.4) + ( \dfrac{0.4}{10})}[/tex]

[tex]=\dfrac{1}{(0.6) + ( 0.04)}[/tex]

[tex]=\dfrac{1}{0.64}[/tex]

= 1.563

Thus, the overall speedup gained by incorporating the enhancement is 1.563

What are differences between manual formatting and formatting in word
processor?​

Answers

Answer:-

Editing refers to making quick modification to a document using editing tools such as find and replace spelling and grammar checkers,copy and paste or undo redo features. Formatting refers to changing the appearance of text in a document such as text formatting or page formatting or paragraph formatting.

write instruction to recharge mobile phone ​

Answers

1) Grab Charger
2) Plug Charger into wall outlet
3) grab your phone
4) grab cord connected to charger
5) plug end of cord into the charger port of your phone
6) wait for phone to charge

*phone will give you a notification when it’s charging and when done*

These are some instructions to recharge a mobile phone:

You need to have a phone charger.Connect your phone charger to your phone.Then connect it to the electricity.Wait for the mobile phone to charge fully.Disconnect your phone from the phone charger and the electricity.

How do you give instructions?

In this exercise, you have to give instructions to charge a mobile phone.

When you have to give instructions it is helpful to explain every action using a specific order so it is easier for the other person to understand the instructions.

Check more information about mobile phones here https://brainly.com/question/9447658

Use the drop-down menus to select the software term being described. The is what the user interacts with when operating a computer. The is the most important computer software. The is the software located within the hardware.

Answers

Answer:

1.)  A. application software

2.) C. operating system

3.) B. basic input/output system

Answer:

All of his are correct :)

Explanation:

The cost of a postsecondary education increases with the length of time involved in the program.


True

False

Answers

False it stays the same hope this helps :)

Write a java program to read an array of positive numbers. The program should find the difference between the alternate numbers in the array and find the index position of the smallest element with largest difference. If more than one pair has the same largest difference consider the first occurrence.

Answers

Answer:

int s;

int[] num= new int[s];

Scanner sc = new Scanner(System.in);

System.out.printIn("Enter array size");

size = sc.nextInt();

for (i = 0; i < s; i++){

   num[i] = sc.nextInt();

}

int[] difference;

int count = 0;

for (i = 0; i < num.length(); i= i + 2){

   if (num[i] > num[i+1]){

       difference[count] = num[i] -num[i+1];

   }else{

       difference = num[i+1] - num[i];

   }

}

int max = 0;

for (int i : difference) {

   if ( i > max){

       max = i;

   }

}

int result = Arrays.stream(difference).boxed().collect(Collectors.toList().indexOf(max);

System.out.printIn(result);

Explanation:

The Java source code uses procedural method to execute a task. The program prompts for user inputs for the array size and the items in the array. Assuming the array has an even length, the adjacent items of the array are subtracted and stored in another array called difference. The index of the maximum value of the difference array is printed on screen.

what is output? x=-2 y=-3 print (x*y+2)

Answers

Answer:

=8

Aaaaaaaaaansjxjdjsaaaaaaa

Explanation:

-2*-3=6+2=8

What is Memory Card? Explain?​

Answers

A memory card is basically a card that holds memory. The card can be removed at anytime and put into any other device. It is mainly used for extra storage and to transport videos, pictures, etc. to other devices

Hope this helps.   : )

Other Questions
what is black market Pleaseeeee helppp !!!!!!! Will mark Brianliest !!!!!!!!!!!!!! Who ran for president in 1824? I cant solve this question :( Whats 4/5 of 3 And whats 2/9 of 20 A.Specific heat capacities of three different substances are given below:SubstancesSpecific heat capacityA910 J/kg CB380 J/kg CC470 J/Kg C1.What do you mean by specific heat capacity of A is 910 J/kg C?2.Which above given substance will gain least temperature while heating equal massof all the three substances supplied with equal amount of heat? Give reason.3.Which one will go down least in depth while keeping equal mass at the threesubstances heated for the same temperature of 100 C and kept on a wax slab, why? Please help. I need help on how to explain this. The answer is 22 times but I just dont know how to explain how to get the answer. PLS HELP will give brainliest answer both Factor out the coefficient of the variable.3.4c+10.2 Let us consider the easiest sorting algorithms Maxsort. It works as follows: Find the largest key, say max, in the unsorted section of array (initially the whole array) and then interchange max with the element in the last position in the unsorted section. Now max is considered part of the sorted section consisting of larger keys at the end of the array. It is no longer in the unsorted section. Repeat this until the whole array is sorted. a) Write an algorithm for Maxsort assuming an array E contains n elements to be sorted, with indexes 0, 1,,n-1. b) How many comparisons of keys does Maxsort do in the worst case and on average? Submit source code, test cases, results, and the answers to part (b) The one who gives me the best answer will get a brainliest! Tell me about the religion Hinduism Find the valueof(3x + 3y)^2If xy = =-2 and x^2+y^2=5 The local Farm Market sells peppers at five for $2.25. Complete the rate table. iff(x)=3x+1 and f^-1= x-1/3,then f(2)= which unit contains the most different types of organisms a. species b.communityc.ecosystemd.population what is th correct chemical symbol for nitrogen Why Is hexadecimal used for memory dumpsit: The student council at Summerfield High School is making T-shirts to sell for a fundraiser, at a price of $11 apiece. The costs, meanwhile, are $10 per shirt, plus a setup fee of $141. Selling a certain number of shirts will allow the student council to cover their costs. What will the costs be? How many shirts must be sold? expanded form of 54.98 What do the lysosomes do? (check all that apply) A) clean the cellB) ship productsC) destroy foreign objectsD) provides energy for the cell