The form of wireless attacks is she defending against is Hijack .
Hijack attack on a system?Cyber hijacking is a term that is also called computer hijacking. This is known to be a type of network security attack where the attacker often have full control of computer systems, software programs and others.
Due to the attack, the company or firm cannot have control over their system and as such the engineer in the above firm is defending against is Hijack.
The options are below
What form of wireless attack is she defending against?
Eavesdropping Insertion Hijack ReplayLearn more about Hijack from
https://brainly.com/question/23294592
Dante has a worksheet shared with multiple users. He would like the ability to approve or reject changes that are made. Which feature should he use? Protection Change Tracking Comments Data Consolidation
Answer:
Data Consolidation.
Explanation:
Answer:
Change tracking.
Explanation:
It's the only one of the options that tracks anything.
what is the use of form in HTML
Answer:
to make the internet faster
Explanation:
becuase it will have a faster act on the computer so the computer could process the information for it later to be used
Which of the following is NOT true about an entrepreneur?
Answer:
A. An entrepreneur gets to act as his own boss.
Please give crown award and thanks.
How can a Word user insert a page break into a document to isolate a table on a new page? Use the drop-down
menus to complete the statements.
1. Place the v at the text that needs editing.
2. Open the
dialog box
3. Select the
v tab.
4. Choose
5. Click OK
How can a Word user insert a page break into a document to isolate a table on a new page? Use the drop-down menus to complete the statements.
1. Place the
✔ cursor
at the text that needs editing.
2. Open the
✔ Paragraph
dialog box.
3. Select the
✔ Line and Page Breaks
tab.
4. Choose
✔ Page break before
.
5. Click Ok.
A Word user can insert a page break into a Word document to enable the insertion of a table on the new page by following these steps.
Place the cursor at the text that needs to be edited. Open the paragraph dialog box Select the line and page breaks tab. Choose page break Click OK.
Thus, following these mentioned steps will enable the Word user to correctly insert a table on the required Word page.
Learn more about inserting page breaks on Word documents at https://brainly.com/question/1267739
Write a program to construct the first 15 terms of a geometric sequence with initial term 4 and a common ratio 1/2. The output should be a python list and the number should be rounded to 5 digits after the decimal places.
The program to construct the first 15 terms of a geometric sequence with initial term 4 and a common ratio 1/2 is as follows:
def geometric(a, r):
list_of_terms = [a]
length = 0
n = 2
while length < 14:
x = round(a*pow(r, n-1), 5)
length += 1
n += 1
list_of_terms.append(x)
return list_of_terms
print(geometric(4, 0.5))
Code explanationThe code is written in python.
we defined a function named geometric. The function accept two parameters as a(first term) and r(common ratio).we declared a variable "list_of_terms" and store the first term in it. Then we initialise length to zeroThe number of term start from 2.While the length variable is less than 14, we use the geometric formula to find the terms by increasing the value of n in the loop.We append the terms to list_of_terms.Then return the list_of_terms.Finally, we call the function with the parameters.learn more on python here: https://brainly.com/question/26949234
Plzzzzzzz help good answers only and best answer gets brainly
Answer:
Desmos (colab w/h math antics) , Calendar, Quizlet (colab w/h google) , Quizizz (colab w/h quizlet) , Kahoot (colab w/h google) , or Google Translate
Suppose that the WEQ scheduling policy is applied to a buffer that supports three classes, and suppose the weights are 0.5, 0.25, and 0.25 for the three classes. Suppose that each class has a large number of packets in the buffer. In what sequence might the three classes be served in order to achieve the WFQ weights?
Answer:
The WFQ (Weighted Fair Queuing) scheduling is a circular order a round roubin strategy in ascending order depends on weights.
Assume the three classes weights are 0.5, 0.25, and 0.25 respectively.
If same weight have for two or more classes then give highest order is the first preference class.
The sequence order that the three classes served is :1 2 1 3 1 2 1 3….
Another possible sequence order that the three class are: 1 1 2 1 1 3 1 1 2 1 1…
Explanation:
What are programs that organize, analyze, and graph numeric data such as budgets and financial reports.
Database policies should be created and implemented by all organizations, regardless of the ________ of the organization.
Database policies should be created and implemented by all organizations, regardless of the size of the organization.
What are database policies?A database is a large collection of data that has been formatted to fit a certain standard. Database policies are law, enacted to protect usage of data by an individual, firms or governments.
The advantages of using a database would be that the information found there has been selected by experts in the field, while it also includes scholarly information that has been published or presented for review.
Hence, database policies should be created and implemented by all organizations, regardless of the size of the organization.
Learn more about database policies here: https://brainly.com/question/379106
Alice has an item x and Bob has a set of five distinct items y1, y2, y3, y4 and y5. Design a protocol through which Alice (but not Bob) finds out whether her x equals any of Bob's five items; Alice should not find out anything other than the answer ("Yes" or "No") to the above question, and Bob should not know that answer or any secret from Alice. Do not use a hash-based solution because even though the probability of a colission is small, Alice requires that no such colission can occur (but using encryption is fine, because in that case two distinct items that are encrypted with the same key will result in two different ciphertexts).
NOTE: THE SOLUTION FOR THIS SHOULD BE MATHEMATICALLY EXACT.
The protocol shows that the items of Alice = {x} and the items of Bob = {y1, y2, y3, y4, y5}
How to depict the protocolThe ways to design the protocol will be:
Alice will get Bob's public key.Alice will send a communication to Bob encrypted through Bob's community key.Bob's motivation has a clandestine key.Through the top-secret key, Bob will try to work out the communication.Bob will give a response called yes or no.Bob doesn't know what substances are with Alice.If Alice Alice gets any of the responses as yes then Alice's item is equivalent to any of Bob's five items.If Alice's items are not equal to Bob's items then Alice will get a response as no.It should be noted that protocol is important for relaying datagrams across the network boundaries.
Learn more about protocol on:
https://brainly.com/question/17062016
BRAINLIEST AND 50 POINTS PLEASE AND FAST FAST FAST FAST FAST!!!!!!
What are three things that the use of color on a website do?
Answer: Colors can attract the attention of others, create the environment for a website, and it has an impact on how people feel about that website. When you dig into the psychology part of it, there is a variety of different things you can do with color on a website.
What is the significance of backing up data on a computer?
Backing up data allows you to browse the Internet more quickly.
Your computer will never become infected with a virus.
A copy of your work can be saved in case the computer crashes.
The web cache will be cleared regularly.
Answer:
the answer is c
Explanation:
i got it right
Answer:
c
Explanation:
edg2020
Compare and contrast frame header to internet protocol header.
A Frame Header is known to have the source and the destination addresses of all the frame and the control bytes while the IP header is known to be the header information at the start of an Internet Protocol packet.
The IP packets is made up of a header that is used for addressing and routing.What is IP header?This type of header is known to have the source address and the destination address. IP is known to be one that uses an Internet datagram that has all the information that are the same to the physical frame.
A frame is regarded as the unit of transmission that is found on a link layer protocol. It is made up of a link layer header that is known to be followed by a packet.
Learn more about IP header from
https://brainly.com/question/4297610
PLEASE HURRY!!!!
What will be the output of the following program? Assume the user responds with a 2.
answer = input ("How many books would you like? ")
priceBook = 3.20
intNumberBooks = float(answer)
moneyDue = intNumberBooks * priceBook
print ("You owe $", moneyDue)
A) You owe $ 6.40
B) An error occurs.
C) You owe $6.40
D) You owe $moneyDue
Answer:
A or C (depends on your programming language)
Explanation:
When someone replies to the input, "answer" is set to a string containing their reply -- in this case, 2. intNumberBooks is set to the floating-point value of "answer" (which is actually strange, since "int" implies an integer). So if the user responds with 2, intNumberBooks = 2. moneyDue then is set to the price times the number of books:
moneyDue = 2 * 3.20
So it will print moneyDue of $6.40. Whether the answer is A or C, though, depends on the programming language you're using -- I can't tell whether it will print a space after the $ or not, unfortunately.
The output of the given program if assuming the user responds with a 2 is You owe $6.40. The correct option is A.
What is the output?Data input is required for programs. The program uses (processes) this data, and as a result, data (or information) is output. Any information that a program or other electronic device processes and sends out is considered its output. The output is anything that can be seen on the computer screen, such as the words you type on the keyboard.
When someone responds to an input, the floating-point value of "answer" in number books is set to a string expressing their response, in this case, 2.
Therefore, if the user replies with 2, the money owing is set to the price multiplied by the number of books:
Money Due = 2 x 3.20 = $6.40
Therefore, the correct option is A. You owe $ 6.40.
To learn more about output, refer to the below link:
https://brainly.com/question/28903099
#SPJ5
Why is computer called diligent machine?
[tex]\huge\bold\green{Answer:-}[/tex]
Diligence: - It is a characteristic of computer. Computers can work for many hours continuously without taking any rest and without decreasing its speed, accuracy and efficiency. It is free from tiredness,lack of concentration, fatigue etc.2)Versatile: -Computer is a versatile machine which can do varieties of task such as simple calculation to a complex and logical operation. It is used in various fields for various purposes.
Computer are persistent and power to do work for hours without tiredness and fatigue with same level of accuracy. That is why Computers are called diligent.
ʜᴏᴘᴇ ɪᴛ ʜᴇʟᴘꜱ❤CAR_SALE (Car_no, Date_sold, Agent_no, Commission_pct, Discount_amt)
Assume that a car may be sold by multiple agents, and hence {Car_no, Agent_no} is the primary key. Therefore, a single car sale may occupy multiple tuples.
Additional dependencies are:
Date_sold → Discount_amt and
Agent_no → Commission_pct
Based on the given primary key, is this relation in 1NF, 2NF, or 3NF? Why or
why not? How would you successively normalize it completely? Provide reasoning for each normalization.
1NF
In 1NF the relation should follow atomicity that means no repeating groups
In the relation there is no repeating groups
So
the relation is in 1NF
2NF
In 2NF, the relation should be in 1NF and each non prime
attribute must depend on primary key and No Partial dependency
Commission% is functional dependent on Salesperson# which is only part of the primary key.
So
relation is not in 2NF
3NF
In 3NF, the relation should be in 2NF and any NON prime attribute should not describe any non prime attribute.
Already we know relation is not in 2NF
there is a non prime attribute date_sold that describe another non prime attribute Discount_amt,
the relation is not in 3NF
Finally we come to. Know
the relation satisfies only 1NF
NORMALIZATION
The relation is not in 2NF
Decompose the relation CAR_SALE
CAR_SALES (Car#, Date_sold, Salesperson#, Discount_amt)
SALESCOMM (Salesperson#, Commission%)
CAR_SALES and SALESCOMM are in 2NF
In 3NF, the relation should be in 2NF and any NON prime
attribute should not describe any other non prime attribute
SALESCOMM relation is in 3NF
but CAR_SALES is not in 3NF the reason is that there is a
non prime attribute Date_sold that describes another non prime attribute Discount_amt.
So, decomposing the relation
CARSALEDATE (car#, salesperson#, Date_sold)
DATEDISS(Date_sold, discount_amt)
The relations CARSALEDATE
SALESCOMM
DATEDIS are in 3NF
write a program that accepts three decimal numbers as input and outputs their sums?
Answer:
The answer to this question is given below in the explanation section
Explanation:
The code is written in C++ language:
// Example program
#include <iostream>
#include <string>
using namespace std;
int main()
{
double number [3];
double addition=0;
for (int i=0;i<3;i++)
{
cout<<"Enter decimal number at position " <<i+1< " ";
cin>>number[i];
addition= addition+ number[i];
}
cout<<"The addition is "<<addition;
}
Last week, a disk containing CSM Tech Publishing’s current project manuscripts crashed. Fortunately, there was a backup, but all files that had been added or changed that day were lost. A new disk had to be purchased for overnight delivery, and the data had to be restored. Several days of work were lost. The owner of CSM Tech wants to know what can be done to prevent the loss of data and time if a disk crashes in the future. The server currently has two disks installed: one for the Windows boot and system volumes and one for manuscript files. The disk used for manuscript files is about one-third full. There’s enough money in the budget to purchase up to two new drives if needed. a. What solution do you recommend, and why?
Answer:
They should go for cloud based model
Explanation:
Cloud based model should be sort after because with such a model there can be a restoration of contents in just a little period of time. As for the usage, payments can be done. They would have highly packed response time, turn around time and also provide information security. At a go, there is flexibility in terms of storage and information retrieval. This may be more costly though but it would be helpful for data recovery without requiring physical data transmission
In order to share resources, Windows devices must be part of
In order to share resources, Windows devices must be part of a workgroup called WORKGROUP.
Are resources shared in a network?In computing, we often shared resource, or network. This is known to be when a computer resource is said to be made available to people from one host to other hosts and this is usually done on a computer network.
Note that Advanced Sharing is said to be a way of sharing resources in Windows as it helps one to have a detailed customization of the way one what to do the sharing.
Learn more about Windows devices from
https://brainly.com/question/26420125
Explain the schema to be followed when solving a dp problem
Answer:
Every Dynamic Programming problem has a schema to be followed: Show that the problem can be broken down into optimal sub-problems. Recursively define the value of the solution by expressing it in terms of optimal solutions for smaller sub-problems. Compute the value of the optimal solution in bottom-up fashion.
Whats is a better game?
Answer:
The first two are the best ones I see here, because I play them. Not sure how else to say that. Please make sure to also use brainly for school, though. Thanks!
You use utility software to_____. Select all that apply.
A play video games
B reformat a hard disk drive
C manage fonts on a computer
D write and edit documents
Utility software is system software designed to help analyze, configure, optimize or maintain a computer. Utility software usually focuses on how the computer infrastructure (including the computer hardware, operating system, software and data storage) operates.
You use utility software to:
Reformat a hard disk drive.Manage fonts on a computer. What are utility software used for?Utility software are known to be a kind of software that is often used to configure and maintain any system.
Conclusively, Note that this software is made up of small programs which can be used to Reformat a hard disk drive and also to Manage fonts on a computer.
Learn more about utility software from
https://brainly.com/question/20659068
_______________involves engineers building up a 3D geometry piece by piece.
2D sketches turn into 3D features, with constraints and relations duly applied to fit the designer’s intent.
Answer:
Parametric design involves engineers building up a 3D geometry piece by piece. 2D sketches turn into 3D features, with constraints and relations duly applied to fit the designer's intent.
Explanation:
Hope this helps
Find 10 real world challenges and their corresponding solutions
Answer:
Climate Change - Save energy at home, Walk, cycle or take public transport
Health Care - Focus on Patient Engagement.
Violence - Take all violence and abuse seriously.
Homelessness - A Coordinated Approach. To end homelessness, a community-wide coordinated approach to delivering services, housing, and programs is needed
Food Insecurity - Reduce Food Waste
Education Problem - Adoption of technology. Effective use of technological tools in teaching has many benefits.
Pollution- Reduce the number of trips you take in your car and reduce or eliminate fireplace and wood stove use.
Unemployment - Change in industrial technique.
Government Corruption - expose corrupt activities and risks that may otherwise remain hidden.
Malnourishment & Hunger - Food Donations, transitioning, and urban Farming
Explanation:
Typing into a text _____
allows a user to place text on a slide without attaching the text to a visual object.
Answer:
box
Explanation:
From analysis, Arthur believes the system's I/O throughput will improve by changing the I/O scheduler. On his system is a real-time application, which uses a database located on a solid-state drive. Which I/O scheduler should Arthur choose?
Since the real-time application uses a database that is located on a solid-state drive, Arthur should use a deadline I/O scheduler.
What is an I/O scheduler?An I/O scheduler is an abbreviation for input-output scheduler and it can be defined as a technique which is used by the operating system (OS) of a computer to decide the particular order that input-output (I/O) operations are submitted to storage volumes such as solid-state drives.
In this scenario, Arthur should use a deadline I/O scheduler because his real-time application uses a database that is located on a solid-state drive.
Read more on data here: brainly.com/question/13179611
5.16 *zyLab: Hello IDE The goal of this problem is learn how to use Eclipse or IntelliJ. Submit the source code files (.java) below. Make sure your source files are encoded in UTF-8. Some strange compiler errors are due to the text encoding not being correct. Complete the following: In your chosen IDE, create a new project. You can name the project anything you like, we recommend "M5". Create a new class file, titled HelloIDE (which will create the file HelloIDE.java). Write a main method in this class that prompts a user for their name, and then replies with "Hello, ___!" filling in the blank with the typed in name, trimmed. Otherwise, if the string is empty, or just contains only whitespace, or if no input is given, output "Hello, stranger!". Example input/output for input "Mark":
Answer:
import java.util.Scanner;
public class HelloIDE
{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Enter your name: ");
String name = input.nextLine();
name = name.trim();
if(name.equals(""))
name = "stranger";
System.out.println("Hello, " + name + "!");
}
}
Explanation:
import the Scanner class to be able to get input from the user
Create an object of the Scanner class called input
Ask the user to enter the name and set it to the name
Trim the name using trim() method, removes the whitespaces from the string
Check the name. If name is equal to "", set the name as stranger. This way if the name is empty, or just contains whitespaces or if name is not given, name will be set as stranger.
Print the name in required format
Select the correct option that shows a function in F# that receives a list of integers and returns the average value all its elements as a float.
a. let averageList list = List.fold (fun acc elem -> acc + elem) 0 list / float list.Length
b. let averageList list = List.map (fun (acc,elem) -> acc + float elem) 0 list / list.Length
c. let averageList list = List.map (fun acc elem -> acc + elem) 0 list / list.Length
d. let averageList list = List.filter (fun (acc,elem) -> acc + elem) 0.0 list / float list.Length
e. let averageList list = List.fold (fun acc elem -> acc + float elem) 0.0 list / float list.Length
Answer: acc
Explanation:
A template is usually opened by
O clicking on a slide's thumbnail and choosing a template in the Design tab gallery.
O opening the Design tab and then right-clicking on a thumbnail in the gallery and selecting Apply to All Slides.
O clicking on New under the File tab and then selecting a thumbnail from the Templates gallery.
O opening the File tab and then right-clicking on Save As and selecting Apply to All Slides after picking a template.
Answer:
A
Explanation:
Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.045) / 12.
Ex: If the input is 200000 210000, the output is:
This house is $200000. The change is $-10000 since last month.
The estimated monthly mortgage is $750.0.
Answer:
here is the answer
Explanation:
current_price = int(input("Enter the current price: "))
last_months_price = int(input("Enter the last month's price: "))
print("Current price is: " + str(current_price) + ", Last month's price was: " + str(last_months_price))
print("The change since last month is: " + str(current_price - last_months_price))
print("The estimated monthly mortgage is: " + str(current_price * 0.051))
Get the inputs for the current price and last month's price
Print the prices
Calculate and print the change, current_price - last_months_price, since last month
Calculate, using given formula, and print the estimated monthly mortgage
Enter("Enter the current price: ") current price = int, enter("Enter the last month's price: ") last months price = int.
What is Program?The price last month was: " + str(last months price) and the current price is: " + str(current price) + ".
print("The difference from the previous month is: " + str(current price - last months price)). print("The approximate mortgage payment is: " + str(current price * 0.051))
Obtain the inputs for the price today and the price last month.
Therefore, Enter("Enter the current price: ") current price = int, enter("Enter the last month's price: ") last months price = int.
To learn more about program, refer to the link:
https://brainly.com/question/3224396
#SPJ2