Answer:
Baiting. As its name implies, baiting attacks use a false promise to pique a victim's greed or curiosity. ...
Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. ...
Pretexting. Here an attacker obtains information through a series of cleverly crafted lies. ...
Phishing. ...
Spear phishing
Explanation:
thank me later
What are the objects in object-oriented programming language?
Answer:
An object is an abstract data type with the addition of polymorphism and inheritance. Rather than structure programs as code and data, an object-oriented system integrates the two using the concept of an "object". An object has state (data) and behavior (code). Objects can correspond to things found in the real world.
hope it helps ya mate.
g Consider a disk queue with requests for I/O to blocks on cylinders 95, 120, 41, 122, 15, 142, 65, 167. The Shortest Seek Time First (SSTF) scheduling algorithm is used. The head is initially at cylinder number 100. The cylinders are numbered from 0 (center of disk) to 199 (edge of disk). a) List the requests in the order in which they will be serviced. b) What is the total head movement (in number of cylinders) incurred while servicing these requests
Answer:
follows are the solution to the given question:
Explanation:
Please find the image file for the SSTF scheduling algorithm.
Following are the requested order:
[tex]Request \ \ order :\\\\95\\120\\122\\142\\167\\65\\ 41\\15[/tex]
Calculating the Total Head Movement:
[tex]= (100-95) + (120-95) + (122-120) + (142-122) + (167-142) + (167-65) + (65-41) + (41-15)\\\\= 5 + 25 + 2 + 20 + 25 + 102 + 24 + 26\\\\= 229[/tex]
Which term refers to a cloud-native, streamlined technology for hosting cloud-based applications, where a server runs for short bursts only when needed by an application or service
Answer:
Serverless computing.
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
Cloud computing comprises of three (3) service models and these are;
1. Platform as a Service (PaaS).
2. Infrastructure as a Service (IaaS).
3. Software as a Service (SaaS).
The three (3) main characteristics of cloud computing are;
I. Measured service: it allows cloud service providers to monitor and measure the level of service used by various clients with respect to subscriptions.
II. Resource pooling: this allows cloud service providers to serve multiple customers or clients with services that are scalable and provisional.
III. Elasticity: this is the ability of the cloud computing service to be flexible and adaptive to the traffic or requests from the end users.
Serverless computing is a term which refers to a cloud-native and streamlined technology that is designed typically for hosting cloud-based applications, in which a server operates for short bursts only when needed by an application or service. Serverless computing is used for the allocation of machine resources on demand.
Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol. If all the stations whose addresses are prime numbers suddenly become ready at once, how many bit slots are needed to resolve the contention
Answer:
11 bit slot will be needed
Explanation:
The number of prime numbers between 1 through 16
= 2, 3 , 5, 7, 11 and 13
hence we can say 6 stations are to use the shared channel
Given that all the stations are ready simultaneously
The number of bit slots that will be needed to handle the contention will be 11 bits :
slot 1 : 2, 3, 5 , 7, 11 , 13
slot 2 : 2,3, 5, 7
slot 3 : 2, 3
slot 4 : 2 . slot 5 : 3 . slot 6 : 5,7. slot 7 : 5 . slot 8 : 7. slot 9: 11,13.
slot 10 : 11. slot 11 : 13
Select the correct answer.
What should you keep in mind when picking a topic for a research paper?
ОА.
choosing a general topic
OB.
choosing a topic that is relatively new
O C.
choosing a specific topic rather than a broad one
OD. choosing a topic based on the most number of sources you can find
Reset
Next
Answer: The answer is C
Explanation: When it comes to research papers your topic shouldnt be too broad. Your topic should be broad enough you can find a good amount of information but not too focused that you can't find any information.
To launch the mail merge help dialog box, what option should you select using the Microsoft word office assistant?
Answer:
Complete setup.
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.
A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) for each entry in the list at once and send to all individuals in a database query or table.
Hence, Mail Merge is a Microsoft Word feature that avails users the ability to insert fields from a Microsoft Access database into multiple copies of a Word document.
Some of the options available in the Write & Insert Fields group of Mail Merge are;
I. Highlight Merge Fields.
II. Address Block.
III. Greeting Line.
Generally, when a user wants to launch the Mail Merge help dialog box, the option he or she should select using the Microsoft word office assistant is complete setup.
Additionally, the sequential steps of what occurs during the mail merge process are;
1. You should create the main document
2. Next, you connect to a data source
3. You should highlight or specify which records to include in the mail.
4. You should insert merge fields.
5. Lastly, preview, print, or email the document.
difference between a lesson plan and scheme of work
SORRY BUT THERE IS No difference at all
All of the following can cause a fatal execution-time error except: Group of answer choices Dereferencing a pointer that has not been initialized properly Dereferencing a null pointer Dereferencing a pointer that has not been assigned to point to a specific address Dereferencing a variable that is not a pointer
Answer: Dereferencing a variable that is not a pointer
Explanation:
The execution time also refered to as the CPU time pertaining to a given task is the time that is used by the system to execute a task.
Some of the reasons for a fatal execution-time error include:
• Dereferencing a pointer that has not been initialized properly
• Dereferencing a null pointer
• Dereferencing a pointer that has not been assigned to point to a specific address.
It should be noted that dereferencing a variable that is not a pointer doesn't cause a fatal execution-time error.
What will the declaration below do to its target?
animation-direction: reverse;
The animation steps will play backward.
The animation steps will play forward, then backward.
The animation steps will play forward.
The animation steps will play backward, then forward.
Select the correct answer.
What is the advantage of using transparencies?
O A. They support better image quality than online presentations.
O B. They are helpful when creating non-linear presentations.
OC. They allow the presenter to jot down points on the slide.
OD. They are better suited to creating handouts.
Reset
Next
Answer:
They are better suited to creating handouts
You work for a large company that has over 1000 computers. Each of these computes uses a wireless mouse and keyboard. Therefore, your company goes through a lot of alkaline batteries. When these batteries can no longer power the intended device, you must decide what to do with them. Unless otherwise dictated by your local authorities, which of the following would be the EASIEST way to deal with these batteries?
They must be sent to hazardous waste collection
a. They can be recharged.
b. They must be stored onsite until they expire
c. They can be thrown in the trash.
The answer to this question is, "They can be thrown in the trash."
Explanation: This is because it specifies how to get rid of them UNLESS local authorities have told you otherwise.
A network consists of 75 workstations and three servers. The workstations are currently connected to the network with 100 Mbps switches, and the servers have 1000 Mbps connections. Describe two network problems that can be solved by replacing the workstations' 100 Mbps switches and NICs with 1000 Mbps switches and NICs. What potential problems can this upgrade cause
Answer:
A) i) starvation ii) flow control
B) Network congestion
Explanation:
A) Network problems that can be addressed / solved
By replacing the workstations 100 Mbps switches with 1000 Mbps switches the problem of
Starvation; been faced by the servers due to the delay in sending data to be processed by the servers from the workstations will be resolved .
Flow control : The huge difference in the speeds of the workstations and servers causes a network buffer which leads to packet loss therefore when the workstations 100 Mbps switch is replaced with 1000 Mbps switch this network problem will be resolved
b) The potential problem that can be encountered is Network Congestion
How have technology and social media changed reading?
O A. Physical books can only be read on the web.
B. Now reading is a conversation of give and take.
O C. People no longer have to read anything at all.
D. Reading often takes much longer to undergo.
Answer:
B?
Explanation:
I'm super sorry if I get this wrong for you but after thinking so much I probably think it would be B
Answer:
the guy above is right it is B
Explanation:
because 2+2=4
Which of the following tools helps ensure your document will open in older versions of word
Answer:
Compatibility Check
Explanation:
Select File > Info.In the Inspect Document section, select Check for Issues > Check Compatibility.Click Select versions to show. A check mark that appears next to the name of the mode that the document is in.(2) What are the limitations of portable computer?
Answer:
Most portable computer are not upgradable and they have a lower specification than most desktop systems
Write a program that will create an array of random numbers and output the values. Then output the values in the array backwards. SPECIFICATIONS: File name: ArrayBackwards.java Your program must make use of at least one method other than main()to receive full credit (methods can have a return type of void). Suggestion: create and populate the array in the main() method. Make a method for Step 3 below and send in the array as a parameter. Make another method for Step 4 and send in the array as a parameter.
Answer:
The program is as follows:
import java.util.*;
public class Main{
public static void backward(int [] Rndarray, int lnt){
System.out.print("Reversed: ");
for(int itm = lnt-1;itm>=0;itm--){
System.out.print(Rndarray[itm]+" "); } }
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int lnt = input.nextInt();
Random rd = new Random();
int [] Rndarray = new int[lnt];
for (int itm = 0; itm < lnt; itm++) {
Rndarray[itm] = rd.nextInt();
System.out.print(Rndarray[itm]+" ");
}
System.out.println();
backward(Rndarray,lnt); }}
Explanation:
This defines the backward() method
public static void backward(int [] Rndarray, int lnt){
This prints string "Reversed"
System.out.print("Reversed: ");
This iterates through the array
for(int itm = lnt-1;itm>=0;itm--){
Each element is then printed, backwards
System.out.print(Rndarray[itm]+" "); } }
The main begins here
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
This gets the array length
int n = input.nextInt();
This creates a Random object
Random rd = new Random();
This declares the array
int [] Rndarray = new int[lnt];
This iterates through the array for input
for (int itm = 0; itm < lnt; itm++) {
This generates a random number for each array element
Rndarray[itm] = rd.nextInt();
This prints the generates number
System.out.print(Rndarray[itm]+" ");
}
This prints a new line
System.out.println();
This passes the array and the length to backward() method
backward(Rndarray,lnt); }}
Implement a class Rectangle. Provide a constructor to construct a rectangle with a given width and height, member functions get_perimeter and get_area that compute the perimeter and area, and a member function void resize(double factor) that resizes the rectangle by multiplying the width and height by the given factor. (Page EX9-3).
//class declaration
public class Rectangle{
//declare the instance variables - width and height
double width;
double height;
//the constructor
public Rectangle(double width, double height){
//initialize the width of the rectangle
this.width = width;
//initialize the height of the rectangle
this.height = height;
}
//method get_perimeter to compute the perimeter of the rectangle
public double get_perimeter(){
//compute the perimeter
//by using the formula 2(width + height)
double perimeter = 2*(this.width + this.height);
//return the perimeter
return perimeter;
}
//method get_area to compute the area of the rectangle
public double get_area(){
//compute the area
//by multiplying the width and height of the rectangle
double area = this.width * this.height;
//return the area
return area;
}
//method resize to resize the rectangle
public void resize(double factor){
//resize the width of the rectangle
//by multiplying the width by the factor
this.width = this.width * factor;
//resize the height of the rectangle
//by multiplying the height by the factor
this.height = this.height * factor;
}
} //end of class declaration
Explanation:The code above has been written in Java. In contains comments explaining every part of the program.
what is polymerization1
Answer:
Polymerization, any process in which relatively small molecules, called monomers, combine chemically to produce a very large chainlike or network molecule, called a polymer. The monomer molecules may be all alike, or they may represent two, three, or more different compounds.please give me brainliest~❤︎ت︎8. (a) Write the following statements in ASCII
A = 4.5 x B
X = 75/Y
Answer:
Explanation:
A=4.5*B
65=4.5*66
65=297
1000001=11011001
10000011=110110011(after adding even parity bit)
X=75/Y
89=75/90
10011001=1001011/1011010
100110011=10010111/10110101(after adding even parity bit)
write a program that takes as input a number of kilometers and prints the corresponding number of nautical miles.
Answer:
try this
Explanation:
km = float(input('Kilometers: '))
nm = (km * 5400) / 10000
print('%0.4f km = %0.4f Nautical Miles' %(km,nm))
Why do organizations need to tailor project management concepts, such as those found in the PMBOK® Guide, to create their own methodologies?
Explanation:
Although each project is different and unique, according to the Method Statement of PMBoK, customising is required. Not that every procedure, tool, methodology, input, or output listed in the PMBoK Guide is mandated for every project. Scope, timeline, cost, materials, quality, and danger should all be considered while tailoring.
You designed a program to create a username using the first three letters from the first name and the first four letters of the last name. Usernames cannot have spaces. You are testing your program with a user whose name is Jo Wen. What step in the program plan do you need to revisit
Answer:
See Explanation
Explanation:
The question would be best answered if there are options to select from; since none is provided, I will provide a general explanation.
From the question, we understand that, you are to test for Jo Wen.
Testing your program with this name will crash the program, because Jo has 2 letters (3 letters are required), and Wen has 3 letters (4 letters are required)
So, the step that needs to be revisited is when the username is generated.
Since the person's name cannot be changed and such person will not be prevented from registering on the platform, you need to create a dynamic process that handles names whose lengths are not up to the required length.
If the user enters any operator symbol other than , -, *, or /, then an UnknownOperatorException is thrown and the user is allowed to reenter that line of input. Define the class UnknownOperatorException as a subclass of the Exception class. Your program should also handle NumberFormatException if the user enters non-numeric data for the operand.
Answer:
Explanation:
The following code is written in Java. It creates the UnknownOperatorException class and catches it if the user enters something other than the valid operators. If so it continues asking the user for a new input. Once a valid operator is entered, it exits the function and prints the operator.
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
char symbol = askForOperand();
System.out.println("Operand: " + symbol);
}
public static char askForOperand() {
Scanner in = new Scanner(System.in);
try {
System.out.println("Enter operator symbol: ");
char symbol = in.nextLine().charAt(0);
if ((symbol != '-') && (symbol != '*') && (symbol != '/')) {
System.out.println(symbol);
throw new UnknownOperatorException();
} else {
return symbol;
}
} catch (NumberFormatException | UnknownOperatorException e) {
System.out.println("Not a valid operand");
char symbol = askForOperand();
return symbol;
}
}
}
class UnknownOperatorException extends Exception {
public UnknownOperatorException() {
System.out.println("Unknown Operator");
}
}
PLEASE HELP ASAP!!
This command allows you to duplicate text from one part of a document while keeping the original text.
Cut
Copy
Format
Paste
Answer: CTRL + C or copy and paste
Explanation: to copy and paste highlight text by dragging mouse or clicking on touchpad and holding over selected text, if not on a computer but on a touch screen device ( ex: Phone, iPad etc) hold down until it is blue use the tear drops from the top and bottom to highlight the text you need. Then hold down the blue area until options come up stop holding and select copy and then go to where you want to put the text and hold down again and select paste. If on computer drag cursor over text while holding down on left click or holding down on touchpad, it will highlight light blue then left click or click on the touchpad with both fingers and repeat the process of copying and pasting as said before.
Hope this helps! :)
Select all phrases that describe a server-based network. centralized network security easy to expand log-ins controlled by central server unlimited number of users network resources stored on individual workstations
Answer:
Client Server Network ... is the central computer that enables authorized users to access networked resources ... computers in this type of network are connected to a central hub ... why might a business choose a server based network (3) ... 2) easier to expand ... external hardware connected to and controlled by a computer.
Explanation:
Answer
Explanation:
what the other person said
Which statement describes Augmented Reality (AR) technology?
Answer:
Augmented Reality (AR) superimposes images and audio over the real world in real time. It does allow ambient light and does not require headsets all the time.
yan po ang szgot
wala po kasi pagpipilian
HOPE IT HELPS
pls follow ke
What does the top-level domain in a URL indicate?
A. the organization or company that owns the website
B. the organization or company that operates the website
C. the protocol used to access the website D. the type of website the URL points to
Answer:
b i think
Explanation:
A top-level domain (TLD) is the last segment of the domain name. The TLD is the letters immediately following the final dot in an Internet address. A TLD identifies something about the website associated with it, such as its purpose, the organization that owns it or the geographical area where it originates.
Answer:
The answer is D. The type of website the URL points to.
Explanation:
I got it right on the Edmentum test.
what is the value of 2020/20×20
Answer:.5.05
Explanation:...maths
Answer:
5.05
Explanation:
2020/400= 5.05
HOPE IT HELPED AND GOOD LUCK!!
Imagine running a 64-bit system on a 32-bit system, where we simulate a single 64- bit memory location (register) using two atomic 32-bit memory locations (registers). A write operation is implemented by simply writing the first 32-bits of the simulated 64-bit register in the first real register, then the second 32-bits in the second real register. A read, similarly, reads the first half from the first register, then the second half from the second register, and returns the concatenation. What is the strongest property that this 64-bit register satisfies: safe, regular, or atomic
Answer:
It's not possible to ensure memory access occurs indivisibly when it has to broken into multiple operations. Unfortunately, the fact that your application is running on a 64-bit kernel does not change the equation any - it is actually running in a compatibility layer and has none of the benefits of x64
Explanation:
Consider the following sequence of page references: 1 2 3 3 4 4 1 4 1 3 4. Determine how many page faults will occur with LRU(Least Recently Used) for each of the following algorithms, assuming there are only 2 physical page frames and that both are initially empty.
Answer:
7 page faults
Explanation:
I have created a small Java program that can be seen in the attached picture below. This Java program uses an LRU algorithm in order to find the number of page faults within an array of page references from the references given in the question. Using these references, and the java program we can see that there are a total of 7 page faults. This can be seen in the output highlighted by red in the picture below.