Traffic flow analysis is classified as which?
A)Masquerade attack
B) passive attack
C)origin attack
D) active attack

Answers

Answer 1
the answer should be A : Masquerade Attack

Related Questions

Podcasts can only be created by professional organizations

Answers

Answer:

This is FALSE

Explanation:

Have you heard that a person with a successful Podcast makes a 6 figure income, every month? The good news is that the barriers for starting a Podcast is very low. You don't even need technical skills to start a Podcast. The only thing that may hold you back is that it is not easy making a successful Podcast that will pay you well.

The statement that Podcasts can only be created by professional organizations is false.

For better understanding, we have to understand what the term podcast means and why the answer is false.

Podcast is simply known to be different types of electronic or digital media files usually in audio or video format made available for download usually by syndication. Podcasting is usually done by anyone and it is made available anywhere at anytime to anyone who wants it.

From the above, we can therefore say that the answer that the statement that Podcasts can only be created by professional organizations is false is therefore right.

Learn more about podcast from:

https://brainly.com/question/22263594

WHY ARE APARTMENTS CALLED APARTMENTS IF THEY ARE TOGETHER LOL

Answers

Answer:

cause architects are weird

Explanation:

Explanation:

Cause apartments is apartments so therefore its called apartments

When cropping a picture to shape, you can only turn it into a square or circle.
Select one:
O True
O False

Answers

I believe the answer is false
the answer is false!! .

Fill in the blank with the correct response.
The FTP client component of a full-featured HTML editor allows you to synchronize the entire

Answers

Answer:

File structure.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.

The file transfer protocol (FTP) client component of a full-featured HTML editor allows you to synchronize the entire file structure. Therefore, when you wish to share your entire html document over a network server such as a FTP client, you should use a full-featured HTML editor.

Which programming languages is best for game development? ​

Answers

Answer:

JavaScript. .

HTML 5.

SQL.

Python. .

Explanation:

hold it helps◕‿◕

Liquid-liquid extraction is best suited to separate a mixture of compounds when:
A. The mixture contains compounds with similar polarities but different solubilities.
B. The mixture contains compounds with similar solubilities but different molecular weights.
C. The mixture contains compounds with similar melting points but different polarities.
D. The mixture contains compounds with similar molecular weight but different polarities.
E. The mixture contains compounds with similar molecular weight but different melting points.

Answers

Answer:

A. The mixture contains compounds with similar polarities but different solubilities.

Explanation:

Liquid – Liquid (LLE) extraction is a process for the isolation of compounds or metal complexes, also known as solvent extraction and partitioning, based on their relative solubility in two distinct liquids, generally water- (polar) liquids and an organic solvent (non-polar). Net transition from a liquid to a liquid process of one or more species, normally from aqueous to organic.

Is the ability to choose the start and finish times, but they must complete a full day’s work

Answers

yes ma’am , can of spam. what she said up there ^*

What are the best legendary pokemon?

Answers

PICACHU PICACHUUUUUUUUUU

Answer:

Any EX

Any GX

Pikachu

Raichu

Mew Two

Charizard

Taurus

Gumshoos

Lurantis

Lapras

Incineroar

Dialga

Guzzlord

Lugia

Darkrai

Sigilyph

Xerneas

Explanation:

There are more but it takes a little while to get them all


Change the following sentences using 'used to
a. We went to school together.
b. How did you spend the winter evenings?
c. We had our milk delivered.
d. I was in love with him.
e. At one time there were trees in the garden.

Answers

Answer:

a. We used to go to school together.

b. How did you use to spend the winter evenings?

c. We used to have our milk delivered.

d. I used to be in love with him.

e. At one time there used to be trees in the garden.

difference between general purpose register and segment register​

Answers

Explanation:

General purpose registers are the registers which you can use for data manipulation. They donot have specific purpose. ... If you put data in them the functionalities in the microcontroller or processor will change. For example, TMOD is a special purpose register

hope it helps you

Answer:

general purpose register are register which you can use for data manipulation. they do not have specific purpose to control program process and ccr (condition code register). to test condition

segment register

the segment register stores the starting addresses of a segment. and offset value or displacement is required

pls marks branilist i am new student in brainly.com

~Trivia~

Harry Potter Edition

Answer All Correct For Brainliest



What house does Harry Potter belong to in Hogwarts? __________________

What position does Harry Potter play in Quidditch? _____________________

Who is Fluffy? __________________

What does the Imperius Curse do? ___________

Answers

Answer:

What house does Harry Potter belong to in Hogwarts? Gryffindor __________________

What position does Harry Potter play in Quidditch? Seeker _____________________

Who is Fluffy? Hagrid's old cerberus __________________

What does the Imperius Curse do? ___________ places cursed under sorcer's control

Explanation:

I would like to thank SWANGOADRIANA for this answer and the ten points.

If the message portion of a frame contains 640 bits, SDLC has a beginning flag (8 bits), an address (8 bits), a control field (8 bits), a frame check sequence (assume we use a CRC-32 with 32 bits), and an ending flag (8 bits). Calculate the efficiency of this synchronous transmission and complete TE1. Next, calculate the efficiency using a frame that contains 720 bits with the same overhead and complete TE2. Which one is more efficient

Answers

Answer:

The same basic formula can be used to calculate the efficiency of synchronous transmission. For example, suppose we are using SDLC. The number of information bits is calculated to help you determine how many.

Explanation:

Instructions:Emotet is an advanced banking Trojan that primarily functions as a downloader of other Trojans. According to the Symantec Internet security threat report, Emotet first emerged in 2014 and, after a quiet period, reappeared to make waves in the second half of 2017. Emotet again made headline news when it was used in more attacks in late 2019. In this activity, you will do some research and answer the following questions about Emotet.Note:Include references to support each of your answers, such as the book, news article, or website you collected the information from. Only answers with references will receive points.1. [10 points] Explain how the malware spread itself. In particular, do you think its spreading mechanism is like a worm or a virus? Justify your answer. (4-6 sentences)2. [10 points ] Explain the concealment mechanisms employed by Emotet. (3-6 sentences)3. [10 points ] Explain how Emotet communicates with a command and control (C&C) server? (4-6 sentences)

Answers

I don’t understand your question could you explain it better ?

Pulling out specific differences


Answers

Answer:

Terms in this set (24) abstraction. Pulling out specific differences to make one solution work for multiple problems. algorithm. A list of steps to finish a task. binary. A way of representing information using only two options. bug. code. command. computational thinking. conditionals.

Activity #2
1. Write the formula in getting the sum of these two numbers:
16 and 25; 16 is in cell B2 and 25 is in cell B3.
Answer:
2. Write the multiplication formula of these two numbers:
8 and 10; 8 is in cell C4 and 10 is in cell C5.
Answer:
3. Write the formula in dividing these numbers:
20 and 5 : 20 is in cell F2 and 5 is in cell F3.
Answer;​

Answers

Answer:

1. sum(B2,B3) , OR =B3+B2

2. =C4*C5

3. =F2/F3

Explanation:

Use the = operator to do any basic math using numbers or the respective cells. each also have respective functions as shown first in problem 1.

write a statement if iVal is assigned 5 and fVal is assigned 2.4

Answers

Answer:

print("i="+str(iVal)+" f="+str(fVal))

Explanation:

Given

[tex]iVal = 5[/tex]

[tex]fVal = 2.4[/tex]

See attachment

Required

Write a statement that outputs i=5 f=2.4

From the output format, the following should be noted.

- i = and f= are string literals, so they will be in double quotes in the print statement

- 5 and 2.4 represent the values of iVal and fVal respectively

- We will make use of + (concatenation operator) to concatenate all data to be printed

So, the print statement (in Python) is:

print("i="+str(iVal)+" f="+str(fVal))

The function of the str keyword as used above is to convert iVal and fVal to string values, so that the print statement will be executed without error

Disscuss how you would
advise a female student
in your community to study
and practice automotive
technology

Answers

Answer:

You have to say that they can do everything

they are equal with everyone else.

You have to advice them they can do it again and again

I THINK SO IT IS LIKE THAT

Which options can be used for totaling numbers?

Answers

Which options can be used for totaling numbers?

Discuss the important role of remote sensing application in agriculture. Do you think that the use of remote sensing is applicable in the Philippines scenario? Why? Give some of the pros and cons of remote sensing.​

Answers

Answer:

Remote sensing gives the soil moisture data and helps in determining the quantity of moisture in the soil and hence the type of crop that can be grown in the soil. ... Through remote sensing, farmers can tell where water resources are available for use over a given land and whether the resources are adequate.

Cloud computing security risks

Answers

Answer:

Risks:

Network issues or outages caused by attackers can limit or completely deny access to data stored in the cloud

Attackers could find an exploit and steal company data without ever physically touching the company's computer.

That's what I can think of.

Explanation:

1.2.6: Anonymity Reflection

1) What are some reasons a person might choose to remain anonymous on the Internet?

2) What are some harmful outcomes that stem from Internet anonymity?

3) Do you think that people have a “right” to remain anonymous online? Why or why not?

Answers

Answer:

1. they are too afraid to say it in person or are afraid of getting in trouble if they give their identity.

2.more cyber crimes committed and no filter for what is okay to say or not as they have the security no one knows who they are.

3. yes because you may not want your full personal info out there even though negative outcomes could occur from anonymity

There are several reasons why a person might choose to remain anonymous on the internet, including: privacy, security, Whistleblowing, etc.

What is Internet anonymity?

Internet anonymity is the capacity of a person to remain unidentified and anonymous online, generally through concealing or obfuscating their real identity.

A person could decide to remain anonymous on the internet for a number of reasons, such as:

Concerns about privacy: People might prefer to keep their internet activities or personal information hidden, especially if they are discussing sensitive or divisive viewpoints.Safety worries: Some people could feel unsafe or vulnerable if they reveal their identify online, especially if they have previously been the target of abuse or threats.Whistleblowing: In order to protect themselves from retaliation, those who seek to bring attention to wrongdoing or unlawful activity may decide to remain anonymous.

Internet anonymity can have a number of negative effects, such as:

Online bullying and harassment.Misinformation and hate speech propagation.Absence of responsibility.

Some contend that anonymity is an essential part of free speech and expression and that people should have the freedom to share their thoughts without worrying about being judged or subjected to retaliation.

Thus, these are some harmful outcomes that stem from Internet anonymity.

For more details regarding internet anonymity, visit:

https://brainly.com/question/13264093

#SPJ2

the ISA standard buses are used to connect​

Answers

Answer:

The ISA standard buses are used to connect Hard disk and Processor

Hope this helps you. Do mark me as brainlist

In MIPS, all operation codes (op-codes) use ______ only.

A- 5 bits
B- 8 bits
C- 6 bits
D -32 bits

Answers

Answer:

5 bits

Explanation:

ue82ijevw8ey जभछतड।णृबदजठणब

Case Study
Dr. Thomas Waggoner, an information systems professor at the local university,
is at the Will Call window at the Medallion Theatre, trying to pick up tickets he
had reserved. However, due to an oversight which turns out to be rather
frequent, his tickets were sold to another patron. Fortunately for Dr. Waggoner
and his wife, who are celebrating their wedding anniversary, the box office
manager finds two box seats which had not been claimed. In talking with the
box office manager, Dr. Waggoner starts thinking that he could perhaps help the
theatre avoid this type of problem in the future. His students could design and
build a system to help keep track of ticket sales, and hopefully help the theatre
become more efficient and improve customer satisfaction.
Q # 1 Write down the purpose of the given requirements HINT: purpose of a
system?
Q # 2 Write down the Modules and also extract the functional requirements of
the given requirements?
Q # 3 Create a use Case Diagram and Use cases of the above requirements?
Q # 4 Create a Class Diagram and its GUI interfaces of the system? NOTE:
Write down the caption on each interface.

Answers

Answer:

1. Design system to avoid theatre tickets selling issue.

2. Resources provided to student who can built a system for the theatre tickets booking.

3. Medallion Theatre Booking System

Add/edit patron

Add/edit production

Add/edit performance

Add/edit seats

Purchase tickets

Generate Tickets Sold Report

4.GUI or graphical user interface allows the user to connect through graphical icons.

Explanation:

The main purpose is to avoid problems of duplicate tickets sales in future. The system will enable the selling of each seat to one customer only and when an attempt is made to resold the seat the system warns the user creating a check for original sale. This will help theatre to avoid any issues in future and customers will be happy with their ease of confirmation of booking.

Case Study Dr. Thomas Waggoner, an information systems professor at the local university, is at the Will Call window at the Medallion Theatre, trying to pick up tickets he had reserved. However, due to an oversight which turns out to be rather frequent, his tickets were sold to another patron. Fortunately for Dr. Waggoner and his wife, who are celebrating their wedding anniversary, the box office manager finds two box seats which had not been claimed. In talking with the box office manager, Dr. Waggoner starts thinking that he could perhaps help the theatre avoid this type of problem in the future. His students could design and build a system to help keep track of ticket sales, and hopefully help the theatre become more efficient and improve customer satisfaction. Q # 1 Write down the purpose of the given requirements HINT: purpose of a system? Q # 2 Write down the Modules and also extract the functional requirements of the given requirements? Q # 3 Create a use Case Diagram and Use cases of the above requirements? Q # 4 Create a Class Diagram and its GUI interfaces of the system? NOTE: Write down the caption on each interface.

Answers

Answer:

1. The primary purpose of a system is system development, analysis and design to avoid inappropriate and duplicate selling of theatre tickets.

2. The function requirements are development of a system which automatically reserves the ticket when a person books it and marks it appear booked for all the customers.

3. The customers can book the ticket through online system. The system then marks the ticket as unavailable for all the other customers until and unless the original customers cancels the ticket.

Explanation:

Dr. Waggoner had an issue with ticket booking as his booking was sold to another customer. This could lead him to a bad experience at theatre but since the box office manager assisted him with another available seats. This issue has been resolved with good faith but there can be problems in future where many customers can claim a single seat. To avoid this the theatre should introduce online booking system based on computer application which can be accessed by all the customers through website.

Do you know the energy unit question?

Answers

Answer:

Fossil Fuels

Explanation:

You will write methods of a program that calculates the number of occurrences of a specific type of animal in a list of animal names. For example, in the matrix with animal names as RosieMule TedFish DoodleCat WallyDog JessieDog DanaDog BibsCat MillieCat ElyFish SimonCat CloieFish GoldieFish ZippyFish AlexisDog BuckMule RascalMule GeorgeDog OscarFish GracieMule LuckyDog there are 6 dogs, 4 cats, etc.

Answers

Answer:

In Java:

public static void countAnimal(String [] animalList,String animal) {      

     int count=0;

     for(int i=0; i<animalList.length; i++ ) {

        if(animalList[i].toLowerCase().contains(animal.toLowerCase())) {

           count++;

        }

     }

     System.out.print("There are "+count+" "+animal);

  }

Explanation:

This line defines the method. The method gets a list of animals and a type of animal as its parameters

public static void countAnimal(String [] animalList,String animal) {      

This initializes count to 0

     int count=0;

This iterates through the animal list

     for(int i=0; i<animalList.length; i++ ) {

This checks if the current animal in the list is the type of animal (e.g. dog, cat, etc).

        if(animalList[i].toLowerCase().contains(animal.toLowerCase())) {

If yes, the count variable is incremented by 1

           count++;

        }

     }

This prints the number of animals of that type (e.g. dog, cat, etc).

     System.out.print("There are "+count+" "+animal);

  }

As an additional explanation:

if(animalList[i].toLowerCase().contains(animal.toLowerCase()))

animalList[i].toLowerCase() --> This converts the string of the current animal to lowercase

animal.toLowerCase() --> This converts the animal (e.g. dogs, cats) to lowercase

.contains -> compares if both strings to check if contains the particular animal

See attachment for complete program

Design a program named GradeDistribution.java that reads in 10 grades from the keyboard, then counts and displays grade distribution as follows:

Grade Range No.
[90 - 100] 2
[80 - 89] 5
[70 - 79] 1
[0 - 69] 1
Others 1

Answers

Answer:

[70 — 79]

Explanation:

if your audience seems confused about a previous slide, in presenter view, whats the best way to jump back to a previous point in the presentation

Answers

Answer:

You can go back to that point towards the end of the presentation  or find where it would link later on in the presentation. Then you can ask if there are any questions and if the audience are willing to ask them you can go ahead and explain it.

Explanation:

Example of vector image format​

Answers

Answer:

JPEGs, GIFs and PNGs are common raster image types. ...

Vector images, alternatively, allow for more flexibility. Constructed using mathematical formulas rather than individual colored blocks, vector file types such as EPS, AI and PDF* are excellent for creating graphics that frequently require resizing.

Other Questions
Why do you think the slaughter houses used such horrible practices in meat production i have no idea how to do this ha Select the pronouns from the sentences below. He was glad for one thing: the rope was off his neck. (2 correct answers) He was glad for one the rope off his neck SUPER EASY AND ILL GIVE BRAINLIESTcan someone describe what hace + specific time+ que+ verb means. like describe how u would create the sentence using that formula in english What molecule was theorized to give rise to many of the important bio molecules that we see 1 pointare important to life today?A)proteinB)amoniaC)RNAD)fats What concepts were developed in the ancient world to make sure trade was fair? scarcity and surplus supply and demand standard measures and weights traditional and command economies if the length of a certain rectangle is decreased by 4cm and the width is increased by 3cm,a square with the same area would result.find the perimeter of original rectangle Which of these can be the graph of the equation y= mx + b solve the following polynomial equation 8x-8=0 When you only grow enough foodto support your family, it isknown as Find the marked prices of the following , given the percentage discount and the sale prices: part a: 12% discount , and the sale price $77 part b : 25% discount , and the sale price $123 A triangle has side lengths of 6, 8, and 9. What type of triangle is it? right obtuse equiangular acute the basic unit in society traditionally consisting of two parents rearing their childrensa.familyb.societyc.communityd.school Is testicle hair pubic or not? everybody got a different relatiomship to everything in our world what does this mean? A ladder leaning against the wall makes an angle of elevation of 74. If the foot of the ladder is 6.5 feet from thewall, how high up the wall is the ladder? Rhonda and Shalene live together in an apartment, so they combine their income each week to pay for their rent and bills. Rhonda's paycheck is modeled by the function r(x)=22x+50,r(x)=22x+50, where xx is the number of hours worked. Shalene's paycheck is modeled by the function s(x)=30x25,s(x)=30x25, where xx is the number of hours worked. Which function represents their household income if they work the same number of hours? digestion physically breaking down food, this is done by your______ . _____digestion is the breakdown of molecules of food, this is done by yourWord Bank:Chemicalteeth salivaMechanicalBlank 1:Blank 2:Blank 3:Blank 4: Helpy helps me with this question What causes waves to occur?Question 1 options:WindAnimals swimming in the waterI don't know...yet!Gravitational pull from Earth