Answer:
C. Trojan
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
What is the easiest way to deploy a C++ program to a user’s computer? a. Copy the source code to the user’s computer and then compile it b. Create a batch file that copies the program to the user’s computer and then run it c. Copy the executable file to the user’s computer d. Create an installer program and then run it on the user’s computer
Answer:
c. Copy the executable file to the user’s computer
Explanation:
When you run a c++ program, an executable file (.exe) is created in the same directory with the source file.
To deploy this program on another system, you need to transfer the executable file from the original system where the program was executed to the new system.
The program will work fine without errors.
However, do not mistake the executable file for the source file. The source file ends in .cpp.
Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.
Answer:
c
Explanation:
What is the advantages and disadvantages of hardware devices and software devices ?
Urgent need for assignment due today 12 o’clock!
Answer:
Advantages of hardware:
Physical existence
Multitasking
Speedy
Disadvantages:
Costly as different equipment cost differently
Time consuming
requires space
Privacy issues
Explanation:
Advantages of Software:
Less costly
Improved privacy controls
Requires no space
Disadvantages:
Does not have physical existence
hacking and cyber attacks may steal important information
Regular updates required
1. Open the start file EX2019-ChallengeYourself-9-3. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
2. If the workbook opens in Protected View, click the Enable Editing button in the Message Bar at the top of the workbook so you can modify the workbook.
3. Use Consolidate to create a summary of real estate sales for all property types. Place the consolidated data on the Summary worksheet in cells B3: C15. Use the Average function to consolidate the data from cells B2: C14 in the Condo, Townhouse, and Single Family worksheets. Include links to the source data.
4. Import individual sales data from the tab-delimited text file Select Sales Data 2019-2020. Import the data as a table in cell A1 of the Select Sales worksheet.
5. Remove the data connection when the import is complete.
6. In the Select Sales worksheet, add data validation to restrict values in the House Type columns (cells B2: B139) to the values in the cell range named PropertyTypes. Include a drop-down list of values in the cells to assist in data correction.
7. Add the following input message to cells B2:B139: Select a property type from the list.
8. Add the following error alert to cells B2:B139: Not a valid property type.
9. Apply data validation circles to any values that violate the data validation rules you just created.
10. Add a comment to cell B1 in the Select Sales worksheet that reads: This needs to be fixed.
11. Add a hyperlink from cell B1 in the Select Sales worksheet to link to the named range (defined name) PropertyTypes. Test the link.
12. Use Flash Fill to add a new column of data to the Select Sales worksheet to display the number of bedrooms/the number of bathrooms.
a. In the Select Sales worksheet, cell F1, type the heading: BR/BA
b. Complete the column of data using this pattern in cell F2: 1 BR/1 BA
You will need to enter at least two samples in order for Flash Fill to suggest the correct autofill data. Check your work carefully.
Sales Summary 2019-2020
Number of Sales Average Selling Price
1
2
3 One BR, One BA
4 One BR, Two BA +
5 Two BR, One BA
6 Two BR, Two BA
7 Two BR, Two BA +
8 Three BR, One BA
9 Three BR, Two BA
10 Three BR, Three BA +
11 Four BR, One BA
12 Four BR, Two BA
13 Four BR, Three BA+
14 Five BR-. One BA
15 Five BR+ Two BA+
16
17
18
19
20
21
22
23
24
Answer:
Omg what is this
soooo long questionn
i am fainted
what rubbish you written how long the question is of which subject
what's your name
Compare and contrast traditional and cloud data backup methods. Assignment Requirements You are an experienced employee of the DigiFirm Investigation Company. Chris, your team leader, explains that your biggest client, Major Corporation, is evaluating how they back up their data. Chris needs you to write a report that compares traditional backup methods to those provided by a cloud service provider, including the security of cloud services versus traditional forms of on-site and off-site backup. For this assignment: 1. Research both traditional and cloud data backup methods. 2. Write a paper that compares the two. Make sure that you include the security of cloud services versus traditional forms of on-site and off-site backup. Required Resources Course textbook Internet Submission Requirements Format: Microsoft Word Font: Arial, size 12, double-space Citation Style: Follow your school's preferred style guide Length: 1-2 pages If-Assessment Checklist I researched both traditional and cloud data backup methods. I wrote a report that compares the two. I included the security of cloud services versus traditional forms of on-site and off-site backup. I organized the information appropriately and clearly. . I created a professional, well-developed report with proper documentation, grammar, spelling, and nunctuation
Answer:
Ensures all database elements are known and secured through inventory and security protocols. Catalogs databases, backups, users, and accesses as well as checks permissioning, data sovereignty, encryption, and security rules.
Security Risk Scoring
Proprietary Risk Assessment relays the security posture of an organization's databases at-a-glance through risk scores.
Operational Security
Discovers and mitigates internal and external threats in real time through Database Activity Monitoring plus alerting and reporting. Identifies and tracks behavior while looking for anomalous activity internally and externally.
Database Activity Monitoring
Monitors 1 to 1,000+ databases simultaneously, synthesizing internal and external activity into a unified console.
Only by covering both of these areas can organizations have defense in depth and effectively control risk.
Hello everybody,
For the quiz questions, I tried using the circular method, but got a numeric, period or comma error?
So I tried using the solver to find the same solution I got, but when I entered it in the answer box, he always said incorrectly.
Any help would be highly appreciated and write the results here, why do I have to read the solution quiz because I was wrong? thank you.
The bisection method is being used to calculate the zero of the following function between x = 0 and x = 1.
What is the midpoint for the 3rd iteration? (The midpoint for the 1st iteration is 0.5.) Provide your answer rounded to the thousandths place.
Answer:
i don't know the answer please tell me
(True/False). In an "ID" column with the data type INTEGER PRIMARY KEY, each value entered for the ID must be unique.
Answer:
The answer is "True".
Explanation:
The key to a relational database that is unique for each data record is a primary key, also called a primary keyword.This unique identifier, including a driver's license name, telephone number, or vehicle identification number. This is an identifier (VIN).There must always be the only primary key in such a relational database.This is a specific relational database field (or column combination) that identifies each table entry in a unique way.It utilized it to swiftly analyze the data within the table as a unique identifier.Write a program that takes a date as input and outputs the date's season. The input is an integer to represent the month and an integer to represent the day. Ex: If the input is: 4 11 the output is: spring In addition, check if both integers are valid (an actual month and day). Ex: If the input is: 14 65 the output is: invalid The dates for each season are: spring: March 20 - June 20 summer: June 21 - September 21 autumn: September 22 - December 20 winter: December 21 - March 19
Answer:
Explanation:
The following program is written in Java. It is a function that takes in the two parameters, combines them as a String, turns the combined String back into an integer, and uses a series of IF statements to check the parameters and determine which season it belongs to. Then it prints the season to the screen. The code has been tested with the example provided in the question and the output can be seen in the attached image below.
class Brainly {
public static void main(String[] args) {
getSeason(4, 65);
getSeason(4, 11);
}
public static void getSeason(int month, int day) {
String combined = String.valueOf(month) + String.valueOf(day);
int combinedInt = Integer.parseInt(combined);
if ((month > 0 && month < 12) && (day > 0 && day < 31)) {
if ((combinedInt >= 320) && (combinedInt <= 620)) {
System.out.println("The Season is Spring");
} else if ((combinedInt >= 621) && (combinedInt <= 921)) {
System.out.println("The Season is Summer");
} else if ((combinedInt >= 922) && (combinedInt <= 1220)) {
System.out.println("The season is Autumn");
} else {
System.out.println("The Season is Winter");
}
} else {
System.out.println("Invalid date");
}
}
}
when was first generation of computer invented?
There are two circular grounds Ground-A and Ground-B. Ground-A is having diameter of 15 meters and Ground-B is having diameter of 20 meters. Mohsin is running in Ground-A and Neetesh is running in Ground-B. Write a program in C++ that asks the user to input the time taken, in seconds, to complete one compete round of the ground by both the friends and displays who is running faster.
Answer:
A
Explanation:
b/c the round of 'A' is less than ruond of'B'
Write a game that performs the roll of two dice randomly. The game should first ask for a target sum. Everytime the player enters r, the program should repeatedly print the side of the dice on a separate line. The game should stop prompting if one of these two events occur: -The sum of the two sides is equal to the target sum. -The player enters q.
Answer:
Explanation:
The following program was written in Java. It asks the user to first enter the target sum. Then it creates a while loop that continues asking the user to either roll dice or quit. If they decide to roll, it rolls the dice and prints out both values. If the target sum was hit, it prints that out and exits the program otherwise it loops again. The code has been tested and can be seen in the attached image below.
import java.util.Random;
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
Random rand = new Random();
Scanner in = new Scanner(System.in);
System.out.print("Enter Target Sum: ");
int targetSum = in.nextInt();
while (true) {
System.out.println("r: Roll Again");
System.out.println("q: Quit");
String choice = in.next();
char choiceModified = choice.toLowerCase().charAt(0);
if (choiceModified == 'r') {
int roll1 = rand.nextInt(6) + 1;
int roll2 = rand.nextInt(6) + 1;
int total = roll1 + roll2;
System.out.println("Dice 1: " + roll1);
System.out.println("Dice 2: " + roll2);
if (total == targetSum) {
System.out.println("Target Sum of " + targetSum + " hit.");
break;
}
} else if (choiceModified =='q') {
break;
} else {
System.out.println("Wrong choice");
}
}
}
}
Irene llegó tarde al colegio_______________
ayúdenme
^_^^_^^_^^_^^_^^_^^_^^_^^_^
Answer:
Explanation:
Absconding
Write an algorithm to find the sum of the following series:
a) 1+x+x^2+x^3+...+x^20
b) 1-x+x^2-x^3+...+x^20
c) 1+x/2+(x²)/3+(x^3)/4+...+(x^20)/21
Answer:
The algorithm is as follows:
Input x
sum_a = 0
sum_b = 0
sum_c = 0
for i = 0 to 20
sum_a = sum_a + x^i
sum_b = sum_b + (-x)^i
sum_c = sum_c + x^i/(i+1)
print sum_a, sum_b, sum_c
Explanation:
Required
An algorithm to solve (a), (b) and (c)
For Series (a):
This series is a geometric progression and the common ratio is x
i.e.
[tex]r = x/1 = x^2/x = ...... = x^{n+1}/x^n =x[/tex]
So, the sum of the series is:
Sum = Previous Sums + x^i --- where i is between 0 and 20 (inclusive)
For Series (b):
This series is a geometric progression and the common ratio is -x
i.e.
[tex]r = -x/1 = -x^2/x = ...... = -(x^{n+1}/x^n) = -x[/tex]
So, the sum of the series is:
Sum = Previous Sums + (-x^i) --- where i is between 0 and 20 (inclusive)
For Series (c):
This series is a neither arithmetic nor geometric progression.
It obeys the following rule:
[tex]\frac{x^i}{1+i}[/tex] --- where i is between 0 and 20 (inclusive)
So, the sum of the series is:
Sum = Previous Sums + [tex]\frac{x^i}{1+i}[/tex]
How do i connect WiFi on windows xp without icon?
Answer:
Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.
Which one of the following does not contain information?
1) A weather report
2) A time table
3) A price list displayed in a supermarket
4) An unlabeled chart
Answer:
4
Explanation:
4 is the ans as weather;timtable and price list display information
If x=3.123, then int(x) will give ?
Answer:
3
Explanation:
int(x)=3
int(x) rounds to the smallest whole number
For example,
if you say int(3.99) it is also 3
Draw AND, OR, XOR and XNOR gates with truth table and logic gates.
.
Answer:
see picture. let me know if you have questions.
if you want to present slides to fellow students or co workers, which productivity software should you use
Answer:
Power point is a good software to use for slides
A technology company starts a program dedicated to training high school students in the use of the latest computer programming languages. How can the company justify creating and funding such a program since it is not about its primary products
Answer:
The answer is "Spending the money can improve the company's reputation and attract new personnel with the necessary abilities".
Explanation:
In many cases, companies engage in activities tangential to their principal service or brand. As more than just a result, the purpose is to boost the company's reputation and at the same time raising societal awareness.
To strengthen its very own business reputation and to create future employees by teaching necessary skills, a technology organization may be established throughout the given case.
Every one of these initiatives helps to boost the brand's reputation & image, as well as the customer's confidence.
different types of computer and state the major difference between them
Answer:
computers system may be classified according to their size.
four types of computers are;
microcomputers / personal computers- micro computers are also called personal computers which is PC this computer came in different shapes size and colors. a personal computers are designed to be used by one person at a time.some examples of the computer are;
laptopdesktopa palmtopa work station2. mini computers- mini computers are sometimes called mid-range computers which are more powerful than microcomputers and can support a number of users performing different tasks, they were originally developed to perform specific tasks such as engineering calculations.
3. Mainframe computers- Mainframe computers are larger systems that can handle numberous users, store large amounts of data and process transaction at a high rate. these computers are expensive and powerful.
4. super computers- super computers are the most largest, fastest and most powerful computer. this systems are able to process hundreds of million of instructions per second they are used for job requiring and long complex calculation.
111+ 11- 1
1111+1111
1101 +1101
1010-11
Answer: 121, 2222, 2202, 999
Explanation:
Answer:
a. 121
b. 2222
c. 2202
c. 999
Write programming code in C++ for school-based grading system. The program should accept the Subject and the number of students from a user and store their details in an array of type Student (class). The student class should have: • studName, indexNo, remarks as variables of type string, marks as integer, and grade as char. • A void function called getData which is used to get students’ details (index number, name, and marks). • A void function called calculate which will work on the marks entered for a student and give the corresponding grade and remarks as give below. Marks Grade Remarks 70 – 100 A Excellent 60 – 69 B Very Good 50 – 59 C Pass 0 – 49 F Fail • Should be able to display the results for all students (index number, name, marks, grade, remarks). 2. Draw a flowchart for the calculate function above. 3. Create a folder with name format ICTJ254_indexnumber (eg
Answer:
Explanation:
// C++ Program to Find Grade of Student
// -------codescracker.com-------
#include<iostream>
using namespace std;
int main()
{
int i;
float mark, sum=0, avg;
cout<<"Enter Marks obtained in 5 Subjects: ";
for(i=0; i<5; i++)
{
cin>>mark;
sum = sum+mark;
}
avg = sum/5;
cout<<"\nGrade = ";
if(avg>=91 && avg<=100)
cout<<"A1";
else if(avg>=81 && avg<91)
cout<<"A2";
else if(avg>=71 && avg<81)
cout<<"B1";
else if(avg>=61 && avg<71)
cout<<"B2";
else if(avg>=51 && avg<61)
cout<<"C1";
else if(avg>=41 && avg<51)
cout<<"C2";
else if(avg>=33 && avg<41)
cout<<"D";
else if(avg>=21 && avg<33)
cout<<"E1";
else if(avg>=0 && avg<21)
cout<<"E2";
else
cout<<"Invalid!";
cout<<endl;
return 0;
}
Chất xơ có nhiều trong thực phẩm nào?
Answer:
Quả lê Quả lê là một loại trái cây phổ biến vừa ngon vừa bổ dưỡng. ...
Quả dâu tây. Dâu tây là loại quả cực kỳ ngon. ...
Quả bơ Quả bơ khác hơn so với hầu hết các loại trái cây. ...
Quả táo. ...
Quả mâm xôi. ...
Quả chuối. ...
Cà rốt. ...
Củ cải đường.
If your organization hires a new employee, what would you do to create a user account in the Linux system and add the account to a group? What commands would you use? What configuration files would you check and modify?
Following are the responses to this question:
The user account is "olivia".In the Linux system to see the account go to the "/home directory".For the configuration file we use ".bash_logout , .bash_profile, and .bashrc" files.Creating users:
We will use the useradd command to achieve this. Using that same command, you can create users who would log in or customers who would log in (in the case of creating a user for a software installation).
In its basic form, the command is as follows:
[Options] useradd usernameTake this user olivia, for instance. Assuming that you had been to issue the command prompt:
olivia has become a user.Users are added to the system without the need for a home directory and are unable to log on. It if we were using this rather than running the command without arguments?
sudo using useradd -m oliviaUsing the command above, a new user would be created, including a home directory that corresponded to the username. That means that you might now see the name "olivia" in the directory "/home".
But what about the lockout concern that was raised earlier? Both these methods are possible. After creating the user, you can enter the following command:
Password for olivia is: sudo passwd oliviaYou'll be requested to enter & verify your new password once you've completed the process. This unlocks the user profile, allowing them to log in.
This command might look like if you wanted to accomplish it in one go:
sudo useradd -m olivia -p PASSWORDYou should be using Passcodes as the login for the user olivia.
As soon as the user logs in, he or she can update their account password by using the password command to input their current password, and afterward entering/verifying their new one.
To create a user that has no personal account and cannot log in, execute the following instructions:
sudo use useradd as the-M USERNAME sudo use usermod as the -L USERNAMEThe user to be added is identified by USERNAME.
It establishes a user with really no root folder and prevents them from signing in with a second operation.
To add an existing user to a group on Linux, follow the instructions:
As root, log in to your accountUse the useradd instruction to add a new user (for example, useradd roman)If you'd like to log on as a new customer, type su plus that user's name.Entering the word "exit" will logout you from your account.Another way to add a user to a group under Linux would be to use the following syntax:
Alternatively, you can use the usermod command.The name of the club should be substituted for example group in this sentence.Example username should be replaced with the name of the user you'd like added.The following operations are performed when a new login is added to the system.
The user's home directory (/home/username by default) is now created.To set configuration files for the user's session, the following secret files are copied into another user's home directory..bash_logout
.bash_profile
.bashrc
/var/spool/mail/username includes the user's mail spool.The new user account is arranged in groups with the same name.Learn more:
Linux system: brainly.com/question/13843535
how can I order the prices negatively affect other producers of goods and services
I think you have been doing a great job but you haven’t been signing many people up for our new service feature I want you to set a goal of signing up 25% of your new customers for our new service feature if I get 96 new customers that means I have to get how many of them to sign up
Answer:
24 customers
Explanation:
Given
[tex]Customers = 96[/tex]
[tex]p = 25\%[/tex] --- proportion to sign up
Required
The number of customers to sign up
This is calculated as:
[tex]n = p * Customers[/tex]
So, we have:
[tex]n = 25\% * 96[/tex]
[tex]n = 24[/tex]
During the testing phase of an ERP system, the system implementation assurers should review: Group of answer choices Program change requests Vendor contracts Error reports Configuration design specifications
Answer:
Error reports
Explanation:
ERP is a multimodal software system that integrates all business processes and the function's of the entire organizations into single software system using a one database.Explain the purpose of the open() and close() operations.
Answer:
The open() operation notifies the system that the named file is about to become active. The close() operation notifies the system that the named file is no longer in active use by the user who issued the close operation.
Create a function, return type: char parameters: int *, int * Inside the function, ask for two integers. Set the user responses to the int * parameters. Prompt the user for a character. Get their response as a single character and return that from the function. In main Define three variables and call your function. Print values of your variables
Answer and Explanation:
In C programming language:
char fun(int*a, int*b){
printf("enter two integers: ");
scanf("%d%d",a,b);
int e;
printf("please enter a character: ");
e=getchar();
return e;
}
int main(int argc, char *argv[]) {
int d;
int f;
int g;
fun();
printf("%d%d%d", d, f, g);
}
We have declared a function fun type char above and called it in main. Note how he use the getchar function in c which reads the next available character(after the user inputs with printf()) and returns it as an integer. We then return the variable e holding the integer value as char fun() return value.
Write a c program that asks the user
to enter distance in KM and Petrol Price in Rs.
Program should compute estimated budget for
the travel distance (Assume your car covers 100
KM in 8 Liters of fuel). Program should run in a
loop and ask the user “Do you want to
continue?”. If user enters ‘y’ or ‘Y’ program
should repeat otherwise terminate.
Answer:
#include <stdio.h>
int main()
{
int x;
float y;
printf("Input total distance in km: ");
scanf("%d",&x);
printf("Input total fuel spent in liters: ");
scanf("%f", &y);
printf("Average consumption (km/lt) %.3f ",x/y);
printf("\n");
return 0;
}