The denial of service (DoS) attack that generates a large number of ICMP echo requests from a single request, acting like an amplifier is a fraggle attack.
What does a Fraggle attack function as?A Fraggle Attack is known to be a type of a denial-of-service (DoS) attack that entails the sending of a huge amount of spoofed UDP traffic to a given broadcast address of a router that is often seen in a given network.
Note that It is said to work in a similar way like the smurf Attack, that often uses spoofed ICMP traffic and as such, the denial of service (DoS) attack that generates a large number of ICMP echo requests from a single request, acting like an amplifier is a fraggle attack.
Learn more about DoS attack from
https://brainly.com/question/13068595
#SPJ1
is an amount paid based on the volume of products or services that a salesperson sells
Answer:
should be commission
Explanation: i took this class a while back, hope this helps man
83\2+58+3^3+95*2/10
it's computer pls help
Answer:
145.5
Explanation:
I was unsure what you needed done, but if it was a math equation then that is your answer :)
Hope this helped <3 Brainliest please? :)
Which of the following will Excel recognize as a date?
Group of answer choices
February 6 1947
2,6,47
2-Feb-47
None of the above
The option that shows how Excel recognize as a date is February 6 1947.
How does Excel see date?The Excel date is often seen as a regular number that is said to have been formatted to often look like a date.
One can you change the cell format to 'General' so that one can see the type of date serial number. Most times, the integer portion of the date serial number stands for the day, and the decimal portion stands for the time.
Read more about Excel from
https://brainly.com/question/25879801
Discuss what is an embedded system. Explain the relative advantages and disadvantages of an embedded OS based on an existing commercial OS compared to a purpose-built embedded OS.
Answer:
An embedded system is a computer system a combination of a computer processor, computer memory, and input/output peripheral devicesthat has a dedicated function within a larger mechanical or electronic system.
Advantage
Simple to deliver higher creation.
Less costs for per bit of resultant.
It has not many interconnections.
It has Better steady and Higher speed.
It has Higher dependable.
To use for one errand.
Disadvantage
Once configured, these systems cannot be changed. ...
They are hard to maintain. ...
Troubleshooting is difficult for embedded systems. ...
Because these systems are made for specific tasks, hardware is limited
A team of scientists is designing a study to examine factors that affect
people's enjoyment of video games. Which statement best represents a valid
hypothesis for the study?
A. More people enjoy role-playing games than platformer games.
B. Action games are better than role-playing games.
C. The graphics in console games are cooler than those in PC
games.
O D. Video games are fun.
Answer:
A. More people enjoy role-playing games than platformer games.
Explanation:
It is A because the genre of game is a factor of a video game.
B is trying to state an objective truth that one genre is better than another but not giving a reason (like it being more enjoyable).
C isn't even really game related, that would be a study on which gaming platforms are more enjoyable and why.
D has already been established. The current study is to determine what makes them more or less enjoyable.
Answer:
B. Action games are better than role-playing games.
Explanation:
In my opinion I like to do roleplay's I don't know why but I just do, but this is the correct answer.
How is distributed ledger technology (DLT) used in a blockchain?
A. To change the ownership of assets in blockchains
B. To encrypt transactions into blocks of information
O c. To store assets in different financial institutions
O D. To keep records of transactions in different places
Answer:
I believe the answer is D. To keep records of transactions in different places.
Explanation:
which changes the angle of a picture skew or select or find
Answer:
This article discusses about some very basic and generalized techniques for detecting image skew. Definitely there are much advanced algorithms to detect skew, but those will not be covered in this article.
Explanation:
Complete the sentence.
When sensitive information is sent over the internet, it should be
.
Answer:
encrypted
Explanation:
to prevent others from viewing it
Answer:
Your answer is encrypted
Explanation:
This will keep your information secure whilst sending it.
This means to:
convert (information or data) into a cipher or code, especially to prevent unauthorized access
So your info is safe
Pls mark brainliest <3
Hope this helps :)
`
`
`
Tori
A _____ is a collection of (potentially) thousands of computers that can respond to requests over a network
Answer:
server or supercomputer
Explanation:
In your opinion what is the best or greatest technology advancement in your lifetime and why?
At least 6 sentences and include a topic sentence and conclusion sentence. Provide an example in the paragraph to support your opinion. No need to site
Answer:
ELECTRICITY
Since early discoverers like Benjamin Franklin studied it, and inventors like Nikola Tesla tested ways to turn it into power, electricity has not only been fueling generations of new innovations but also become an irreplaceable tool of modern life.
Explanation:
There's an old joke about a group of friends debating the world's greatest invention:
There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says.
There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says."Why is that?" one of his friends asks.
There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says."Why is that?" one of his friends asks."Well," says the man, "when you put something hot in it, it stays hot. And when you put something cold in it, it stays cold."
There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says."Why is that?" one of his friends asks."Well," says the man, "when you put something hot in it, it stays hot. And when you put something cold in it, it stays cold.""Yeah," says the friend, "so what?"
There's an old joke about a group of friends debating the world's greatest invention:"The greatest invention of all time is the Thermos bottle," one man says."Why is that?" one of his friends asks."Well," says the man, "when you put something hot in it, it stays hot. And when you put something cold in it, it stays cold.""Yeah," says the friend, "so what?""Think about it, " says the man. "That little bottle -- how does it know? but have you ever think how
Thermos bottle made.
yeah, because of electricity....
The discovery of electricity became the necessary basis for the occurrence of multiple other sciences and inventions that are constantly used and are of crucial meaning in the contemporary world.
The modern society, its life and well being depends on electricity wholly. We cannot imagine our lives without cell phones, computers, the internet, coffee makers, toasters, washing machines, and microwave ovens, and all of these devices work due to electricity, but we often forget that more crucial needs of ours are fulfilled.
:-befrank
Which type of hackers break into systems for the thrill or to show off their skills?.
What would be considered a benefit of using simulation in the education field?
Simulation can reduce the costs of books.
Simulation can increase the cost of materials.
Simulation can reduce the number of teaching jobs.
Simulation can reduce the amount of homework for students.
Answer:
books cost
Explanation:
the books cost will go down, as they are to become digital, thus, making physical copies cheaper
Answer:
A
Explanation:
Did test
Which program began as a two-hour weekly TV show that offered programming appealing to African American audiences, and in 1983 became a major network that highlighted new music, movies, and entertainment news
The program that offered programming appealing to African American audiences is BET.
What is TV show?A television show is known as TV show for short. It is said to be any kind of content that is often made for viewing on any kind of television set.
Note that It is one that is often broadcast through the use of over-the-air, satellite, cable, etc. The program that was said to start as two-hour weekly TV show and that offered programming appealing to African American audiences is the BET.
Learn more about TV show from
https://brainly.com/question/24108641
Which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information
Not naming countries or people, but its mostly Nation State Actors / Hactivits. Eh, not sure about hactivits but mostly Nation state actors.
List and describe in detail any four power management tools that were developed by atleast two manufacturers to prevent and/or reduce the damage of processors from theprocess of overclocking
Some power management tools to reduce damage to processors by the overclocking process are:
CPU TwakerMSI AfterburnerIntel Extreme Tuning UtilityAMD Ryzen MasterWhat is overclocking?It is a technique that allows you to increase the power and performance of various computer hardware. That is, this process increases the energy of the components and forces the pc to run at a higher frequency than determined by the manufacturer.
Therefore, there are several power management models and manufacturers to reduce and prevent physical damage to pc components.
Find out more about overclocking here:
https://brainly.com/question/15593241
Tasha makes fun of Jeffery at work, harasses him, and calls him names. How
might an HR manager overcome this situation of office bullying?
Answer:
public class bullyFixer
{
public static void main(String[] args) {
System.out.println("buller of 5 and 15 is "+buller(5,15));
System.out.println("buller of 2 and 3 is "+buller(2,3));
System.out.println("buller of 20 and 100 is "+buller(20,100));
}
public static int buller(int num1, int num2){
if (num2 <= num1 && (num1%num2 == 0)){
return num2;
}
else if (num1<num2){
return buller(num2,num1);
}
else{
return buller(num2,num1%num2);
}
}
}
Explanation:
public class bullyFixer
{
public static void main(String[] args) {
System.out.println("buller of 5 and 15 is "+buller(5,15));
System.out.println("buller of 2 and 3 is "+buller(2,3));
System.out.println("buller of 20 and 100 is "+buller(20,100));
}
public static int buller(int num1, int num2){
if (num2 <= num1 && (num1%num2 == 0)){
return num2;
}
else if (num1<num2){
return buller(num2,num1);
}
else{
return buller(num2,num1%num2);
}
}
}
In a print statement, you can set the ________ argument to a space or empty string to stop the output from advancing to a new line. true false
In a print statement, a user can set the end argument to a space or empty string, in order to stop the output from advancing to a new line.
What is a print statement?A print statement can be defined as a line of code that is used to send data to the print or println method of a programming system such as compiler.
In Computer programming, an end user can set the end argument to a space or empty string, in order to stop the output from advancing to a new line by using a print statement.
Read more on print statement here: https://brainly.com/question/21631657
What device allows data to be processed into information
James, an IT manager, expresses a concern during a monthly meeting about weak user passwords used on company servers and how they may be susceptible to brute-force password attacks. Which concept can James implement to make the weak passwords stronger
Answer:
James could implement the use of symbles and numbers in the passwords so its less easy to brute-force it, and a maximum amount of characters and symbles
Explanation:
a password that looks like: invisable man (invisableman), is easy to guess unlike a password that looks like this: &31invisable#man%^2
or you could go with something like this: 1nv1548!3 m4n (or add random caps+numbers (maybe symbles))
Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.
Answer:
Brute force
Explanation:
Brute force means forcing your way into logging into an account.
This is done by trying all kinds of passwords, starting from something like "123456" to your birthday and getting increasingly complex passwords in the hope that the account has a weak password
LOFT sends out a cents-off offer to its email subscribers to push sales. The next day, LOFT sends another. Overuse of cents-off offers might lead to what
Overuse of cents-off offers might lead to a cheapened brand image.
What is a business brand image?Brand image is known to be the current depiction of the customers about a specific brand.
Note that if a firm uses cents-off offers too much and in all their services so as to push sales, customer may view the brand as too cheap for their liking and may abandon it.
Learn more about email subscribers from
https://brainly.com/question/1538272
2. what are the advantages of breaking up a single logical message into a number of fixed-sized packets and then sending each one of those packets independently through the network?
The advantages of breaking up a single logical message into a number of fixed-sized packets is that it makes it more flexible and also it increases the performance and also the reliability of the internet.
There is an Easy lost data recovery Internet as it is an heterogeneous network.
Are packets made of fixed size?Packets are known to come in different sizes. They can also be made of a fixed size.
The examples are 1,000 or 1,500 bytes, or other kinds of variable sizes, based on the system. Its advantages is one where errors can be corrected easily and data recovery is fast.
Learn more about fixed-sized packets from
https://brainly.com/question/3991989
what is computer
what is computer
Hi! Computer is an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
The other term for template document is _______.
A. DATA FILE
B. DATA SOURCE
C. MAIN DOCUMENT
D. MAIN MENU
29. The startup configuration file is stored in ________________ a. ROM b. NVRAM c. Flash Memory d. RAM
Answer:
The start configuration is stored on the nonvolatile random-access memory aka NVRAM for the vast majority of systems.
The semantic network model predicts that the time it takes for a person to retrieve information about a concept should be determined by:.
Answer:
the distance that must be traveled through the network.
Explanation:
The semantic network model predicts that the time it takes for a person to retrieve information about a concept should be determined by the distance that must be traveled through the network. The correct option is B.
What is semantic network model?In the late 1960s, Allan Collins and Ross Quillian developed the network model of semantic memory organization.
According to this network model, information nodes (categories) are linked to one another via strong and weak links. Priming enables our memory to prepare related information for retrieval.
A semantic network is a type of knowledge structure that shows how concepts are related to one another and how they connect.
Semantic networks mine data, connect concepts, and draw attention to relationships using artificial intelligence (AI) programming.
According to the semantic network model, the time it takes a person to retrieve information about a concept is determined by the distance that must be traveled through the network.
Thus, the correct option is B.
For more details regarding semantic network model, visit:
https://brainly.com/question/29317050
#SPJ2
Your question seems incomplete, the probable complete question is attached below:
Help!! When was technology made?
Answer:
3.3 million years ago, if you mean technology in general, if you mean computer technology, then 1837 should be your answer.
Answer:
3.3 million years ago the first tools were made but technology is older than our specis itself
Explanation:
well even the use of rocks as wepons are technology
True or false: A local area network is a group of computers, printers, and other devices connected to the same network and covers a large geographic range such as a city, a county, or a state.
Answer:
True.
Explanation:
Hope this helps you!
Why might a computer calculate a long list of numbers better than a human?
A. Computers can replicate human tasks.
B. Computers can think creatively.
C. Computers must rest every few hours.
D. Computers calculate numbers very quickly.
Answer: Computers calculate numbers very quickly.
Explanation:
While most of the possible options are accurate, D appears to be your best option. Computers can calculate long, sophisticated numbers in a few seconds while it will (usually) take humans longer.
Please help me on this it’s due now
The use of smart cranes enables transportation companies to do all of the following except manually load or unload crates onto a train with several workers. Thus, the correct option for this question is C.
What are smart cranes used for?The features of smart cranes not only support the crane operators but also provides service personnel and terminal operators. They are used to easily accessible crane data, maintenance intervals can be monitored, service work/error analyses simplified and handling rates evaluated more quickly.
According to the context of this question, easy and efficient steering and regulation of heavy loads. It involves the utilization of easy guiding of loads, especially when utilizing a remote control system. Efficient handling of heavy loads with two cranes in tandem operation.
Therefore, the use of smart cranes enables transportation companies to do all of the following except manually load or unload crates onto a train with several workers. Thus, the correct option for this question is C.
To learn more about Transportation, refer to the link:
https://brainly.com/question/27667264
#SPJ7