What functions do these WLAN applications and tools perform on WLANs: airmonng, airodump-ng, aircrack-ng, and aireplay-ng

Answers

Answer 1

Answer:

The airmonng device allows for control mode on wireless LAN interfaces. Toggle between monitor mode and managed mode may also be used.

Explanation:

Without parameters entering the airmonng instruction will indicate the status of the operating system on the WLAN. Its  airodump-ng tool is used to capture packets of raw 802.11 blocks and is especially useful for processing vectors for WEP initial condition with both the motive that uses the others to aireplay-ng For injecting frames the aireplay-ng tool is used. The primary purpose of this injection is to create traffic which will later be used by the aircrack-ng to break the WEP and WPA-PSK keys.

Related Questions

If the object instance is created in a user program, then the object instance can access both the public and private members of the class using DOT notation (such as Rectangle r; r.area=10). True or False

Answers

Answer:

False

Explanation:

The private member of a class is not accessible by using the Dot notation ,however the private member are those which are not accessible inside the class they are accessible outside the class  .The public member are accessible inside the class so they are accessible by using the dot operator .

Following are the example is given below in C++ Language

#include<iostream>   // header file

using namespace std;  

class Rectangle

{    

   private:  

       double r; // private member  

   public:      

       double  area()  

       {     return 3.14*r*r;  

       }        

};  

int main()  

{    

  Rectangle r1;// creating the object  

   r1.r = 3.5;  

 double t= r1.area(); // calling

cout<<" Area is:"<<t;  

   return 0;  

}  

Output:

compile time error is generated

The correct program to access the private member of class is given below

#include<iostream>   // header file

using namespace std;  

class Rectangle

{    

   private:  

       double r; // private member  

   public:      

       double  area()  

       {    

r1=r;

double t2=3.14*r2*r2;

return(t2); // return the value  

       }        

};  

int main()  

{    

  Rectangle r1;// creating the object  

   r1.r = 1.5;  

 double t= r1.area(); // calling

cout<<" Area is:"<<t;  

   return 0;  

}  

Therefore the given statement is False

The Secure Sockets Layer which relies on __________ for encrypting the data between client and server

Answers

Answer: symmetric encryption

Explanation:

The Secure Sockets Layer (SSL) protocol is required by the Web servers and the web browsers in order to protect the data of the users during transfer through the creation of an encrypted channel that is unique for private communications that occur over the Internet.

The Secure Sockets Layer relies on the encryption in order to secure the link that exists between the client and the server which is the website.

This implies that the encryption and also the decryption of the data will be done using a cryptographic key that is shared. The cryptographic key will be generated and shared on accordance with transport layer security handshake.

Classify each of the following acts as a violation of confidentiality, of data integrity, source integrity, or availability, or some combination thereof: a) A hacker obtains millions of Yahoo passwords. b) Anthony accidentally cuts the electricity from the server room. c) The NSA finds an efficient method to break AES. d) Anna registers the domain name, "JohnSmith" and refuses to let John Smith buy or use the domain name. e) Some malware encrypts the victim’s hard drive with a secret key and a criminal asks for a ransom to decrypt it. f) The NSA wiretaps the cell phone of a suspect in a criminal investigation. g) A foreign state actor finds a zero-day vulnerability for voting machines used in the US.

Answers

Answer:

A) Violation of Confidentiality and Source Integrity:

Passwords are very confidential information and are usually protected by both the owner and the ower of the system (which in this case is Yahoo). To obtain the passwords, the hacker had to illegally gain access to the source of the data which is on Yahoo servers. Hence a breach of confidentiality and lack of adequate integrity on the part of Yahoo.

B) Source Integrity: Anthony accidentally cuts the electricity from the server room. Why would he be able to do that? how did he gain access into the server room? This speaks to source integrity. People should not be able to access the server room except they are authorised.

C) Source Integrity and Confidentiality: NSA finds an efficient method to break AES. AES refers to the Advanced Encryption Standard. AES is a symmetric encryption technology known as a block cipher.

It is used by the United States Government for the classification of information. Their ability to break this code speaks to Violation of Source Integrity. In this case, they haven't exactly hacked any document. However, any document that was encrypted using this technology is already compromised at the source.

D)   Anna registers the domain name, "JohnSmith" and refuses to let John Smith buy or use the domain name: Violation of Availability.

It is assumed here that John Smith was the original owner of the domain but it was highjacked at expiration and registered by Anna. This kind of breach is called Violation of Availability of the domain name.

E) Some malware encrypts the victim’s hard drive with a secret key and a criminal asks for a ransom to decrypt.

This move is called the Ransomeware attack. The Integrity of the source of information (which is the hard drive) is already compromised. This is a combination of Source Integrity or availability and confidentiality violation.

F) The wiretapping of a cell phone is a breach of confidentiality and data integrity.

G) when there is a vulnerability in a system or software that is unknown to those who should be interested, it is called a Zero-Day vulnerability. Where there is a Zero-Day vulnerability there could be a violation of confidentiality, data integrity, source data and or it's availability.

Cheers!

An IT engineer is planning a website upgrade with load balancing features. What technology is used? A) Web Proxy B) Round Robin C) Port Forwarding D) Reverse Proxy

Answers

Answer: (B): Round Robin

Explanation: Load Balancing refers to the systemic and effective distribution of network or application traffic across multiple severs in a sever farm. Every algorithm that balances load sits between the client's device and the back end severs.

Load Balancers are majorly used to increase the reliability and capacity of applications.

Round Robin is a type of algorithm that can be used to upgrade a website with load balancing features. It is the most widely used load balancing algorithm and it is a simple way to distribute requests across a group of servers.

The type of technology an IT engineer that is planning a website upgrade with load balancing features would use is: D) Reverse Proxy.

A website can be defined as a collective name used to describe series of web pages that are linked together with the same domain name.

A web server is a type of computer that run websites and distribute web pages as they are being requested over the internet by end users (clients).

Basically, when an end user (client) request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser; a request is sent to the internet to view the corresponding web pages (website) associated with that particular address (domain name).

In Computer Networking, a single server can be configured to appear as an endpoint for multiple servers acting behind it through the use of a reverse proxy.

Hence, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it is typically configured to forward or route an end user's requests to those multiple servers sitting behind it.

Furthermore, when a reverse proxy is properly configured, it helps to ensure security, reliability and optimum performance of a network through load balancing.

Therefore, server load balancing is a process that allows the even distribution of network traffic across multiple servers and it involves the use of a technology referred to as a reverse proxy.

Find more information: https://brainly.com/question/17235457

A school has 100 lockers and 100 students. All lockers are closed on the first day of school. As the students enter, the first student, denoted S1, opens every locker. Then the second student, S2, begins with the second locker, denoted L2, and closes every other locker (i.e. every even numbered locker). Student S3 begins with the third locker and changes every third locker (closes it if it was open, and opens it if it was closed). Student S4 begins with locker L4 and changes every fourth locker. Student
S5 starts with L5 and changes every fifth locker, and so on, until student S100 changes L100.
After all the students have passed through the building and changed the lockers, which lockers areopen? Write a program to find your answer.
(Hint: Use an array of 100 boolean elements. each of which indicates whether a locker is open (true) or closed (false). Initially, all lockers are closed.)

Answers

Answer:

Following are the code to this question:

public class Locker //defining a class Locker

{

public static void main(String[] ax)//defining main method  

{

boolean[] locker = new boolean[101]; //defining boolean array locker that's size is 100.

int j,s1,k1,x;

x=locker.length;

for (j=1;j<x; j++)//defining loop to assigns value false in locker array

{

locker[j] = false;// assign value false

}

for (j=1;j<x; j++)//defining loop loop to assign value true in array  

{

locker[j] = true;//assign value true

}

for(s1=2; s1<x; s1++)//defining loop to count locker from 2nd place

{

for(k1=s1; k1<x; k1=k1+s1)// defining inner loop to assign value  

{

if(locker[k1]==false) //defining if block for check false value  

{

   locker[k1] = true;// if condition is true it assign value true

}

else //defining else block

{

   locker[k1] = false;//assign value false in locker array

}

}

}

for(s1=1; s1<x; s1++)//defining loop to print locker value

{

if (locker[s1] == true) //defining if block that check Locker array value is equal to true

{

System.out.println("Locker " + s1 + " Open");//print Locker value with message  

}  

}

}

}

Output:

Locker 1 Open

Locker 4 Open

Locker 9 Open

Locker 16 Open

Locker 25 Open

Locker 36 Open

Locker 49 Open

Locker 64 Open

Locker 81 Open

Locker 100 Open

Explanation:

In the above code, a class "Locker" is declared, inside the class main method is declared, in which a boolean array "locker" is declared that's size is 100, in the next line fouth integer variable " j,s1,k1, and x" is declared, in which variable x is used to hold the boolean array length value, and other variable used in the loop.

In the next step, two for loop is declared, in the first loop assign value "false" in locker array and in seconde loop it assigns the value "true".In the next step, multiple for loop it uses if block uses to check locker value equal to false then assign value true otherwise assign value false. At the last another loop is declared, that uses if block to check locker value is equal to true and print its value with the message.

Universal Containers (UC) has decided to build a new, highly sensitive application on the Force platform. The security team at UC has decided that they want users to provide a fingerprint in addition to username/password to authenticate to this application. How can an Architect support fingerprints as a form of identification for Salesforce authentication

Answers

Use an AppExchange product that does fingerprint scanning with native Salesforce Identity  Confirmation

#Write a function called align_right. align_right should #take two parameters: a string (a_string) and an integer #(string_length), in that order. # #The function should return the same string with spaces #added to the left so that the text is "right aligned" in a #string. The number of spaces added should make the total #string length equal string_length. # #For example: align_right("CS1301", 10) would return the #string " CS1301". Four spaces are added to the left so #"CS1301" is right-aligned and the total string length is #10. # #HINT: Remember, len(a_string) will give you the number of #characters currently in a_string.

Answers

Answer:

This program is written using Python Programming Language;

Comments are not used; however, see explanation section for detailed line by line explanation

See Attachment

Program starts here

def align_right(a_string,string_length):

     if len(a_string) > string_length:

           print(a_string)

     else:

           aligned=a_string.rjust(string_length)

           print(aligned)

   

a_string = input("Enter a string: ")

string_length = int(input("Enter string length: "))

align_right(a_string,string_length)

Explanation:

Function align_right is declared using on line

def align_right(a_string,string_length):

This line checks if the length of the current string is greater than the input length

     if len(a_string) > string_length:

If the above condition is true, the input string is printed as inputted

           print(a_string)

If otherwise,

     else:

The string is right justified using the next line

           aligned=a_string.rjust(string_length)

The aligned string is printed using the next line

           print(aligned)

   

The main function starts here

This line prompts user for a string

a_string = input("Enter a string: ")

This line prompts user for total string length

string_length = int(input("Enter string length: "))

This line calls the defined function

align_right(a_string,string_length)

To configure a router / modem, what type of IP interface configuration should you apply to the computer you are using?

Answers

Answer:

hello your question has some missing parts

To configure a router / modem, what type of IP interface configuration should you apply to the computer you are using to access the device administration web app?

answer ; Gigabit interface

Explanation:

To configure a router/modem the type of IP interface configuration you should apply to the computer you are using to access the the devices administration web app should be Gigabit interface.

This is because Gigabit interface offers a very efficient and high band width and also a very high speed link which operates at 1000 Mbps, or 1 Gbps and it is the the standard used due to the speed it offers as it also offers improved performance over Ethernet

The U.S. continues to become more dependent on the global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. It is imperative that we safeguard this domain known as

Answers

Answer:

"Cyberspace " is the right answer.

Explanation:

Cyberspace seems to be an interactive computational environment, unconstrained by distance and perhaps other functional disabilities. William Gibson developed the word for representing a sophisticated augmented reality infrastructure in his story Neuromancer.The virtual space generated over the network through synchronized computing devices.

So that the above would be the correct answer.

Create an array named itemDescription containing the following item descriptions:
a) 1975 Green Bay Packers Football (signed), Item 10582
b) Tom Landry 1955 Football Card (unsigned), Item 23015
c) 1916 Army-Navy Game, Framed Photo (signed), Item 41807
d) Protective Card Sheets, Item 10041.

Answers

Answer:

var itemDescription = ["1975 Green Bay Packers Football (signed), Item 10582", "Tom Landry 1955 Football Card (unsigned), Item 23015", "1916 Army-Navy Game, Framed Photo (signed), Item 41807", "Protective Card Sheets, Item 10041"];

Explanation:

The following solution will work with javascript. Here we've stored different items in a variable named itemDescription.

You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?
A) 14
B) 16
C) 254
D) none of the above

Answers

Answer:

tiddies

Explanation:

sukk

Modify the DemoSalesperson application so each Salesperson has a successive ID number from 111 through 120 and a sales value that ranges from $25,000 to $70,000, increasing by $5,000 for each successive Salesperson. Save the file as DemoSalesperson2.java.

Answers

Answer:

Here is the modified DemoSalesperson2

public class DemoSalesperson2{ // class DemoSalesperson2

public static void main(String[] args) { //start of main() function body

SalesPerson[] sp = new SalesPerson[10]; // creates an array of SalesPerson object named sp

int start_id =111; // assign 111 to starting id number

double start_sal=25000; //assign 25000 to starting salary means salary will start from amount 25000

 for (int i =0; i<sp.length; i++) { //loop iterates until the value of loop variable i remains less then length of the array object sp

  sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i)); /*at each iteration  ID number from 111 through 120 and a sales value that ranges from $25,000 to $70,000, increasing by $5,000 for each successive is displayed using object array sp[] which calls the SalesPerson constructor to access id and sales */

 System.out.println(sp[i].getId()+"   "+sp[i].getAnnualSales() );  } } } /*uses object sp of class SalesPerson to access the methods getId which returns the id and getAnnualSales method which returns the annual sales, to display id and annual sales */

Explanation:

The question first requires a SalesPerson class with these requisites:

Class name: Salesperson.

Data fields for Salesperson: int ID number , double annual sales amount.

Methods: constructor SalesPerson() that requires values for both data fields, as well as get and set methods for each of the data fields.

So according to the complete question's requirement, I have implemented SalesPerson class:

public class SalesPerson {   // class name

//data members: integer type id variable and double type sales variable

   private int id;  

   private double sales;  

   public SalesPerson(int id_no, double annual_sales) {   //constructor that requires values for id and sales

       id = id_no;  

       sales = annual_sales;     }  

   public int getId() {   //accessor getId() method to get or access the value of id data field

       return id;     }  

   public void setId(int id_no) {   //mutator setId to set the value of id data field

       id = id_no;     }  

   public double getAnnualSales() {   //accessor getAnnualSales() method to get or access the value of sales data field

       return sales;     }  

   public void setAnnualSales(double annual_sales) { //mutator setAnnualSales to set the value of sales data field

       sales = annual_sales;     }  }

However you can use my DemoSalesperson2 application for your own SalesPerson class.

Now I will explain the working of for loop used in DemoSalesperson2

Iteration 1:

i=0

i<sp.length is true because length of sp[] is 10 so i<10

This means the body of for loop will execute.

The statement inside the body of for loop is :

 sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i));

class SalesPerson constructor is used to access the data members of SalesPerson class

start_id = 111

start_sal=25000

start_id+i = 111 + 0 = 111

start_sal+5000*(i) = 25000 + 5000 (0) = 25000

The values 111 and 25000 are stored to sp[0] means at the first index of the sp array.

System.out.println(sp[i].getId()+"   "+sp[i].getAnnualSales() );  

This statement uses sp object to get access to the getId and getAnnualSales methods to print the id number and sales amount.

So the output at 1st iteration is:

111   25000.0

Iteration 1:

The value of i is incremented to 1 so now i = 1

i<sp.length is true because length of sp[] is 10 so i<10

This means the body of for loop will execute.

The statement inside the body of for loop is :

 sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i));

class SalesPerson constructor is used to access the data members of SalesPerson class

start_id = 111

start_sal=25000

start_id+i = 111 + 1 = 112

start_sal+5000*(i) = 25000 + 5000 (1) = 25000 + 5000 = 30000

The values 111 and 25000 are stored to sp[1] means at the first index of the sp array.

System.out.println(sp[i].getId()+"   "+sp[i].getAnnualSales() );  

This statement uses sp object to get access to the getId and getAnnualSales methods to print the id number and sales amount.

So the output at 1st iteration is:

112   30000.0

The loop keeps iterating and the value of id is incremented by 1 and value of sales is increased by 5000 at every iteration.

This loop continues to execute until the value of i exceeds the length of sp array i.e. 10.

The values from iteration 1 to 8 following the above explanation are:

Iteration 1:

111    25000.0

Iteration 2:

112    30000.0

Iteration 3:

113    35000.0

Iteration 4:

114   40000.0  

Iteration 5:

115   45000.0  

Iteration 6:

116   50000.0                                                          

Iteration 7:

117   55000.0                                                                                                      

Iteration 8:                                                                                      

118   60000.0      

Iteration 9:                                                                                    

119   65000.0

Iteration 10:                                                                                    

120   70000.0

At iteration 11 the for loop body will not execute as value of i at 11th iteration is i = 10 and i<sp.length evaluates to false as i = sp.length because length of sp array is 10 and now the value of i is also 10. So the loop ends. Screenshot of the program and its output is attached.

Design a two-thread consensus protocol for a Stack class that provides two methods: push(x) and pop(). push(x) pushes a value onto the top of the stack, and pop() removes and returns the most recently pushed value.

Answers

Answer:

D. 10, 5.

Explanation:

"Players The files SomePlayers.txt initially contains the names of 30 football play- ers. Write a program that deletes those players from the file whose names do not begin with a vowel."

Answers

Answer:

I am writing a Python program that deletes players from the file whose names whose names do not begin with a vowel which means their names begin with a consonant instead. Since the SomePlayers.txt is not provided so i am creating this file. You can simply use this program on your own file.

fileobj= open('SomePlayers.txt', 'r')  

player_names=[name.rstrip() for name in fileobj]  

fileobj.close()  

vowels = ('a', 'e', 'i', 'o', 'u','A','E','I','O','U')

player_names=[name for name in player_names  

                     if name[0] in vowels]

fileobj.close()

print(player_names)

Explanation:

I will explain the program line by line.

First SomePlayers.txt is opened in r mode which is read mode using open() method. fileobj is the name of the file object created to access or manipulate the SomePlayers.txt file. Next a for loop is used to move through each string in the text file and rstrip() method is used to remove white spaces from the text file and stores the names in player_names. Next the file is closed using close() method. Next vowels holds the list of characters which are vowels including both the upper and lower case vowels.

player_names=[name for name in player_names  

                     if name[0] in vowels]

This is the main line of the code. The for loop traverses through every name string in the text file SomePlayers.txt which was first stored in player_names when rstrip() method was used. Now the IF condition checks the first character of each name string. [0] is the index position of the first character of each players name. So the if condition checks if the first character of the name is a vowel or not. in keyword is used here to check if the vowel is included in the first character of every name in the file. This will separate all the names that begins with a vowel and stores in the list player_names. At the end the print statement print(player_names) displays all the names included in the player_names which begin with a vowel hence removing all those names do not begin with a vowel.

#Write a function called "angry_file_finder" that accepts a #filename as a parameter. The function should open the file, #read it, and return True if the file contains "!" on every #line. Otherwise the function should return False. # #Hint: there are lots of ways to do this. We'd suggest using #either the readline() or readlines() methods. readline() #returns the next line in the file; readlines() returns a #list of all the lines in the file. #Write your function here!

Answers

Answer:

I am writing a Python function:

def angry_file_finder(filename):  #function definition, this function takes file name as parameter

   with open(filename, "r") as read:  #open() method is used to open the file in read mode using object read

       lines = read.readlines()  #read lines return a list of all lines in the file

       for line in lines:  #loops through each line of the file

           if not '!' in line:   #if the line does not contains exclamation mark

               return False  # returns False if a line contains no !

   return True     # returns true if the line contains exclamation mark

print(angry_file_finder("file.txt")) call angry_file_finder method by passing a text file name to it

                                                     

Explanation:

The method angry_file_finder method takes a file name as parameter. Opens that file in read mode using open() method with "r". Then it reads all the lines of the file using readline() method. The for loop iterates through these lines and check if "!" is present in the lines or not. If a line in the text file contains "!" character then function returns true else returns false.

There is a better way to write this method without using readlines() method.

def angry_file_finder(filename):

   with open(filename, "r") as file:        

       for line in file:

           if '!' not in line:  

               return False

   return True      

print(angry_file_finder("file.txt"))

Above method opens the file in read mode and just uses a for loop to iterate through each line of the file to check for ! character. The if condition in the for loop checks if ! is not present in a line of the text file. If it is not present in the line then function returns False else it returns True. This is a more efficient way to find a character in a file.

If a program writes more information into the computer's memory than the memory was designed to hold, it is a(n) ___________ attack

Answers

Answer:

Buffer-overflow.

Explanation:

If a program writes more information into the computer's memory than the memory was designed to hold, it is a buffer-overflow attack.

A buffer in computer technology can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM). In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For instance, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In a buffer-overflow attack, the hacker or attacker use the extra data to influence certain unauthorized actions such as getting privy informations, damaging a file, compromising a data, corrupting a software program etc.

The common types of buffer-overflow attacks are;

1. Heap-overflow attack.

2. Stack-overflow attack.

3. Unicode-overflow attack.

4. Integer-overflow attack.

In conclusion, the buffer-overflow attack could be prevented through the randomization of the address space.

A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.

Answers

Answer:

Threat assessment

Explanation:

A threat assessment deals with the potential for weaknesses within the existing infrastructure to be exploited.

Threat Assessment is further explained as the practice of determining or ascertaining the credibility and seriousness of a potential threat, and also the probability or chases of the threat will becoming a reality.

Threat assessment is separate to the more established procedure of violence-risk assessment, which seek to forcast an individual's general capacity and tendency to respond to situations violently. Instead, threat assessment aims to interrupt people on a route to commit "predatory or instrumental violence, the type of behavior connected with targeted attacks".

Answer:

Threat assessment

Explanation:

In an IT system, threat assessment is the analysis, evaluation and prevention of actions, events and operations that can greatly affect the system. It explores the potential for weaknesses within existing infrastructure to be exploited.

The threat assessment is a very important assessment that needs to be taken in virtually all domains. Here are a few reasons why it is important in an IT system;

i. Prevention of data loss

ii. Prevention of system or network of systems downtime

In carrying out threat assessment, one might need to do the following;

i. identification and prioritization of infrastructure including the software and hardware applications in the system.

ii. identification of potential threats such as system failure, natural disaster, unwanted access.

iii. identification of vulnerabilities in the system.

iv. analysing controls by determining who has access and who doesn't.

v. analysing the impact of a threat occurrence.

vi. documentation of analysis and evaluation results.

If we used an inadmissible heuristic in A* tree search, could it change the completeness of the search?

Answers

Answer:

No

Explanation:

If we used an inadmissible heuristic in A* tree search, it cannot  change the completeness of the search, and this is because as long as a heuristic function is bounded, then A* tree search would visit all the nodes available  and would definitely find a path to an existing goal

A* tree search is a  search strategy that is used to find and establish an efficient path between points, and the node in a search tree can be visited several times  as well

hich IP address is assigned to a network connection if the TCP/IP settings are set for static IP addressing and a DHCP server is running on the network?

Answers

Question:

Which IP address is assigned to a network connection if the TCP/IP settings are set for static IP addressing and a DHCP server is running on the network?

A) An Automatic Private IP Addressing (APIPA) IP address is used

B) An error will occur and no IP address is assigned unless it is manually assigned at a command prompt

C) The IP address configured in the Internet Protocol Version 4 (TCP/IPv4) dialogue box is used

D) The IP address assigned by the DHCP server is used

Answer:

The correct answer is C

Explanation:

After the settings are changed from automatic to static, one must enter the address manually using the dialogue box and the spaces provided therein.

Any attempt to click okay will display an error requesting that the IP address be entered manually.

Static IP addresses are used when you don't want the Internet Protocol (IP) address to change.

Cheers!

Which term describes the order of arrangement of files and folders on a computer? is the order of arrangement of files and folders.

Answers

Answer:

Organization

Explanation:

The term that describes the order of arrangement of files and folders on a computer is organization. It is very important the organization of the files and folders to be effective, in order to work with them quickly and efficiently.

Answer:

The term that describes the order of arrangement of files and folders on a computer is organization.

Explanation:

How could using WellConnect help you with time management and in personal health and wellness?

Answers

Answer:

Well Connect help in personal health and wellness

Explanation:

Well Connect is a collaboration of the individuals, and it focused on optimizing the experience of health. Rochester improves healthcare. Well, Connect created. Half of the adults have a physical, mental health condition. Chronic conditions are acute conditions as they cannot be cured. They manage and prevented it. They manage healthcare. Well Connect supports individuals. Well Connect brings the public health community to create a unified system. It is designed to develop relationships with healthcare. Everyone is involved in Well Connect with passion.

When discussing the behavior of vulnerability assessments which choice will exploit a weakness?
a) Penetration test
b) Vulnerability scan
c) Intrusive
d) Gray box
e) Credentialed vulnerability scan
f) Non-credentialed vulnerability scan

Answers

Answer:

a) Penetration test

Explanation:

A penetration test, often referred to as a pen test, is part of important process in the development of internet facing service. It is a process of determining if vulnerabilities are actually exploitable in a particular environment.

In other words, it is a process that involves a simulated cyber attack against computer system to check for exploitable vulnerabilities or attempts to actively exploit weaknesses in an environment.

Hence, when discussing the behavior of vulnerability assessments the choice that will exploit a weakness is PENETRATION TEST.

When discussing the behavior of vulnerability assessments, the choice which will exploit a weakness is: A) Penetration test.

Cyber security can be defined as a preventive practice to systematically protect computers, software applications (programs), networks, electronic devices, servers and user data from potential attack, damage, theft or an unauthorized access, especially through the use of technologies, frameworks, integrity principles, processes, penetration test and network engineers.

A vulnerability can be defined as a weakness in an automated internal control system and security procedures, which may be exploited by an attacker (hacker) to gain unauthorized access to the data stored on a computer system or disrupt the information system.

Basically, vulnerability assessments can be used in the following ways:

Identify loopholes, risks and security threats. Prioritize and enhance an information system.Mitigate potential security threats.

A penetration test is also referred to as pen test or ethical hacking and it can be defined as a cybersecurity technique that simulates a cyber attack against a user's computer system, so as to identify, test an check for exploitable vulnerabilities in a web software, network, etc.

This ultimately implies that, a penetration test avails an end user the ability to exploit a weakness and potential security threats during vulnerability assessments.

Write a Java program to get the values stored in a four-by-five array of integers and store those values in a one-dimensional array referred by the name sorted1Darray . This array will have all the numbers in increasing order (remember the bubble sort!!) !

Answers

Answer:

done

Explanation:

int a[][] = new int[4][4];

Random r = new Random();

 

for(int i=0;i<4;i++)

for(int j=0;j<4;j++)

{

a[i][j]=r.nextInt()%100;

}

 

int sorted1Darray[] = new int [16];

int k=0;

 

for(int i=0;i<4;i++)

for(int j=0;j<4;j++)

sorted1Darray[k++]=a[i][j];

 

//now sorting using bubble sort

for(int i=0;i<16;i++)

for(int j=0;j<16;j++)

if(sorted1Darray[i]<sorted1Darray[j])

{

int t= sorted1Darray[i];

sorted1Darray[i]=sorted1Darray[j];

sorted1Darray[j]=t;

}

System.out.println("Sorted array:");

for(int i=0;i<16;i++)

System.out.print(sorted1Darray[i]+" ");

System.out.println();

Kaylen has been working on his computer and notices that the screen seems to be flickering. The monitor is not turning on and off, and the monitor indicator light stays on. The monitor does not turn off when the screen flickers. What is the most likely source of the problem?

Answers

Answer:

Screen flickering is usually caused by an incompatible app or display driver. It could also be caused by a bad HDMI/VGA connection to the monitor.

Hope it helps ! :)

In e-mail, SSL/TLS provides ________. link encryption end-to-end encryption both link encryption and end-to-end encryption neither link encryption nor end-to-end encryption

Answers

Answer:

link encryption

Explanation:

In e-mail, SSL/TLS provides link encryption.

The SSL is an acronym for Secured Socket Layer and it is one of the secured way of authenticating and encrypting data between a computer and the mail server.

In the case of a TLS, it is an acronym for Transport Layer Security and it basically is used for providing authentication and encryption of data between two communicating systems on a network.

This ultimately implies that, SSL/TLS are standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. The SSL/TLS are an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.

Write the code to read 3 input values for the length, height and width of a cuboid, then calculate the area and circumference.

Answers

Answer:

length = float(input("Enter the length: "))

height = float(input("Enter the height: "))

width = float(input("Enter the width: "))

area = 2 * (length * height + height * width + width * length)

circumference = 4 * (length + height + width)

print("The area is: " + str(area))

print("The circumference is: " + str(circumference))

Explanation:

*The code is in Python.

Ask the user to enter the length, height and width

Calculate the area and circumference using the formulas and print them

Create a program that compares the unit prices for two sizes of laundry detergent sold at a grocery store.

Answers

Complete Question:

Create a program that compares the unit prices for two sizes of laundry detergent sold at a grocery store. Console Price Comparison Price of 64 oz size: 5.99 Price of 32 oz size: 3.50 Price per oz (64 oz): 0.09 Price per oz (32 oz): 0.11

Using Python

Answer:

This program does not make use of comments (See explanation section)

price64 = float(input("Price of 64 oz size: "))

price32 = float(input("Price of 32 oz size: "))

unit64 = price64/64

unit32 = price32/32

print("Unit price of 64 oz size: ", round(unit64,2))

print("Unit price of 32 oz size: ", round(unit32,2))

if unit64>unit32:

     print("Unit price of 64 oz is greater" )

else:

     print("Unit price of 32 oz is greater" )

Explanation:

This line prompts the user for the price of 64 oz size

price64 = float(input("Price of 64 oz size: "))

This line prompts the user for the price of 32 oz size

price32 = float(input("Price of 32 oz size: "))

This line calculates the unit price of 64 oz size

unit64 = price64/64

This line calculates the unit price of 32 oz size

unit32 = price32/32

This next two lines print the unit prices of both sizes

print("Unit price of 64 oz size: ", round(unit64,2))

print("Unit price of 32 oz size: ", round(unit32,2))

The next line compares the unit prices of both sizes

if unit64>unit32:

This line is executed if the unit price of 64 oz is greater than 32 oz

     print("Unit price of 64 oz is greater" )

else:

This line is executed, if otherwise

     print("Unit price of 32 oz is greater" )

Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within main(), it calls a function called printIt() and passes the income value to printIt(). The printIt() function evaluates the income, and if the number is over 90000, it prints a congratulatory message. If the income is not over 90000, it prints a message of encouragement, like "You WILL make $50,000, if you keep going."

Answers

Answer:

I am writing a C program:

#include <stdio.h> //to use input output functions

void printIt(double annual_in){ //function printIt

   if(annual_in >90000) //check if the income is greater than 90000

   printf("Congratulations. Doing great!"); //print this message if income value is greater than 90000

   else //if annual income is less than 90000

   printf("You WILL make $50,000, if you keep going"); } //print this message if income value is less than 90000

int main() //start of main() funciton body  

{   double income; //declares a double type variable income to hold annual income value

   printf("Enter annual income: "); //prompts user to enter annual income

   scanf("%lf",&income); //reads income value from user

   printIt(income); } // calls printIt method by passing input income to that function

     

Explanation:

The program is well explained in the comments mentioned with each statement of the program. The flowchart is attached.

First flowchart flow1 has a separate main program flowchart which reads the income and calls printIt function. A second flowchart is of prinIt() method that checks the input income passed by main function and displays the corresponding messages and return.

The second flowchart flow2 is the simple flowchart that simply gives functional description of the C program as flowchart is not where giving function definitions is important. Instead of defining the function printIt separately for this C program, a high-level representation of functional aspects of this program is described in second flowchart while not getting into implementation details.

If a process does not call exec after forking, A. the program specified in the parameter to exec will replace the entire process B. all the threads should be duplicated C. all the threads should not be duplicated D. none of above

Answers

Answer:

b) all the threads should be duplicated

Explanation:

The fork provides a process to start a new one, and the new process is not the same program. The exec system call com in play. Exec replaces the currently running process with information. The process is launching a new program firstly fork and create a new process. Exec load into memory. Fork copies of all attribute the new process except for memory. A clone system call implements the kernel fork. Forking provides the existing process. And the thread should be duplicated.

Open source companies like Ethereum and Codius are enabling Smart Contracts using blockchain technology.

a. True
b. False

Answers

Answer:

True

Explanation:

Ethereum uses Smart Contracts Blockchains and one of the programmers actually explained how it works at a DC Blockchain Summit.

Answer:

True.

Explanation:

In 2018, Cryptanite Blockchain Technologies Corp. (CSE: NITE), a Boulder-based blockchain technology company, today announced the launch of hosting capabilities with Codius, an open-source platform that enables the hosting of smart contracts and apps powered by the Ripple blockchain. Publicly listed in both Canada and in Germany, Cryptanite is one of the first companies to market with Codius’ hosting capabilities.

Other Questions
What is the equation for a straight line that would allow you to predict the value of Y from a given value of X. That is, calculate the value of "a" and the value of "b" and then substitute the 2 values into the generic equation (Y = a + bX) for a straight line. (Hint: calculate "b" first) Can you please say if the point is on the line? 1. List the conjugate acid or conjugate base for each chemical. a. The acid HF b. The base KOH c. The base NH3 d. The acid HNO3 e. The acid HCOOH f. The base CH3NH2 PLZZZZZZ HLPPPPP MEEEEEEEE what is the factorization of the polynomial graphed below? assume it has no constant factor. write factor as a polynomial in descending order Eileen has a hard time studying because her back starts to bother her. In this case, how can she make her studying environment more effective?She can find a more comfortable chair.She can have more resources available.She can move to an area that is isolated.She can choose an area with more light. Correct all errors in the use of abbreviations and numbers in the passage below. Type your changes all in CAPITALS. Mr. Jas. Boone has lived at three twenty-eight Newton Terr. since Apr. nineteen hundred and sixty-three. He is a devoted outdoorsman even though he weighs only one hundred and thirty Ibs. and stands a little over 5 ft. He walks five mi. every day and treats his own illness, instead of sending for a Dr. Recently he persuaded Hon. Smith to accompany him to the V.A. hospital where the sts. are quiet and the bldgs. are beautiful to the eye. Late in the P.M. he is likely to call his friends Chas. Williams, Geo. Glass, Eliz. Bowen, and etc. over for apples and popcorn before they go for a long hike in the cool of the eve. 365 days of the year, Jas. is out there walking the hwys and byways. He says if he had a $ for every mi. he's walked, he'd be a rich man. Did americans become involved in the pacific region in the latter half of the 19th century? Which is the best hypothesis for the scientific question "How does light intensity affect the rate of photosynthesis?"O Light intensity, CO, concentration, and temperature are factors that determine the rate of photosynthesis.O Light intensity has no elfect on the rate of photosynthesis.If the distance between the source of light and the plant is increased, the rate of photosynthesis will decrease.O Light intensity has an impact on the rate of photosynthesis.NextSubmitSave and ExitMark this and return Which equation represents the total cost (c) of purchasing cans of vegetables(v) at a price of $1.18 per can? What is the total cost to purchase 98 cans of vegetables? Question 10 options: A) c = 1.18v; $83.05 B) v = 1.18c; $83.05 C) c = 1.18v; $115.64 D) v = 1.18c; $115.64 Suppose that a population is known to be normally distributed with = 2400 and = 210. Of a random sample of size n = 8 is selected, calculate the probability that the sample mean will exceed 2,500. a+2=6 explain pkleaseeeeeeeeeeeeeeee What was the first women's college in the United States?A) Harvard B) Yale C) Mount Holyoke D) William and Mary The power in watts,P, that is generated by a certain electric circuit depends on the current in amperes ,i, and can be modeled by the equation P=20(i-3)^2+180, Where i>3. Which of the following gives the value of i in terms of P? i=3+2squareroot5(P-180) i=3+1/2sq p-180/5 I NEED HELP PLEASE, THANKS! :) Explain why an organization's firewall should block outgoing packets the source addresses of which are not in the organization's address space. a right square pyramid has a slant height of 20 feet, and the length of a side of the base is 32 feet. what is the height, h, of the pyramid? Please help me find the sign of f Verb Tenses. A (on the phone): Honey, I (be) ______________ home late tonight. Theres a problem at work. B: Thats OK. I (not, start) _____________ to make dinner until you (come) _____________ home. Sam is rowing a boat away from a dock. The graph shows the relationshipbetween time and Sam's distance from the dock. Evaluate the function for aninput of 9. Create a birthday Polynomial with 07.01.2006