a packet analyzer is a program that can enable a hacker to do all of the following except ________.

Answers

Answer 1

A packet analyzer is a computer network that has the ability to intercept and log traffic that flows through the network of a computer. A packet analyzer is a program that can enable a hacker to do all of the following except;

D) Launch a denial of service (DoS) attack on your computer

Since it is able to read and capture the raw data moving through a network, hackers can use a packet analyzer to decode the details in a user's debit card.

Identity theft can be executed and passwords can be captured using this program.

However, the computer's network cannot be shut down with this program. Therefore, option D is right.

Options:

A) Use your debit card information to purchase items illegally

B) Assume your identity

C) Steal your logons and passwords for various accounts

D) Launch a denial of service (DoS) attack on your computer

Learn more here:

https://brainly.com/question/14390016


Related Questions

What is the output of the following program? (Show your work)

int x = 3, y = 2;
System.out.println("x = " + y);

x = 5 + y * 7 % 3;


y = x - y * x - 3 / 2;


System.out.println("x = " + x);
System.out.println("y = " + y);

Answers

Answer:

x = 2

x = 7

y = -8

Explanation:

int x = 3; (here the variable of type int called x is declared and given the value 3)

int y = 2; (here another variable of type int called y is declared and given the value 2;

System.out.println("x = " +y ); (this instruction will print the value of y in the console terminal but deceivingly saying that the value belongs to x variable. So whoever reads will read "x = 2" instead of "x = 3" which would be the correct value associated with x.

x = 5 + y * 7 % 3; (here the value of x is changed from 3 to 5 + y * 7 % 3. What this means is that the first value of y (2) is multiplied by 7 and then get the mod of division 14 / 3 which is 2. Then added to 5. So the final result is 7 which is now the new value of x)

y = x - y * x - 3 / 2 (same as the above but for the value of y: here - 2 is multiplied by 7 and - 3 is divided by 2. Now we have 7 - 14 - 1.5 which is -8.5 but since you specified the variable type was an int and not double or float, then the program ignores significant numbers, so it ignores the .5 or whatever comes after the point instead of rounding it. PS: [So for instance if the result was 8.9, the value printed would be 8])

System.out.println("x = " + x); (prints the new value of x but this time it does not deceive the reader)

System.out.println("y = " + y); (prints the new value of y, and the letter y is shown in the screen for the first time with the correct value associated)

Your computer has a software problem. Which of the following will NOT help you fix your 3 issue?

A- remove all media from drives
B- run anti-virus software
C- reinstall the operating system
D- install pirated software ​

Answers

Answer:

D- install pirated software ​

Explanation:

Installing pirated software (depending on where you get it from) will most likely cause more harm than help.

Que compone una maquina Rube Goldberg (operadores mecánicos- maquinas simples – mecanismos)

Answers

Answer:

dominoes, fans, PVC pipe, magnets, duct tape, marbles, cups or bowls, miniature toy cars, paper towel tubes, string.

------------------------------------------------------------------------------------------------------------

dominó, abanicos, tubos de PVC, imanes, cinta adhesiva, canicas, tazas o cuencos, carros de juguete en miniatura, tubos de toallas de papel, cuerdas.

Explanation:

the term __________ refers to the expression that defines the quantity to be maximized or minimized in a linear programming model.

Answers

The answer is: objective function.

the term “objective function” refers to the expression that defines the quantity to be maximized or minimized in a linear programming model.

the term objective function refers to the expression that defines the quantity to be maximized or minimized in a linear programming model.

What is objective function?

The objective function is a mathematical equation that describes the target production output that corresponds to profit maximization in relation to production.

It then uses the correlation of variables to calculate the final outcome value. Based on a collection of constraints and the relationship between one or more decision variables, an objective function attempts to maximize profits or minimize losses.

Therefore, In a linear programming model, the term objective function refers to the expression that defines the quantity to be maximized or minimized.

Learn more about the objective function, refer to:

https://brainly.com/question/29185392

#SPJ5

Activity Sheet 2
A.Illustrate how to create the object below using draw and modify commands.​

Answers

Answer:

Vjfxfffccvvvvvv

Explanation:

Hgvjhgxxgyjjbvccjkn Hugh bună vvvvhg un www buukbbchfcvbvc. Hggvhhvbhchgx

Question 14 of 20
"Businesses around the world all need access to the same data, so there
needs to be one type of information system that is designed to offer it." Why
is this statement false?
O A. This statement is false because there already is only one type of
information system.
B. This statement is false because the data that the Internet
produces is never the same.
1
O C. This statement is false because different businesses have
different information needs.
O D. This statement is in fact correct; this is where the field of
information technology is heading.
SUBMIT

Answers

Answer:

This statement is false because there already is only one type of

information system.

How Powerpoint is useful in education aspect?

Answers

Answer:

(Hope this helps can I pls have brainlist (crown)☺️)

Explanation:

PowerPoint may be a useful tool in the classroom for presenting content and encouraging student learning. PowerPoint may be used to present graphics that would be difficult to bring to class otherwise. PowerPoint may be a useful tool in the classroom for presenting content and encouraging student learning.

It improves learning by giving pupils a greater comprehension of the subject and inspiring them. It meant that technology-based instruction had a considerable favourable impact on students' grades. Analyses revealed that the experimental group students outperformed the control group.

Can anyone lend me a computer?

Answers

Answer: No

Explanation:

Answer:

no

Explanation:

Select the correct answer.

The local authorities indicate that a film crew shooting on an abandoned bridge need to have special permission. Which member of the crew is responsible for acquiring this permission?

A.

location manager

B.

producer

C.

director

D.

set designer

Answers

Location manager is a member of the film crew which is responsible for

getting permits from the police and relevant authorities.

The location manager is responsible for finding appropriate locations,

securing permits and giving notice to the neighbors to ensure the smooth

running of the film production.

In this scenario, the film crew known as the location manager will need to

take permission to shoot the movie on an abandoned bridge from the local

authorities.

Read more on https://brainly.com/question/19541645

What areas does ABET provide accreditation?
students
programs
institutions
teaching staff
industries

Answers

It is a form of quality assurance for programs in the areas of applied and natural science, computing, engineering, and engineering technology. Our accreditation is recognized globally as evidence that a program meets the standards set by its technical profession.

"We are a nonprofit, non-governmental agency that accredits programs in applied and natural science, computing, engineering and engineering technology." - ABET

suggest me anime genre : adventure ecchi​

Answers

HUMAGUSHIE that’s is the genre of ADVENTURE ECCHI

your network settings prevent content from loading privately

Answers

Answer:

what what what what what what

suggest any complete anime......?​

Answers

Plastic love and maybe your lie in April?

Digital photography occurred in what age?

Answers

Answer:

The history of digital photography as we know it began in the 1950s. In 1951, the first digital signals were saved to magnetic tape via the first video tape recorder. Six years later, in 1957, the first digital image was produced through a computer by Russell Kirsch.

Dom is a software developer who likes to tweak his computer's OS to make it work the way he wants it to. The OS he is most likely to use is _____.

A. Mac
B. Linux
C. MS-DOS
D. Windows

Answers

Answer:

Linux

Explanation:

Linux-based operating systems are open-source, and open-source software can be modified. Mac, MS-DOS, and Windows are all closed-source means we can't see the source code hence we can't modify it.

I hope this helps <3

A programmer wants to determine whether a score is within 10 points of a given target. For example, if the target is 50, then the scores 40, 44, 50, 58, and 60 are all within 10 points of the target, while 38 and 61 are not.

Which of the following Boolean expressions will evaluate to true if and only if score is within 10 points of target ?

Answers

Answer:

(target - 10 ≤ score) AND (score ≤ target + 10)

Explanation:

(target - 10 ≤ score) AND (score ≤ target + 10).

What are Boolean expression?

A logical assertion that can only be TRUE or FALSE is known as a Boolean expression. As long as both sides of the expression have the same fundamental data type, boolean expressions can compare data of any kind.

Oracle OLAP evaluates this expression by comparing each value of the variable actual to the fixed value 20,000.

Unless parentheses indicate a different evaluation order, operators with equal priorities are evaluated from left to right. When the truth value has been determined, the evaluation is stopped.

Therefore, (target - 10 ≤ score) AND (score ≤ target + 10).

To learn more about Boolean expressions, refer to the link:

https://brainly.com/question/13265286

#SPJ6

b. Differentiate Operation System from other software. give me 4-5 sentences pls.

Answers

Answer:

An operating system or OS is system software that manages computer hardware, software resources, and provides common services for computer programs. All operating systems are system software. Every desktop computer, tablet, and smartphone includes an operating system that provides basic functionality for the device while on the other hand The System software is a type of computer program that is designed to run a computer’s hardware and application programs it controls a computer’s internal functioning, chiefly through an operating system. It also controls peripherals devices such as monitors, printers, and storage devices.

Explanation:

Why is this happening when I already uploaded files to my drive?

Answers

Answer:

u have to upload it to your drive first

Explanation:

Good things to keep track of about people in your Career Network include: a. contact information, including how to spell their name. b. how you came to know them (introduced by a friend, at a career fair, search on LinkedIn, etc.). c. notes about your last interaction and plans for your next interaction. d. only a and b above e. all of the above

Answers

Answer:

mi pareceres que es la B

Explanation:

Software that communicates with the hardware and allows other programs to run. It is comprised of system software, or the fundamental files your computer needs to boot up and function. Every desktop computer, tablet and smartphone includes an operating system. Common desktop systems include Windows, OS X and Linux.

options:

Application Process


Boot Process


Computer Process


Operating Process

Answers

Answer:An operating system, or "OS," is software that communicates with the hardware and allows other programs to run. It is comprised of system software, or the fundamental files your computer needs to boot up and function.

Explanation:

Which protocol is responsible for transporting files between a client and a server?

HTTP
FTP
LLP
TCP

Answers

Answer:

FTP

Explanation:

FTP stands for File Transfer Protocol.

Which statement is true with respect to Java?

A.
Java programs are not compiled, only interpreted.

B.
Intermediate bytecode is created by the JIT.

C.
Bytecode is platform independent.

D.
The JVM creates object code after compiling.

Answers

Java is a high level programming language.

The true statement is (c) Bytecode is platform independent.

First, java programs are compiled and interpreted

This means that (a) is not true

Secondly Just-In-Time (JIT) does not create intermediate bytecodes, and Java virtual machine (JVM) does not create object codes.

However, java programs are compiled to an instruction set for the JVM; this instruction set is referred to as the byte code.

And the byte code is platform-independent.

Hence, the true option is (c)

Read more about java programming language at:

https://brainly.com/question/2266606

Answer:

C) Bytecode is platform independent

Explanation:

Just got it right on ASU

What do people in the movie e.t think about the character E.T


please answer its due in 8:30 PM pleaeee

Answers

Answer:

They were scared of him then they felt devotion to him.

Explanation:

Laura is confused with the spelling of the word pronunciation. She types the word as pronounciation. Which feature of the Autocorrect tool should she use, so that the word processor automatically corrects it? PLS HELP!!!

Answers

The right answer is “replace”

write a q basic program to find the sum of all the even numbers from 1 to 50​

Answers

Answer:

CLS

M=2

SUM=0

DO WHILE M<=50

SUM=SUM+M

M=M+2

LOOP

PRINT " The sum of all even numbers between 1 and 50 is"; sum

write the importance of software In computer ​

Answers

Answer:

Microsoft word, Excel, Access, Power point, Microsoft windows...........

Explanation:

A two-dimensional array of ints with 4 rows, has been created and assigned to a2d. Write an expression whose value is the total number of ints that could be stored in the entire array.

Answers

Arrays are used to represent data in rows and columns

The expression that represents the number of int the array can store is 4c

From the question, we have:

The number of rows is given as: 4The number of columns is unknown; assume the number of columns to be c.

Also from the question, we understand that the array is of integer type.

So, the number (n) of int the array can store is the product of the rows and the columns

i.e.

[tex]\mathbf{n = Rows \times Column}[/tex]

So, we have:

[tex]\mathbf{n = 4\times c}[/tex]

Multiply

[tex]\mathbf{n = 4c}[/tex]

Hence, the expression that represents the number of int the array can store is 4c

Read more about arrays at:

https://brainly.com/question/14664712

True or False!
Answer​

Answers

Answer:

1) true

2) true

3) false, domain name, not domain name suffix.

4) true

5) true

6) true

7) true

8) false, ... forgot the other name ...

9) true

10) false, it can also contain pics and vids.

11) true

12) true

13) false, ... can't remember the name ...

14) true

15) true

An organizations help desk is flooded with phone calls from users stating they can no longer access certain websites.
The help desk escalates the issue to the security team, as these websites were accessible the previous day.
The security analysts run the following command: ipconfig /flushdns, but the issue persists. Finally, an analyst changes the DNS server for an impacted machine, and the issue goes away.
Which of the following attacks MOST likely occurred on the original DNS server?[...]
a. DNS cache poisoning
b. Domain hijacking
c. Distributed denial-of-service
d. DNS tunneling

Answers

The distributed denial-of-service (DDoS) attack is known to be a malicious  attack. Distributed denial-of-service attacks can mostly likely occurred on the original DNS server.

Distributed denial-of-service often tires to hinder the normal traffic of the said targeted server, service or network by filling up the target or its environment/ infrastructure with a flood of Internet trash.

The symptom of a DDoS attack is that the site or service will suddenly run slow or become unavailable. Traffic analytics tools can help one to know  the signs of a DDoS attack. DDOS attack can be prevented by  switching DNS servers.

Learn more from

https://brainly.com/question/13977863

If you clean your camera’s lens incorrectly, what might you damage?

Group of answers:

1. the aperture port
2. the outer coating
3. the inner coating
4. the battery port

Answers

Answer:

2. the outer coating

Answer:

Its number 2 the outer coating

Explanation:

Other Questions
What is the smallest 9 digit number of the form aaa, aaa, aaa such that it is divisible by 9? (Notice that all the digits of this number must be the same!) Each cube in the prism is one cubic unit.What is the volume of this rectangular prism?Enter your answer in the box. giving brainlist!!!!"The Destructors" (Part 1)The quotation above describes Blackie as what type of gang leader? Use the information given to enter an equation in standard form.(27,31) and (37,45) are on the line.WHATS THE ANSWER TO THIS?? Look at the article "How Americans See the Future of Space Exploration, 50 Years after the First Moon Landing."Which prediction about the text is supported by its genre characteristics?o It will include data and facts about space exploration.o It will tell a humorous story about a trip into space.O It will provide instructions for how to become an astronaut.It will present the author's opinions about space travel. Elizabeth uses 33.15 ounces of granola for 15 servings of trail mix.If each serving contains the same amount of granola, how much granola is in eachserving? PMTA are the 4 stages of... What is a way of describing of stratus clouds Would a series of bank robberies localized to a particular country be considered a planetary problem? Explain.Please answer this question in the limit of 4 hours because I have to turn this in and I can't wait more than that since the assignment is being graded today. What is the equation of the blue line? Plants combine water (liquid) and carbon dioxide (gas) to make sugar (solid) during photosynthesis. This is an example of__. in a well written paragraph. Was the American government appropriate in the ways they directed communication about the war? Explain your answer. write a relations between wavelength frequency and velocity for a sound wave 50 POINTSBecky works as a cashier at a local grocery store. The pathway in the human services cluster that Becky works in is:A. Counseling and Mental health services.B. Family and community services.C. Early childhood development.D. Consumer services.If you don't know don't answer, I don't want any wrong answers... Find the length of DF Solve the following system of equations graphically. Click on the graph until the correct solution of the system appears.y = -3x - y = 8 What percent of the bottle of apple juice is water? True or false if blood is pumped by the brain? GEOMETRY Find the the area of the polygon with the given vertices.C(1,1) D(1,4)E(4,4)F(4,1)pls give answerworth 100 In ANOP, NP is extended through point P to point Q, m_OPQ = (9x 19),mZPNO = (2x + 5), and mZNOP = (3x + 16. Find mZNOP.