A TCP entity opens a connection and uses slow start. Approximately how many round-trip times are required before TCP can send N segments

Answers

Answer 1

Answer:

Round trip times required =  log2N

Explanation:

The round-trip times required before TCP can send N segments using a slow start is log2N. we can arrive at this by looking at the mode of operation of TCP which is  at the 1st time of using a TCP it starts the congestion window as 1 then it  sends an initial segment. When the acknowledgement of the initial segment arrives, TCP increases the congestion window to 2 and then sends 2 segments, When the 2 acknowledgements of the segments sent out arrives, they each increase the congestion window by one, thereby increasing the congestion window to 4 . therefore it takes   log2N round trips before TCP can send N segments


Related Questions

Which of the following peripheral devices can be used for both input and output? mouse touch screen on a tablet computer printer CPU

Answers

Answer:

mouse printer CPU touch screen

Explanation:

on a tablet computer hope this helps you :)

Which of the following statements is true of an encrypted file? * The file can be read only by a user with the decryption key The file can be read by the creator and system administrator The file can not be opened again The file can be opened but not read again

Answers

Answer:

The file can be read only by a user with the decryption key

Explanation:

The way encryption works is it scrambles the data in a file following the rules of the encryption algorithm using a certain key to tell it how to scramble everything.

Without the key, the computer doesn't know how to decrypt it.

This is true no matter who has access to the file, be it a system administrator, a hacker, or even a legitimate user who has somehow lost access to the key

Strictly speaking, encryption can be broken, but, especially with modern encryption, that's a matter of centuries, and isn't really feasible

The statement that is true of an encrypted file is that The file can be read only by a user with the decryption key.

What is decryption key?

A decryption key is known to be a key that is given to Customers by a specific Distributor.

This key allows Customers to open and access the Software that they bought. The decryption key is a  mechanism that  permit  that a file can be read only by a user.

Learn more about decryption key from

https://brainly.com/question/9979590

Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. Sample output with inputs: 4.5 2.1 3.0

Answers

Answer:

def pyramid_volume(base_length,base_width,pyramid_height):

      return base_length * base_width * pyramid_height/3

length = float(input("Length: "))

width = float(input("Width: "))

height = float(input("Height: "))

print("{:.2f}".format(pyramid_volume(length,width,height)))

Explanation:

This line declares the function along with the three parameters

def pyramid_volume(base_length,base_width,pyramid_height):

This line returns the volume of the pyramid

      return base_length * base_width * pyramid_height/3

The main starts here

The next three lines gets user inputs for length, width and height

length = float(input("Length: "))

width = float(input("Width: "))

height = float(input("Height: "))

This line returns the volume of the pyramid in 2 decimal places

print("{:.2f}".format(pyramid_volume(length,width,height)))

Suppose that a class named ClassA contains a private nonstatic integer named b, a public nonstatic integer named c, and a public static integer named d. Which of the following are legal statements in a class named ClassB that has instantiated an object as ClassA obA =new ClassA();?

a. obA.b 12;
b. obA.c 5;
c. obA.d 23;
d. ClassA.b=23;
e. ClassA.c= 33;
f. ClassA.d= 99;

Answers

Answer:

b. obA.c 5;

d. ClassA.b=23;

f. ClassA.d = 99;

Explanation:

Java is a programming language for object oriented programs. It is high level programming language developed by Sun Microsystems. Java is used to create applications that can run on single computer. Static variable act as global variable in Java and can be shared among all objects. The non static variable is specific to instance object in which it is created.

How can technology efforts be reconciled to improve hazard/disaster preparedness, response, and mitigation to insure systems sustainability, data integrity, and supply chain protection?

Answers

Answer:

Prediction

With regard to preparedness for hazard/disaster, technology such as AI are being explored to see how they can help to predict natural disaster.

If there is a breakthrough in this space, it will drastically reduce the negative impact of natural disasters such as floods and earthquakes as people will become ready to respond to them and mitigate their effects where possible.

In agriculture, there are factors which come together to bring about flooding. Flooding is one of the major disasters which cripples entire value chains. With a potential threat anticipated or predicted by AI, businesses can invest in technologies that can help protect the farms, farmland and other resources critical to such a supply chain.

AI-powered technologies that provide prediction services often combine this advanced computing prowess with the ability to process big data.

Technology can reach places that are unreachable by humans

AI-powered robots will soon become the norm.

Presently there are self-learning and self instructing robots powered by Artificial Intelligence that have applications in warfare, manufacturing, deepsea diving and intelligence gathering, and transportation. It is not out of place to predict that in the next decade, scientists would have perfected rescue robots that can go into very unstable terrain that have been damaged by flood or earthquake and attempt a rescue of lives and property at a scale that has never been possible before.

Connectivity  

Connectivity helps people access to aid, resources that are critical for survival, transmission and receipt of life--saving information etc. CISCO has successfully used its technology called TacOps (short for Tactical Operations) successfully 45 times on over 5 continents.

Cheers!    

5.15 LAB: Count input length without spaces, periods, or commas Given a line of text as input, output the number of characters excluding spaces, periods, or commas. Ex: If the input is:

Answers

Answer:

Following are the code to this question:

userVal = input()#defining a variable userVal for input the value

x= 0#defining variable x that holds a value 0

for j in userVal:#defining for loop to count input value in number

   if not(j in " .,"):#defining if block that checks there is no spaces,periods,and commas in the value

       x += 1#increment the value of x by 1

print(x)#Print x variable value

Output:

Hello, My name is Alex.

17

Explanation:

In the above-given code, a variable "userVal" is defined that uses the input method for input the value from the user end, in the next line, an integer  variable "x" is defined, hold value, that is 0, in this variable, we count all values.

In the next line, for loop is defined that counts string value in number and inside the loop an if block is defined, that uses the not method to remove spaces, periods, and commas from the value and increment the value of x by 1. In the last step, the print method is used, which prints the calculated value of the "x" variable.    

 

Answer:

Explanation:#include <iostream>

#include<string>

using namespace std;

int main()

{

  string str;

   

cout<<"Enter String \n";

 

getline(cin,str);/* getLine() function get the complete lines, however, if you are getting string without this function, you may lose date after space*/

 

  //cin>>str;

 

  int count = 0;// count the number of characeter

  for (int i = 1; i <= str.size(); i++)//go through one by one character

  {

     

   

   if ((str[i]!=32)&&(str[i]!=44)&&(str[i]!=46))//do not count  period, comma or space

{

          ++ count;//count the number of character

      }

  }

  cout << "Number of characters are  = "; //display

cout << count;// total number of character in string.

  return 0;

}

}

Develop a simple game that teaches kindergartners how to add single-digit numbers. Your function game() will take an integer n as input and then ask n single-digit addition questions. The numbers to be added should be chosen randomly from the range [0, 9] (i.e.,0 to 9 inclusive). The user will enter the answer when prompted. Your function should print 'Correct' for correct answers and 'Incorrect' for incorrect answers. After n questions, your function should print the number of correct answers.

Answers

Answer:

2 correct answer out of 3

Define the missing method. licenseNum is created as: (100000 * customID) licenseYear, where customID is a method parameter. Sample output with inputs 2014 777:

Answers

Answer:

I am writing the program in JAVA and C++

JAVA:

public int createLicenseNum(int customID){  //class that takes the customID as parameter and creates and returns the licenseNum

       licenseNum = (100000 * customID) + licenseYear;  //licenseNum creation formula

       return(licenseNum);     }

In C++ :

void DogLicense::CreateLicenseNum(int customID){ //class that takes the customID as parameter and creates the licenseNum

licenseNum = (100000 * customID) + licenseYear; } //licenseNum creation formula

Explanation:

createLicenseNum method takes customID as its parameter. The formula inside the function is:

licenseNum = (100000 * customID) + licenseYear;

This multiplies 100000 to the customID and adds the result to the licenseYear and assigns the result of this whole expression to licenseNum.

For example if the SetYear(2014) means the value of licenseYear is set to 2014 and CreateLicenseNum(777) this statement calls createLicenseNum method by passing 777 value as customID to this function. So this means licenseYear = 2014 and customID  = 777

When the CreateLicenseNum function is invoked it computes and returns the value of licenseNum as:

licenseNum = (100000 * customID) + licenseYear;

                     = (100000 * 777) + 2014

                     = 77700000 + 2014

licenseNum = 77702014                                                                                                        

So the output is:

Dog license: 77702014          

To call this function in JAVA:

public class CallDogLicense {

public static void main(String[] args) {//start of main() function

    DogLicense dog1 = new DogLicense();//create instance of Dog class

dog1.setYear(2014); // calls setYear passing 2014

dog1.createLicenseNum(777);// calls createLicenseNum passing 777 as customID value

System.out.println("Dog license: " + dog1.getLicenseNum()); //calls getLicenseNum to get the computed licenceNum value

return; } }

Both the programs along with the output are attached as a screenshot.

Answer:

public int createLicenseNum(int customID){

  licenseNum = (100000 * customID) + licenseYear;

  return(licenseNum);    

}

Explanation:

Bharath has made a table of content for his document in Open Office, in which he wants to make few changes, but he is unable to make the changes. Give reason. Explain how he can make the necessary changes

Answers

Answer:

H cannot update it because it is probably protected.

If you cannot click in the table of contents, it is probably because it is protected. To disable this protection, choose Tools > Options > OpenOffice.org Writer > Formatting Aids, and then select Enable in the Cursor in protected areas section. If you wish to edit the table of contents without enabling the cursor, you can access it from the Navigator.

Explanation:

. To update a table of contents when changes are made to the document:

Right-click anywhere in the TOC.

From the pop-up menu, choose Update Index/Table. Writer updates the table of contents to reflect the changes in the document.

You can also update the index from the Navigator by right-clicking on Indexes > Table of Contents1 and choosing Index > Update from the pop-up menu.

When the code that follows is executed, a message is displayed if the value the user entersvar userEntry = (prompt("Enter cost:");if (isNaN(userEntry) || userEntry > 500 ) { alert ("Message");a. isn’t a number or the value in userEntry is more than 500b. isn’t a number and the value in userEntry is more than 500c. is a number or the value in userEntry is more than 500d. is a number and the value in userEntry is more than 500

Answers

Answer:

The answer is "Option b".

Explanation:

In the given-code variable "userEntry" is defined that prompt the user to input value and in the next step, the conditional statement is used, which checks the input value is not a number and greater than 500 with use of OR operator. if the condition is true it uses the alert box to print the message, that's why in this question except "choice b" all were wrong.

You suspect that a hacker has compromised a computer using one of its open ports. Which command would allow you to view the open ports on the computer

Answers

Answer:

[tex]netstat[/tex]

Explanation:

The netstat command displays network connections for TCP and can help to view the open ports on the computer.

Hope this helped!

Does clicking ads and pop ups like the one shown in this image could expose your computer to malware?

Answers

Answer: Yes, clicking adds/popups like the one in the image could cause your computer/electronic to catch viruses/malware.

Explanation: The cause to this is when you click an ad/popup you're exposing yourself to a potential dangerous/visious site. You're unaware to where the popup could bring you, and for all we know it could bring us to a fake site for a download which is really a visious malware to be downloaded to your device.

Individually or in a group find as many different examples as you can of physical controls and displays.a. List themb. Try to group them, or classify them.c. Discuss whether you believe the control or display is suitable for its purpose.

Answers

Answer:

Open ended investigation

Explanation:

The above is an example of an open ended investigation. In understanding what an open ended investigation is, we first of all need to understand what open endedness means. Open endedness means whether one solution or answer is possible. In other words it means that there may be various ways and alternatives to solve or answer a question or bring solution to an investigation.

From the definition, we can deduce that an open ended investigation is a practical investigation that requires students to utilize procedural and substantive skills in arriving at conclusion through evidence gathered from open ended research or experiment(as in not close ended, not limited to ready made options, freedom to explore all possibilities). This is seen in the example question where students are asked to explore the different examples of physical controls and displays and also discuss their observations. Here students are not required to produce a predefined answer but are free to proffer their own solutions

Q2) Answer the following:
1- Expression d=i++; causes:
a. The value of i incremented by 1
b- The value of i assigned to d
C- The value of i assigned to d then i incremented by 1
d- The value ol i incremented by 1 then assigned to d.
CO
SA​

Answers

Answer:

D

Explanation:

The value of i is incremented by one then assigned to d

what level of security access should a computer user have to do their job?

Answers

Answer:

A computer user should only have as much access as required to do their job.

Explanation:

A computer user should not be able to access resources outside of their job requirement, as this poses a potential attack vector for an insider threat.  By limiting the scope of resources to just what is needed for the user's specific job, the threat to the system or company can be mitigated with additional access control features for the computer user.  Never allow permission higher than what are needed to accomplish the task.

Cheers.

Append newValue to the end of vector tempReadings. Ex: If newValue = 67, then tempReadings = {53, 57, 60} becomes {53, 57, 60, 67}.
#include
#include
using namespace std;
int main() {
vector tempReadings(3);
int newValue = 0;
unsigned int i = 0;
tempReadings.at(0) = 53;
tempReadings.at(1) = 57;
tempReadings.at(2) = 60;
newValue = 67;
/* Your solution goes here */
for (i = 0; i < tempReadings.size(); ++i) {
cout << tempReadings.at(i) << " ";
}
cout << endl;
return 0;
}
2.Remove the last element from vector ticketList.
#include
#include
using namespace std;
int main() {
vector ticketList(3);
unsigned int i = 0;
ticketList.at(0) = 5;
ticketList.at(1) = 100;
ticketList.at(2) = 12;
/* Your solution goes here */
for (i = 0; i < ticketList.size(); ++i) {
cout << ticketList.at(i) << " ";
}
cout << endl;
return 0;
}
3. Assign the size of vector sensorReadings to currentSize.
#include
#include
using namespace std;
int main() {
vector sensorReadings(4);
int currentSize = 0;
sensorReadings.resize(10);
/* Your solution goes here */
cout << "Number of elements: " << currentSize << endl;
return 0;
}
4. Write a statement to print "Last mpg reading: " followed by the value of mpgTracker's last element. End with newline. Ex: If mpgTracker = {17, 19, 20}, print:
Last mpg reading: 20
#include
#include
using namespace std;
int main() {
vector mpgTracker(3);
mpgTracker.at(0) = 17;
mpgTracker.at(1) = 19;
mpgTracker.at(2) = 20;
/* Your solution goes here */
return 0;}

Answers

Answer:

Following are the code to this question:

In question 1:

tempReadings.push_back(newValue); //using array that store value in at 3 position

In question 2:

ticketList.pop_back(); //defining ticketList that uses the pop_back method to remove last insert value

In question 3:

currentSize = sensorReadings.size(); /defining currentSize variable holds the sensorReadings size value

In question 4:

cout<<"Last mpg reading: "<<mpgTracker.at(mpgTracker.size()-1)<<endl;

//using mpgTracker array with at method that prints last element value

Explanation:

please find the attachment of the questions output:

In the first question, it uses the push_back method, which assigns the value in the third position, that is "53, 57, 60, and 67 "In the second question, It uses the pop_back method, which removes the last element, that is "5 and 100"In the third question, It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10".In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".

Using data from interviews with ESCO executives conducted in late 2012, this study examines the market size, growth forecasts, and industry trends in the United States for the ESCO sector.

Thus,  It uses the "currentSize" variable to holds the "sensorReadings" size value, which is "10". In the fourth question, It uses the mpgTracker array with the "at" method, which prints the last element value, which is "20".

There are numerous types of gateways that can operate at various protocol layer depths.

Application layer gateways (ALGs) are also frequently used, albeit most frequently a gateway refers to a device that translates the physical and link layers. It is best to avoid the latter because it complicates deployments and is a frequent source of error.

Thus, Using data from interviews with Gateway executives conducted in late 2012, this study examines the market size, growth Esco size and industry trends in the United States for the Gateway.

Learn more about Gateway, refer to the link:

https://brainly.com/question/30167838

#SPJ6

a_____________ may have its value change during program execution. options. flowchart,counter, Algorithm,None of them​

Answers

Answer:

i think is "none of them"

What command would you use to place the cursor in row 10 and column 15 on the screen or in a terminal window

Answers

Answer:

tput cup 10 15

Explanation:

tput is a command for command line environments in Linux distributions. tput can be used to manipulate color, text color, move the cursor and generally make the command line environment alot more readable and appealing to humans. The tput cup 10 15 is used to move the cursor 10 rows down and 15 characters right in the terminal

An organization is planning to implement a VPN. They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. Which of the following would BEST meet this goal?a. Split tunnelb. Full tunnelc. IPsec using Tunnel moded. IPsec using Transport mode

Answers

Answer:

B. Full tunnel.

Explanation:

In this scenario, an organization is planning to implement a virtual private network (VPN). They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. The best method to meet this goal is to use a full tunnel.

A full tunnel is a type of virtual private network that routes and encrypts all traffics or request on a particular network. It is a bidirectional form of encrypting all traffics in a network.

On the other hand, a split tunnel is a type of virtual private network that only encrypts traffic from the internet to the VPN client.

Hence, the full tunnel method is the most secured type of virtual private network.

You bought a monochrome laser printer two years ago. The printer has gradually stopped feeding paper. Which printer component should you check first

Answers

Answer:

Pick up roller

Explanation:

you should first check the pickup roller component. This component is the part of the printer that picks paper up from the paper tray. The pickup roller links the printer and the paper. When the printer printer is running, the roller would take paper from the paper tray for the printer to print on. One of the issues it can have is Paper jam where the roller would stop turning so that it will no longer be picking papers up from the tray.

Agile Software Development is based on Select one: a. Iterative Development b. Both Incremental and Iterative Development c. Incremental Development d. Linear Development

Answers

Answer:

b. Both incremental and iterative development.

Explanation:

Agile software development is based on both incremental and iterative development. It is an iterative method to software delivery in which at the start of a project, software are built incrementally rather than completing and delivering them at once as they near completion.

Incremental development means that various components of the system are developed at different rates and are joined together upon confirmation of completion, while Iterative development means that the team intends to check again components that makes the system with a view to revising and improving on them for optimal performance.

Agile as an approach to software development lay emphasis on incremental delivery(developing system parts at different time), team work, continuous planning and learning, hence encourages rapid and flexible response to change.

Assign decoded_tweet with user_tweet, replacing any occurrence of 'TTYL' with 'talk to you later'.Sample output with input: 'Gotta go. I will TTYL.'Gotta go. I will talk to you later.code given:user_tweet = input()decoded_tweet = ''' Your solution goes here '''print(decoded_tweet)

Answers

Answer:

Here is the Python program:

user_tweet = input()

decoded_tweet = user_tweet.replace('TTYL', 'talk to you later')

print(decoded_tweet)

Explanation:

The program works as follows:

Suppose the input is:    'Gotta go. I will TTYL'

This is stored in user_tweet. So

user_tweet = 'Gotta go. I will TTYL'

The statement: user_tweet.replace('TTYL', 'talk to you later')  uses replace() method which is used to replace a specified string i.e. TTYL with another specified string i.e. talk to you later in the string stored in user_tweet.

The first argument of this method replace() is the string or phrase that is to be replaced and the second argument is the string or phrase that is to replace that specified string in first argument.

So this new string is assigned to decoded_tweet, after replacing 'TTYL' with 'talk to you later' in user_tweet.

So the print statement print(decoded_tweet) displays that new string.

Hence the output is:

Gotta go. I will talk to you later.

Given an array of integers check if it is possible to partition the array into some number of subsequences of length k each, such that:
Each element in the array occurs in exactly one subsequence
For each subsequence, all numbers are distinct
Elements in the array having the same value must be in different subsequences
If it is possible to partition the array into subsequences while satisfying the above conditions, return "Yes", else return "No". A subsequence is formed by removing 0 or more elements from the array without changing the order of the elements that remain. For example, the subsequences of [1, 2, 3] are D. [1], [2], [3]. [1, 2], [2, 3], [1, 3], [1, 2, 3]
Example
k = 2.
numbers [1, 2, 3, 4]
The array can be partitioned with elements (1, 2) as the first subsequence, and elements [3, 4] as the next subsequence. Therefore return "Yes"
Example 2 k 3
numbers [1, 2, 2, 3]
There is no way to partition the array into subsequences such that all subsequences are of length 3 and each element in the array occurs in exactly one subsequence. Therefore return "No".
Function Description
Complete the function partitionArray in the editor below. The function has to return one string denoting the answer.
partitionArray has the following parameters:
int k an integer
int numbers[n]: an array of integers
Constraints
1 sns 105
1 s ks n
1 s numbers[] 105
class Result
*Complete the 'partitionArray' function below.
The function is expected to return a STRING
The function accepts following parameters:
1. INTEGER k
2. INTEGER ARRAY numbers
public static String partitionArray (int k, List public class Solution

Answers

Answer:

Explanation:

Using Python as our programming language

code:

def partitionArray(A,k):

flag=0

if not A and k == 1:

return "Yes"

if k > len(A) or len(A)%len(A):

return "No"

flag+=1

cnt = {i:A.count(i) for i in A}

if len(A)//k < max(cnt.values()):

return "No"

flag+=1

if(flag==0):

return "Yes"

k=int(input("k= "))

n=int(input("n= "))

print("A= ")

A=list(map(int,input().split()))[:n]

print(partitionArray(A,k))

Code Screenshot:-

Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scenario where the use of DPI may be considered a privacy concern.

Answers

Answer:

Answered below

Explanation:

Deep packet inspection is a kind of data processing that thoroughly inspects data sent over a computer network and acts on it by rerouting, logging or blocking it. Uses of DPI include;

To ensure that data is in the correct format, internet censorship, to check for malicious code, and also eavesdropping.

DPI uses port mirroring and optical splitter to acquire packets for inspection. It combines the functionality of an intrusion detection system and intrusion prevention system with a traditional stateful firewall.

DPI is therefore helpful in perimeter security by keeping unauthorized users out and at the same time protecting authorized users from attack. Privacy concerns have been raised over the inspection of content layers of internet protocols such as in the case of censorship and government regulations and control.

Where can you find detailed information about your registration, classes, finances, and other personal details? This is also the portal where you can check your class schedule, pay your bill, view available courses, check your final grades, easily order books, etc. A. UC ONE Self-Service Center B. Webmail C. UC Box Account D. ILearn

Answers

Answer:

A. UC ONE Self-Service Center

Explanation:

The UC ONE Self-Service Center is an online platform where one can get detailed information about registration, classes, finances, and other personal details. This is also the portal where one can check class schedule, bill payment, viewing available courses, checking final grades, book ordering, etc.

it gives students all the convenience required for effective learning experience.

The UC ONE platform is a platform found in the portal of University of the Cumberland.

1.the following code example would print the data type of x, what data type would that be?
x=5
print (type(x))

2.The following code example would print the data type of x, what data type would that be?
x="Hello World"
print(type(x))

3. The following code example would print the data type x, what data type would that be?
x=20.5
print (type(x))

Answers

Answer:

x = 5, the data type is integer( integer data type is for whole numbers)

2. The data type is string

3. The data type is float (float data type is for decimals)

Explanation:

Complete method printPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bagOunces followed by " seconds". End with a newline. Example output for ounces = 7:
42 seconds
import java.util.Scanner;
public class PopcornTimer {
public static void printPopcornTime(int bagOunces) {
/* Your solution goes here */
}
public static void main (String [] args) {
Scanner scnr = new Scanner(System.in);
int userOunces;
userOunces = scnr.nextInt();
printPopcornTime(userOunces);
}
}

Answers

Answer:

Replace

/* Your solution goes here */

with

if (bagOunces < 2) {

   System.out.print("Too Small");

}

else if(bagOunces > 10) {

   System.out.print("Too Large");

}

else {

   System.out.print((bagOunces * 6)+" seconds");

}

Explanation:

This line checks if bagOunces is less than 2;

if (bagOunces < 2) {

If yes, the string "Too Small" is printed

   System.out.print("Too Small");

}

This line checks if bagOunces is greater than 10

else if(bagOunces > 10) {

If yes, the string "Too Large" is printed

   System.out.print("Too Large");

}

The following condition is executed if the above conditions are false

else {

This multiplies bagOunces by 6 and adds seconds

   System.out.print((bagOunces * 6)+" seconds");

}

Scams where people receive fraudulent emails that ask them to supply account information are called ________.

Answers

Answer:

"Phishing" will be the correct approach.

Explanation:

This aspect of cyber attacks or fraud is called phishing, whereby clients or users are questioned for personally identifiable information about them.Attackers could very well-currently the most frequently use phishing emails to exchange malicious programs that could operate effectively in what seems like several different ways. Others would get victims to steal user credentials including payment details.

mplement the function fileSum. fileSum is passed in a name of a file. This function should open the file, sum all of the integers within this file, close the file, and then return the sum.If the file does not exist, this function should output an error message and then call the exit function to exit the program with an error value of 1.Please Use This Code Template To Answer the Question#include #include #include //needed for exit functionusing namespace std;// Place fileSum prototype (declaration) hereint main() {string filename;cout << "Enter the name of the input file: ";cin >> filename;cout << "Sum: " << fileSum(filename) << endl;return 0;}// Place fileSum implementation here

Answers

Answer:

Which sentence best matches the context of the word reticent as it is used in the following example?

We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.

Explanation:

Which sentence best matches the context of the word reticent as it is used in the following example?

We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.


Your car must have two red stoplights, seen from ______ feet in the daytime, that must come on when the foot brake is pressed.
A. 100
B. 200
C. 300
D. 400

Answers

Answer:

the answer is 300 feet in the daytime

Other Questions
what is the importance of personal computers in connecting to the internet ?^please I need an answer, PLEASE ^ Based on the excerpt and analysis of Pride and Prejudice, what is one theme in the novel? The perimeter of a scalene triangle is 14.5 cm. The longest side is twice that of the shortest side. Which equation can be used to find the side lengths if the longest side measures 6.2 cm? ASAP TWENTY POINTS What type of image is formed by a mirror if m = -0.4? Indica si lo que dice el texto es cierto o falso.El objetivo de Cristbal Coln al salir del Puerto de Palos es llegar a la Repblica Dominicana. Explain who the Spanish conquistadores are/were (quick summary would be extremely helpful!) Central to agency theory is the concern with problems that can arise between the principals who are the owners of the firm and the agents who are the people who are paid by outside consultants to perform a job on their behalf.a. Trueb. False What are marriage rites? Which question did the author of "How to Grow a School Garden" considerabout the audience before writing the project plan?OA. What locations are best for growing a school garden?OB. What type of climate is my audience most likely located in?O C. Which types of plants will my audience be most likely to grow?O D. What misconceptions might my audience have about gardening? What was the goal of the Crusades?O A. To regain the glory of RomeO B. To push the Moors out of SpainO C. To eliminate the Jews from JerusalemwO D. To push the Muslims out of Holy Lands Mars Rover When the Mars rover was deployed on the surface of Mars in July 1997, radio signals took about 12 minmin to travel from Earth to the rover.How far was Mars from Earth at that time? Plz help Ill mark brainliest Paula drives 130 miles in 2.5 hours. How far would she drive in 4.5 at the same speed?*Please answerI will award the Brainliest answer Which of the following is NOT characteristic of the Gothic style? Each lap around a park is 1 15 miles. Kellyn plans to jog at least 7 12 miles at the park without doing partial laps. How many laps must Kellyn jog to meet her goal? Read the excerpt from a short story. The beach teemed with tourists from boardwalk to shore. A canopy of colorful umbrellas covered the sand. Each was preoccupied with his own happy task, and none noticed the figure as it emerged from the surf. Its skin was blistered and raw, and it lumbered awkwardly in the foam. Its hideous eyes hungrily appraised the masses. How does the excerpt exemplify the ideas King describes in "Danse Macabre"? It allows readers to approach a forbidden door. It provides a single powerful spectacle for the imaginations eye. It forces readers to grapple with their own mortality. It introduces an unlikely dancing partner. 1. What term describes the average weather conditions in ageographic area? A. WeatherB. ClimateC. PrecipitationD. Temperature Compare and contrast ancient tales "the brave little parrot " and " if not higher".Explain specific moral,spritual and ethical aspects of human life both these ancient tales emphasize on? In the following sentence, what does the word disheveled mean? The bumpy bus ride left Robins hair disheveled. Please Help!!! What is 2x = 40?