Answer:
the user cannot use a computer system without hardware and software
Answer:
the user cannot use a computer system without.........hardware.....and...... software
Which type of attack cripples the network and prevents legitimate users from accessing network resources
Answer:
A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.
Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.
1
What is a DDoS attack?
1.1 – Understanding a DDoS Attack
The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.
1.2 – What is the Goal Behind a DDoS Attack?
The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:
The website can become slow to respond to legitimate requests.
The website can be disabled entirely, making it impossible for legitimate users to access it.
Eva is the network architect for her company's large cloud deployment; she has interconnected her private cloud to a community cloud in another province. She is investigating using the community cloud to supplement her private cloud workload during end-of-month processing. What operation is she going to perform
Answer:
The appropriate response is "Cloud bursting".
Explanation:
A strategy for the implementation of a program in a proprietary cloud or network infrastructure that explodes onto a public cloud if availability or production for computational power increases, could be considered Cloud bursting.It enables extra cloud capabilities throughout cases where additional facilities have been required.You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users.Which solution should you use?
Answer:
Explanation:
In this scenario, the best option is to first create a DMZ. This stands for Demiliatirized Zone and basically allows anything connected to it to access networks that have not been completely verified (which in this case would be the internet). Once the DMZ is created you are going to want to add the web server to the DMZ. This will allow the web server to access the internet and be publicly available to its users. At the same time you are going to want to add the company network behind the DMZ so that it is not allowed to publicly access the internet without the data going through the firewall first. Therefore, protecting the company network users.
which one will be the correct answer
pls tell
Answer:
option c clean boot. it is correct.
A) What is the initial configuration BPDU for B4? B) What is the configuration BPDU of B3 after receiving the initial configuration BPDU of B5? C) If B3 accepted B2 as the root, what is the configuration BPDU of B3? D) If B2 accepted B1 as the root through B7, what is the configuration BPDU of B2? E) Which bridge is the designated bridge of LAN C at this time? F) Now, if B5 accepted B1 as the root, what is the configuration BPDU of B3 after receiving the new configuration BPDU of B5? G) Which bridge is the designated bridge of LAN C at this time?
Answer: b is good
Explanation:
The DuPage Freight Shipping Company charges the following rates: Weight of Package Rate per Pound 2 pounds or less $1.10 Over 2 pounds, but not more than 6 pounds $2.20 Over 6 pounds, but not more than 10 pounds $3.70 Over 10 pounds $3.80 Design a program that does the following: asks the user to enter the weight of a package and displays the shipping charges. 1. Prompt the user for the weight of a package 2. Determines the rate per pound in a getRate module 3. Calculates and displays the total shipping charge in a getTotal module Hint - you may want to use a global variable for this! Please submit three things:
Answer:
The program in Python is as follows:
def getRate(weight):
if weight<=2.0:
rate = 1.10
elif weight>2 and weight<=6:
rate = 2.20
elif weight>6 and weight<=10:
rate = 3.70
else:
rate = 3.80
return rate
def getTotal(weight,rate):
total = weight * rate
print("Total: ",total)
weight = float(input("Weight: "))
rate = getRate(weight)
getTotal(weight,rate)
Explanation:
This defines the getRate function
def getRate(weight):
The following if conditions determine the corresponding rate based on the value of weight passed to the function
if weight<=2.0:
rate = 1.10
elif weight>2 and weight<=6:
rate = 2.20
elif weight>6 and weight<=10:
rate = 3.70
else:
rate = 3.80
This returns the rate back to the main method
return rate
The getTotal module begins here
def getTotal(weight,rate):
This calculates the total charges
total = weight * rate
This prints the calculated total
print("Total: ",total)
The main begins here
This gets input for weight
weight = float(input("Weight: "))
This gets the rate from the getRate function
rate = getRate(weight)
This passes values to the getTotal function
getTotal(weight,rate)
plz help me to do 4 number
Answer:
A is an abbaccus. B is Blaze Pascal. C is The Jacquard Loom. D is Charles Babbage. E is The Manchester Baby.
Explanation:
Select all that apply: Our primary objectives in functional programming are: Group of answer choices Functions should be as pure as possible following a pattern of Input->Processing->Output To model algorithms in a state-machine like format Removing state from programming Modeling data into a fact-base to be queried Raising our abstraction towards math Code free of side effects Modeling data into classes/objects that intercommunicate to solve software issues
Answer:
Functions should be as pure as possible following a pattern of Input->Processing->Output
To model algorithms in a state-machine like format
Code free of side effects
Explanation:
Functional programming is a popular concept in most popular programming languages such as Lisp that makes use of functions in separating code that aims to define and solve a particular problem which is part of a bigger problem. Functional programming focuses on what to solve, ie what is the problem rather than how do we solve it. It divides up code in meaningful blocks that makes it a lot more understandable, allowing big problems to be solved in tiny bits and not an overwhelming whole. Functional programming adopts the state-machine like format as it makes use of input and alters state as necessary(not hard coded). It also removes side effects issues that may be experienced when a function affects or mutates variables(global variables) that may be outside its block.
write a program to generate following series in qbasics 100,81,64,....1
Answer:
[tex]9 \times 9 = 81 \\ 8 \times 8 = 64 \\ 7 \times 7 = 49 \\ 6 \times 6 = 36 [/tex]
it's square root number you multiple times by 2
what is computer engineering
Answer:
Computer Engineering is the discipline embodying science and technology in the design, building, implementing, and maintenance of modern computer systems and computer-controlled equipment software, and hardware components.
Explanation:
Computing engineering is an engineering branch that incorporates several computer sciences and engineering industries that are necessary for the development of computer equipment and software. In general, computer engineers are educated not only in software engineering or electronic engineering but also in software design and software integration. Computer engineers participate in numerous computer software and hardware aspects from the conception of different microcontrollers, micro-producers, personal computers, and supercomputers to the design of circuits.
Computer engineers are usually involved in the writing of software and firmware for embedded microcontrollers, the design of VLSI chips, analog sensors, the construction of mixed-signal systems, and the design of operating systems. The robotic research process is also suitable for the use of digital systems to control and monitor electrical systems, such as drives, communications, and sensors. Computer engineers are also suitable.
In many universities, informatics students are allowed to choose areas of in-depth study in their junior and senior levels, as the full size of knowledge used in computer design and use is beyond the scope of a bachelor's degree. Other institutions may require students to complete one or two years of general engineering before declaring the focus on computer technology
what is the term used to describe the situation when a derieved class provides a function already provided in the bae class
Answer:
The right approach is "Overriding".
Explanation:
The overriding function seems to be a programming application that enables a classroom as well as children to successfully implement some technique that's been given by another one of their parents or super classes.The overriding method must be named, signed, and parameter-like inside your parent process throughout the child one.Thus the above is the correct answer.
write a pseudocode that reads temperature for each day in a week, in degree celcius, converts the celcious into fahrenheit and then calculate the average weekly temperatures. the program should output the calculated average in degrees fahrenheit
Answer:
total = 0
for i = 1 to 7
input temp
temp = temp * 1.8 + 32
total + = temp
average = total/7
print average
Explanation:
[Initialize total to 0]
total = 0
[Iterate from 1 to 7]
for i = 1 to 7
[Get input for temperature]
input temp
[Convert to degree Fahrenheit]
temp = temp * 1.8 + 32
[Calculate total]
total + = temp
[Calculate average]
average = total/7
[Print average]
print average
The Curtis Publishing Company's early marketing research efforts mainly had to do with _____. people who drove automobiles people who bought books people who read books people who bought automobiles
Answer:
people who bought automobiles
Explanation:
Market research can be defined as a strategic technique which typically involves the process of identifying, acquiring and analyzing informations about a business. It involves the use of product test, surveys, questionnaire, focus groups, interviews, etc.
Cyrus H. K. Curtis was a publisher that founded and established the Curtis Publishing Company as a news magazine in 1891.
The Curtis Publishing Company's early marketing research efforts mainly had to do with people who bought automobiles in the United States of America.
A company runs sensitive technologies locally, while entrusting less-sensitive technologies to a broader user base. Which cloud delivery model is being used
Answer:
Hybrid cloud
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
Cloud computing comprises of three (3) service models and these are;
1. Infrastructure as a Service (IaaS).
2. Software as a Service (SaaS).
3. Platform as a Service (PaaS).
Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.
The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.
Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).
Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.
These are the different types of Platform as a Service;
1. Private PaaS.
2. Public PaaS.
3. Open PaaS.
4. Mobile PaaS.
5. Communications PaaS.
6. Hybrid PaaS.
A hybrid cloud combines both the features of a private and a public cloud to provide cloud-related services to the end users.
In this scenario, a company runs sensitive technologies locally while it entrusted technologies that are less sensitive to a broader user base.
Hence, the cloud delivery model which is being used here is a hybrid cloud.
An item that contains both data and the procedures that read and manipulate it is called a(n) ________.
Answer:
Object
Explanation:
An item that contains both data and the procedures that read and manipulate it is called an object.
open accomplishing your task I was able to
Answer:
WTH KINDA QUESTION IS THIS !
I DON'T UNDERSTAND DUDE
application software can run without the presence of system software true or false
Answer:
false
...........
.....
If a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the ____________________.
Answer:
attack vector
Explanation:
If a vulnerability is not fixed at the root cause, there is a possibility that another route of attack can emerge. This route is known as the attackvector.
Answer please in order
Answer:
analogue; discrete; sampled; sample rate; bit depth; bit rate; quality; larger; file size.
Explanation:
Sound are mechanical waves that are highly dependent on matter for their propagation and transmission.
Generally, it travels faster through solids than it does through either liquids or gases.
Sound is a continuously varying, or analogue value. To record sound onto a computer it must be turned into a digital, or discrete variable. To do this, the sound is sampled at regular intervals; the number of times this is done per second is called the sample rate. The quality of the sound depends on the number of bits stored each time - the bit depth. The number of bits stored for each second of sound is the bit rate and is calculated by multiplying these two values (sample rate and bit depth) together - kilobits per seconds (kbps). The higher these values, the better the quality of the sound stored, but also the larger the file size.
A sponsored link was delivered 100 times, and 10 people clicked on it. Calculate the click-through rate.
Answer:
10%
Explanation:
100 / 10 = 10
Which is the most viewed vdo in YT ever?
Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system to support automated services, and __________ are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. A. contingent IDs, system accounts B. system accounts, contingent IDs C. systems administrator accounts, contingent IDs D. control partners, system accounts
Answer: B. system accounts, contingent IDs
Explanation:
Aside from human user types, there are non human user groups. Known as account types, (system accounts) are implemented by the system to support automated services, and contingent IDs are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. The system account is refered to as the user account which the operating system creates during installation.
Therefore, the correct option is B.
B2B partners often connect to each other on the Internet through special __________ designed to facilitate information exchanges and transactions. search engines web masters web portals web routes gatekeepers
Answer:
web portals
Explanation:
B2B (business-to-business) is a marketing strategy that deals with meeting the needs of other businesses, by selling products or services to the organizations for resale to other consumers, used in production of goods or for the operation of an organisation.
B2B (business-to-business) model focuses on facilitating sales transactions between businesses.
Under the B2B, the producer sells its products directly to other businesses such as wholesalers or retailers and not the end consumers.
B2B partners often connect to each other on the Internet through special web portals that are designed to facilitate exchange of information and simplified business transactions.
Additionally, a popular application of the seller-side marketplace model, which is a major business-to-business (B2B) e-commerce model, is e-procurement of goods through the use of web portals over the internet and as such eliminating the option of physical buying or procurement.
18. Which of the following provides the SLOWEST Internet access?
O Ti line
Network
Digital Subscriber line (DSL)
Dial-up
Answer:
Dial up
Explanation:
Dial-up is by far the slowest of all Internet connections available. Use of dial-up requires a separate phone line, since users must connect via the telephone to their Internet service provider.
Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon:
Answer: cannot emit light and has speed limitations
Explanation:
Silicon is usually used in computer chips and solar cells but Gallium arsenide is regarded as a better alternative even though it's costly than silicon.
Gallium arsenide has technical advantages over silicon as its electrons
move through it faster than they move through silicon. Also, cannot emit light and has speed limitations.
Gallium arsenide is used in manufacturing devices like infrared light-emitting diodes, solar cells, optical windows, etc.
You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal
Answer:
Answer would be, PSTN (public switched telephone network)
Determine whether the phrase below is a sentence or a fragment.
While we were in Greece, we ate a lot of feta cheese.
a.
Sentence
b.
Fragment
They have requested a 1- to 2-page memo that describes the hospital's protections against a ransomware attack.
Why does a computer need programs?
True or False? Using your traffic analytics report, you can see the source of traffic to your website
Answer:
True
Explanation: