1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
2 years ago
7

Which of the following data types can hold a fractional (decimal) number?

Computers and Technology
1 answer:
zvonat [6]2 years ago
6 0
A float data type can hold a decimal number.
You might be interested in
attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
bogdanovich [222]

Attackers frequently use ACK scans to circumvent a firewall or other filtering tools. During a NULL scan, all packet flags are enabled. The most recent versions of Nessus Server and Client are compatible with Windows, Mac OS X, FreeBSD, and the vast majority of Linux variants.

<h3>What is ack scan ?</h3>
  • ACK scans are used to identify hosts or ports that have been blocked or are resistant to other types of scanning. An attacker uses TCP ACK segments to learn about firewall or ACL configuration.
  • Attackers probe our router or send unsolicited SYN, ACK, and FIN requests to specific UDP/TCP ports.
  • TCP ACK Scan sends an ACK message to the target port to determine whether or not it is filtered.
  • On unfiltered ports, a RST reply packet will be sent for both open and closed ports. Filtered ports will either generate no response or generate an ICMP reply packet with an unreachable destination.
  • The TCP ACK scanning technique attempts to determine whether a port is filtered by using packets with the ACK flag set.

To learn more about ask scan refer to:

brainly.com/question/13055134

#SPJ4

3 0
1 year ago
The processor itself is not a resource, therefore the OS is not involved in deciding how much of the processor time is used for
photoshop1234 [79]

Answer:

False

Explanation:

In computing, a resource can be defined as a component with limited or varying size/capability. Every computer has a processor whose capability is measured by the number of instructions it can perform in a given unit of time (Clock speed), The number of cores, the size of cache memory and of course the make i.e. AMD or Intel.

One of the functions of the Operating systems in relation to CPU is CPU Scheduling. This is whereby the process manager determines the process to be allocated the resource (CPU) basing on the suitable criteria.

The scheduling criteria is based on:

a. CPU Utilization ensures that the CPU is busy all the time.

b. Throughput is the number of processes that can be executed per unit given time.  

c. Turn Around Time which is the time it takes to get the final output after the process has been allocated the CPU.

d. Waiting Time defined as the length of time a process takes in the ready queue.

e. Response Time defined as the difference in time between the arrival time and the time it starts executing.

The algorithms selected aims at:

1. Maximize CPU utilization

2. Maximize throughput

3. Minimize Turn Around Time, Waiting Time and Response Time

The operating system uses the scheduling criteria to determine the best algorithm to be used to give a number of processes.

These algorithms can be grouped as either preemptive or non-preemptive.

Preemptive means once the process has been allocated to the CPU and can be interrupted before it completes its burst time. Examples include:

a. Round Robin

b. Shortest Remaining Time First (SRTF)

c. Priority Scheduling

Non-preemptive scheduling algorithm works in a way that once a process has been allocated the CPU it cannot be halted or paused until it has completed its burst time. Examples include:

a. First Come First Serve (FCFS)

b. Shortest Job First (SJF)

c. Priority Scheduling

7 0
3 years ago
Read 2 more answers
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: symmetric block ciphers, asymmetric cipher
RideAnS [48]

Answer:

True.

Explanation:

In generating PRNGs, several specific types of crypto algorithms will be widely will use: linear cipher block, nonlinear ciphers, as well as hash methods and authorization instructions in messages. So, that's why the following scenario is true about the cryptographic algorithms because this is a collection of several excellently defined however complicated mathematics techniques for encoding or decoding information.

7 0
4 years ago
"a technician claims to have crimped a patch cable according to the T568A standard on one e d and T568B on the other"
yanalaym [24]

Answer:

The technician has made a cross-over cable.

Explanation:

The network is a platform that provides two or more computers to communicate. There different types of networks, namely, local-area network (LAN), wide-area network (WAN), MAN or metropolitan-area network etc.

Devices in a network can be connected with cables (ethernet IEEE 802.3) or wirelessly (wifi IEEE 802.11a/n/g). Wiring standards are strictly followed in ethernet configuration.

Two ethernet wiring standards are T568A and T568B. The difference in both standards are the pin configuration and their position in a wire defines a cable system.

When a T568A or T568B are used on both ends of a twisted pair cable, it is called a straight-through cable. When T568A is used on one end and T568B on the other, it is called a cross-over cable.

These cable systems are used for different applications. the straight-through cable is used for connecting devices that are not the same like router to switch, switch to computer etc. The cross-over cable connects similar network devices like router to router, switch to switch etc.

3 0
3 years ago
Gave me six external part of the computer system and identify which is the output and input devices
Mariana [72]
1. monitor output
2. keyboard input
3. mouse input
4. <span>microphone input</span>
5. printer output , or input if it has scanner
<span>6. speakers output</span>
5 0
3 years ago
Other questions:
  • ____ is a generic term for "evil software." threat worm virus malware
    9·1 answer
  • Which is true regarding pseudocode?
    9·2 answers
  • What is computer engineering?
    11·1 answer
  • Which of the following is not a reason that the subject line should never be left blank?
    13·2 answers
  • What will the scope of a compliance program depend on?
    6·1 answer
  • How could a system be designed to allow a choice of operating systems from which to boot? What would the bootstrap program need
    14·1 answer
  • Alisa Miller claims that today's college graduates:
    7·1 answer
  • How to format an APA paper set it up
    15·1 answer
  • Suppose we want to adjust the page numbering for our Works Cited section so that it starts over at page 1. Is this possible to d
    12·2 answers
  • I WILL GIVE MOST BRAINLY
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!