1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Doss [256]
2 years ago
7

4.8% complete this is a single choice question; skip ahead to question content a b c d confirm difficulty level: moderate an int

ruder monitors an admin's unsecure connection to a server and finds some required data, like a cookie file, that legitimately establishes a session with a web server. what type of attack can the intruder perform with the cookie file?
Computers and Technology
1 answer:
PilotLPTM [1.2K]2 years ago
4 0

Answer:

A replay attack

You might be interested in
State the advantages of MS Excel in data encoding
Rina8888 [55]

Answer:

Explanation:

1. Best suited for simple and single projects

Excel is the right tool if you are working on only one project at a time and have a small team of project members. Microsoft offers free templates, such as the Gantt Project Planner in Excel.

When you have Excel open, click New, then search for Gantt Project Planner. To create an Excel workbook, click the template.

2. Huge savings on time and money

Excel is just one tool you need to perform various tasks for your freelance or business projects. Therefore, you do not need to invest in additional software. Furthermore, if your team members already know how to use Excel, you also save time training new tools.

3. Comprehensive spreadsheet data warehouse

In Excel, you have the option of storing project data directly in the database. You can access or restore project-specific data from one place while managing project tasks.

You can also create comprehensive spreadsheets in Excel workbooks to store millions of data for big data analysis. You can manipulate data with a few keyboard shortcuts and highlight important data associated with project development methods.

4. To-Do List & Project Progress

If you need to rotate interactive to-do lists among team members, you can use Excel to save money on additional apps. The interactive user interface allows you to create task lists using rows and columns. You can also integrate Excel tables in the web portal, MS Word and Microsoft OneDrive for easy access.

For detailed project schedules and high-level project roadmaps, you can use Excel to create comprehensive project timelines.

5. Instant project data reporting with one tool

There are many reporting features available in Excel that you can use effectively. You can mainly use Excel table (Ctrl + T), Pivot Table (Alt + N + V), Power Pivot, etc. You can also integrate such reports in Powerpoint to present to the audience. You can use the blue Sales Report template for this purpose.

6. 3D . Graphs, Charts, and Maps

When you present project performance reports to clients, you can make data visualizations compelling by inserting 3D graphs, charts, and maps. You can access line charts, donut charts, pie charts, radar charts, stock charts, bubble charts, and more for free. without paying for any additional services.

7. Simple templates for scheduling

Project managers or freelancers use Excel templates for work schedules. You can easily keep track of the following in Excel:

- Time of group members.

- Time spent on project tasks.

- Time remaining to complete the project.

- The project's deadline is approaching.

8 0
3 years ago
What is a systems development life cycle?
gogolik [260]

Answer: D) The overall process for developing information systems from planning and analysis through implementation and maintenance.

Explanation:

System development life cycle(SDLC) is the mechanism in the cyclic form for describing about the development stages of information system.The stages involves in production of system are analysis, design, implementation, planning and maintenance. It is used for making non-technical as well as technical models of information systems.

Other options are incorrect because high stage planning, feature description or evaluation of end-users business is not done by SDLC(System development life cycle) models.

Thus, the correct option is option(D).

7 0
4 years ago
1. Define Validation Rule
RoseWind [281]

Answer:

1. A Validation Rule is a rule given to a field that ensures that the attribute of data entered into the field meets the set criteria of the field before the data can be saved. The question asked by the field is either 'Yes' True or 'No' False, with the required answer being Yes or "True"

2. Compressed hours

Compressed hours is work mode where employees are allowed to do the number of hours to which they are contracted over a less number of working days

3. Microsoft Access

Microsoft Access is designed to automatically save data entered into forms as the user moves between records or when the form being worked on is closed thereby, ensuring  that data loss is prevented even when the form is closed after an edit is made

4. A document editor

A document editor can be used for the creation of new document and editing existing documents of different file types

Explanation:

5 0
3 years ago
What helps in determining the reliability of a person to repay debt?
drek231 [11]
C) credit score is your answer
6 0
3 years ago
Read 2 more answers
An internet layer is a quantity of data that is transmitted on a netowrk without concern for whether it is accurate or whether i
satela [25.4K]

Answer:

False

Explanation:

The statement being made here is a False statement. An internet layer is not necessarily a quantity of data but instead, it is a group of various different codes, programs, and protocols that allow from the data to travel safely from one endpoint to the other. This is what allows one user from one side of the world to send information to someone else who can receive it from the other side of the world through the internet.

7 0
3 years ago
Other questions:
  • Jim has entered the age of each of his classmates in cells A1 through A65 of a spreadsheet. Which function should Jim use to fin
    11·2 answers
  • The source ip address is 164.109.28.3 subnet mask of 255.255.128.0 network address is
    7·1 answer
  • Assume that a text box named PhoneNumberTextBox appears on a form and contains the phone number 414-555-5555. What value will di
    5·1 answer
  • Speculate on how students 25 years from now will answer, "What computing innovation has had a significant impact on your life?"
    11·1 answer
  • Define a pointer variable named daco that can be used for objects of the class Banana.
    14·2 answers
  • Describe PROM, EPROM and EEPROM memories​
    7·1 answer
  • WHO SAYS BUP ALL THE TIME ​
    8·1 answer
  • How can blockchain be used to support sustainable business practices?
    8·1 answer
  • What is not recyclable in a<br> hybrid car<br> hydrogen car<br> petrol car
    15·1 answer
  • A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what shoul
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!