1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scorpion4ik [409]
3 years ago
14

How long does it take to design and program a character?

Computers and Technology
1 answer:
Kipish [7]3 years ago
6 0
It takes about 5 days I believe 
You might be interested in
Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() pri
rusak2 [61]

In python, the sort() function will alphabetically sort a list of strings

3 0
3 years ago
Why is a DNS cache poisoning attack dangerous? Check all that apply. A. Errrr...it's not actually dangerous. B. It allows an att
larisa [96]

Answer:

(B) It allows an attacker to redirect targets to malicious webserver.

(D) It affects any clients querying the poisoned DNS server.

Explanation:

DNS cache poisoning is a serious type of attack that is designed to exploit the vulnerabilities inherent in a Domain Name Server (DNS) where a user is redirected from a real server to a fake one. It is also called DNS spoofing.

Normally, when your browser tries to visits a website through a given domain name, it goes through the DNS server. A DNS server maintains a list of domain names and their equivalent Internet Protocol addresses. This server (DNS) then responds to the request with one or more IP addresses for the browser to reach the website through the domain name.

The computer browser then get to the intended website through the IP address.

Now, if the DNS cache is poisoned, then it has a wrong entry for IP addresses. This might be via hacking or a physical access to the DNS server to modify the stored information on it. Therefore, rather than responding with the real IP address, the DNS replies with a wrong IP address which then redirects the user to an unreal website.

Although they might not be able to control your computer remotely as long as you are not trying to visit a web page via the poisoned information, there are other dangers attached to this type of attack.

Once the DNS server has been poisoned, any client trying to query the server will also be affected since there is no direct way of knowing if the information received from the server is actually correct.

4 0
3 years ago
Which organization publishes a handbook that describes various occupations? U.S. Department of Defense U.S. Department of Agricu
prohojiy [21]

Answer:

U.S. Bureau of Labor Statistics.

Explanation:

The Bureau of Labor Statistics is a unit of the United States Department of Labor assigned with the task of fact-finding in the field of labor and statistics for the government. The agency helps measure the labor activity in the market and evaluates all forms of activity regarding labor conditions for the government.

This agency also functions or serves as the principal agency for the United States Federal Statistical System. It not only collects information or data but also helps spread the said information to the government. It also published a biennial handbook describing various occupations.

3 0
2 years ago
Which command displays the status of the ipsec installation?
Alexandra [31]
Character command shows the status.
8 0
3 years ago
To add slides to a presentation, _____.
Effectus [21]
<span>select the New Slide option from the Insert menu</span>
7 0
3 years ago
Other questions:
  • The ____ preceding a formula alerts excel that you are entering a formula or function and not text
    14·1 answer
  • How should you decide what to wear to an interview? What kind of things should be considered?
    12·1 answer
  • What is the FTC used car rule
    12·1 answer
  • Identifies the row and column that forms the cell
    11·1 answer
  • What is the CSS property used to style text as all lowercase or uppercase?
    14·2 answers
  • The force required to slide an object is equal to _____.
    13·1 answer
  • Write a program that asks the user to enter a series of single digit numbers with nothing separating them. Read the input as a C
    12·1 answer
  • Rosa is building a website for a multimedia company. She wants to add a drop-down menu functionality to the website's main page.
    12·1 answer
  • HELLLLLLLLPPPPPPPPPPPP HHHHHHHHHEEEEEEEEELLLLLLPPPPPP MEEEEEEEE
    12·2 answers
  • What are some of the opportunities that the stem program offers?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!