1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
snow_lady [41]
3 years ago
6

What is the requirement for self-contained recovery devices

Computers and Technology
1 answer:
dexar [7]3 years ago
4 0
Babahskdjdndnd jbsbsjsjsnsns ndsnssnsnsnxjxjx skzjnansmansna Jaunansmans
You might be interested in
In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
Hoochie [10]

Answer:

d. ICMP Echo Reply (type 0)

Explanation:

ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network.

The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging.

For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.

4 0
3 years ago
100 POINTS!!!!!!
Veronika [31]

Answer:

The fundamental limitation of symmetric (secret key) encryption is ... how do two parties (we may as well assume they are Alice and Bob) agree on a key? In order for Alice and Bob to communicate securely they need to agree on a secret key. In order to agree on a secret key, they need to be able to communicate securely. In terms of the pillars of IA, To provide CONFIDENTIALITY, a secret key must first be shared. But to initially share the key, you must already have CONFIDENTIALITY. It's a whole chicken-and-egg problem.

This problem is especially common in the digital age. We constantly end up at websites with whom we decide we want to communicate securely (like online stores) but with whom we there is not really an option to communicate "offline" to agree on some kind of secret key. In fact, it's usually all done automatically browser-to-server, and for the browser and server there's not even a concept of "offline" — they only exist online. We need to be able to establish secure communications over an insecure channel. Symmetric (secret key) encryption can't do this for us.

Asymmetric (Public-key) Encryption

Yet one more reason I'm barred from speaking at crypto conferences.

xkcd.com/177/In asymmetric (public key) cryptography, both communicating parties (i.e. both Alice and Bob) have two keys of their own — just to be clear, that's four keys total. Each party has their own public key, which they share with the world, and their own private key which they ... well, which they keep private, of course but, more than that, which they keep as a closely guarded secret. The magic of public key cryptography is that a message encrypted with the public key can only be decrypted with the private key. Alice will encrypt her message with Bob's public key, and even though Eve knows she used Bob's public key, and even though Eve knows Bob's public key herself, she is unable to decrypt the message. Only Bob, using his secret key, can decrypt the message ... assuming he's kept it secret, of course.

Explanation:

3 0
2 years ago
The following sentence has a mistake.
Alja [10]

Answer:

You would put the cursor after the letter v in vermont and press back space and type a capital V to make it Vermont.

6 0
3 years ago
What is a massive, room-sized computer that process and store enormous amounts of bulk data and information?
kipiarov [429]

Answer:

Mainframe Computer

Explanation:

The Mainframe Computers are designed for bulk data processing with high speed and storing huge data that can't be performed by other regular PCs. They can run multiple instances of operating systems at the same time. They are used for application such as accounting, business transaction, information retrieval, airlines for the seat reservation and engineering computation.

7 0
3 years ago
2. What is data, information, knowledge and data Science? Define the role of data in emerging technology? ​
xz_007 [3.2K]
Answer :
Before answering the question. We look to it in your real life. The minute you wake up and open your eyes, your eyes collect all the information of the room you are in and your brain segregates them depending on the need. So that once you recall that memory it will be already saved in your brain. So your brain is like a computer.
You are collecting data ( information ) of what ever you hear , look and even imagine all day. For extra knowledge, when you put that memory into a form of ( writings , or art if you were an Arabist ) it’s called data visualization.
You are now the data scientist, you collected information form all the surroundings and it’s up to you to display it the way you want but that data must be correct
——
To the real short cut answer

Data , The data is information that is being stored by a computer. This data may be in the sort of text, images, audio clips, software applications, or other varieties of data


Information , information is a term used to describe text that is informative to the individual reading it or the computer processing it.

Or

Information is defined as knowledge gained through study, communication, research, or instruction. Essentially, information is the result of analyzing and interpreting pieces of data. Whereas data is the individual figures, numbers, or graphs, information is the perception of those pieces of knowledge.

Knowledge, In information technology, knowledge is, to an enterprise or an individual, the possession of information or the ability to quickly locate it.


Data science, Data science is the field of applying advanced analytics techniques and scientific principles to extract valuable information from data for business decision-making, strategic planning and other uses.

Your final answer is : Data has the potential to drive better outcomes, processes and of course, new technology that could be the next major industry disruption and breakthrough.”

5 0
2 years ago
Other questions:
  • Which of these is a social consequence of effective communication
    12·1 answer
  • Which information is necessary to determine an object's speed?
    13·1 answer
  • Select the correct answer
    11·1 answer
  • When creating a presentation you should use a blank as a starting point?
    15·1 answer
  • Write a program that takes an integer n as a parameter and sums all of the multiples of 2 or 5 from 1 to n. For example, if n =
    14·1 answer
  • Create a TicTacToe class that initializes a 3x3 board of "-" values. We will use this class in future exercises to fully build o
    9·1 answer
  • All dogs = 199999990158161231
    11·2 answers
  • Label provides the code that executes if no case label is matched ​
    6·1 answer
  • Task #3 Debugging a Java Program
    14·1 answer
  • What is the output of:<br><br> print (8 % 4)
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!