Answer:
Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.
On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.
This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.
Answer:
// program in C.
// headers
#include <stdio.h>
// headers
#include <stdlib.h>
// headers
#include <limits.h>
// main function
int main(int argc, char** argv)
{
// read value of N from command line arguments
int N=atoi(argv[1]);
// variables
int max=INT_MIN;
// variable
int min=INT_MAX;
int rA[N],i;
// fill the array with random number
for(i=0;i<N;i++)
{
// generate random number from -50 to +50
rA[i]=rand()%101-50;
// find the Maximum
if(rA[i]>max)
max=rA[i];
// find the Minimum
if(rA[i]<min)
min=rA[i];
}
// print values of array
printf("values of the array are:");
for(i=0;i<N;i++)
{
printf("%d ",rA[i]);
}
// print Maximum
printf("\nMaximum value is:%d",max);
// print Minimum
printf("\nMinimum value is:%d",min);
return 0;
}
Explanation:
Read value of N from command line.Then create an array of size N.Fill the array with random number from -50 to +50.Then find the Maximum of all the elements and assign it to variable "max" and find Minimum from all and assign it to variable "min". then print all the elements of the array, Minimum and Maximum.
Output:
command line argument=10
values of the array are:-18 -18 4 -38 2 6 -42 -20 -6 44 -6 -11 15 -31 1
Maximum value is:44
Minimum value is:-42
Answer:
The following are the answers of the given scenario.
- Crimper
- Cable tester
- Cable stri.pper
Explanation:
After hours, the specialist operates at that same customer's workplace as well as wants several wires to complete the job, although it would not provide direct links for pre-built wires. The wire required seems to be a dial-up link from the dial-up network to an original analog POTS port on a wall. Another wire would be to attach an Ethernet from the device to that of the current keystone port on that same wall.
Thus, Crimper, Cable Tester and Cable Stri.pper are the same equipment that the specialist needs to use to create the wires as well as then check whether these all operate correctly.
Answer:
the save command is located in the file menu
Answer: Machine learning
Explanation:
The technology that could be combined with the current solution to do this is the machine learning.
Machine learning refers to the use and development of the computer systems which can learn and adapt without them following explicit instructions. This is done through the use of statistical models and algorithms in order to analyse inferences from the patterns in data.
Since the bank wants to streamline their operations for the receiving and processing checks while also enhancing the solution to recognize signs of potential check fraud, then the machine learning can be used.