1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
3 years ago
8

What happens if someone has your ip address?

Computers and Technology
1 answer:
umka2103 [35]3 years ago
7 0
It's not a big deal if you have a router and/or firewall in place. IP addresses are not secret. If the person wants to do harm, he can start probing your ports to see if you have any exposed services he can exploit. If you don't you'll be fine. Denial of Service attacks are also possible, but rarely targeted at individuals, because there is not much to gain.
You might be interested in
Which code snippet could be used to print the following series?
GaryK [48]
C is the answer, I think
7 0
2 years ago
What code do I have to use in my php if i don’t want my $_SESSION[“variablex”] to destroy? But i already have a session_destroy(
Vesnalui [34]

Answer:

See Explanation Below

Explanation:

Follow the steps below.

1. Start Session

2. Assign the session you want to preserve ( $_SESSION['variablex'] ) to a variable

3. Destroy all session (including the one you want, $_SESSION['variablex'])

4. Reassign the contents of the variable you created in (1) above to $_SESSION['variablex'].

The code is as follows (comments explain each line)

<?php

session_start(); // Start session

$variable = $_SESSION['variablex'] ; // assign $_SESSION['variablex'] to $variable

session_destroy(); // Destroy sessions

$_SESSION['variablex'] = $variable; // assign $variable back to $_SESSION['variablex'] to

// You can continue your code (if you have any), here

// End of solution

?>

5 0
3 years ago
Explain how any simple substitution cipher that involves a permutation of the alphabet can be thought of as a special case of th
Kaylis [27]

A simple substitution cipher takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

<h3>What is the Hill cipher?</h3>

In 1929, the Hill cipher was invented by Lester S. Hill and it can be described as a poly-graphic substitution cipher that is typically based on linear algebra and it avails a cryptographer an ability to simultaneously operate on more than three (3) symbols.

In Cryptography, the simple substitution cipher is usually viewed as a function which takes each plaintext letter (alphabet) and assigns it to a ciphertext letter. Thus, it takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

Read more on Hill cipher here: brainly.com/question/13155546

#SPJ1

6 0
2 years ago
दत्वा पदे प्रत्ययः अस्ति​
navik [9.2K]

Datva Pade Suffix: Asti

5 0
3 years ago
Read 2 more answers
Write a program that will askthe user to enter the amount of a purchase. The program should thencompute the state and county sal
grin007 [14]

Info:

I am doing it in Python. Hope it will help you.

Code:

am = float(input('Enter the amount: '))

stx = (am*0.04)

slt= (am*0.02)

tl = stx+slt+stx

print(f'Sales Tax: {slt}, State Tax: {stx}, Grand Total: {tl}')

Result:

Enter the amount: 15

Sales Tax: 0.3, State Tax: 0.6, Grand Total: 1.5

7 0
3 years ago
Other questions:
  • A network administrator wants to have the same network mask for all networks at a particular small site. The site has the follow
    11·1 answer
  • The system tray contains _____.
    7·2 answers
  • Jemima is reviewing her history report and notices that her headings are not formatted the same throughout the report. She wants
    5·2 answers
  • What are all the folders located on the DOCK called?
    11·1 answer
  • When choosing a new computer to buy, you need to be aware of what operating ____a0 it uses.
    13·1 answer
  • Cryptography has requirements include:
    12·1 answer
  • Peyton is taking a part-time job to earn some extra money. Every week the manager will provide a list of tasks and the number of
    11·1 answer
  • Create a program called "Geometry" Prompt the user for a small decimal number. Prompt the user for a large decimal number. Using
    12·1 answer
  • How is unqualified assumptions a disadvantage of communication​
    14·1 answer
  • 4.8.4 Better Sum
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!