1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-Dominant- [34]
3 years ago
15

V.kofiryfh givnyovb (to slove you must go back 3 letters)

Computers and Technology
1 answer:
Elena L [17]3 years ago
7 0
Im goin to be honest with you i dont understand this question at all can you xplain it alittle more plz cuz if i go back three letters it is o
You might be interested in
Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this fu
Amiraneli [1.4K]

Answer:

yes administrators have to be concerned

Explanation:

It is necessary for countermeasures to be taken against DoS attacks

The types of attacks that can still occur are:

If the network connection get to be overloaded,  there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd  we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.

To reduce the impact of this kind of attacks,

1. there should be enough or excess network bandwidth  and distributed servers should be replicated if there is a possibility that network could get to be overloaded.

2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.

3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters

4. Use strong antivirus on computer sytems that are used to connect to the internet

7 0
3 years ago
Types in java are divided into two categories. the primitive types are boolean, byte, char, short, int, long, float and double.
Rudik [331]
Types in java are divided into two categories. the primitive types are boolean, byte, char, short, not, long, float, and double. all other types are REFERENCE types
4 0
2 years ago
Which section of a personal narrative requires the most development
attashe74 [19]
D. Plot because a,b,and c is consider plot can i have brainlest answer please

5 0
3 years ago
What is 4365 −3412 when these values represent
Inessa [10]

The result of the subtraction of 4365 and 3412 using octal numbers is of:

753.

<h3>What are octal numbers?</h3>

For octal numbers, each number is represented by three bits, as follows:

  • 0 = 000.
  • 1 = 001.
  • 2 = 010.
  • 3 = 011.
  • 4 = 100.
  • 5 = 101.
  • 6 = 110.
  • 7 = 111.

Then the binary representation of number 4365 is given as follows:

100011110101

The binary representation of number 3412 is given as follows:

011100001010

Then the following binary subtraction is made:

100011110101 - 011100001010

The result of this subtraction is of:

100011110101 - 011100001010 = 111101011

Then the octal result is given as follows:

111 101 011 = 753.

More can be learned about binary numbers at brainly.com/question/8649831

#SPJ1

4 0
1 year ago
To define constructors and member functions outside of a class's original scope, the operator can be used.
Artyom0805 [142]

Answer: Scope resolution operator(::)

Explanation: A member function and the constructor can be called within the function easily but for the execution of the these components outside the class , a special operator is required to call the functions. The scope resolution operator(::) preceding with the name of class is thus used for defining of the function outside class.This operator maintains the cope of the function and constructor outside the class.

8 0
3 years ago
Other questions:
  • Earthquakes happen in the Earth’s
    10·1 answer
  • The max-age attribute of a cookie is specified in
    13·1 answer
  • What UDP port is used by a default WDS server setup when it is listening for PXE boot requests​
    12·1 answer
  • A professor is working with five teams in his marketing research class. He decides to experiment with path-goal theory in helpin
    11·1 answer
  • Which is true about POP3 and IMAP for incoming email?
    13·1 answer
  • Plz help<br> What is an ASCII?
    10·2 answers
  • What are some of the ways you can use bitlocker encryption? (choose all that apply?
    10·1 answer
  • How do you increase the number of tries by one?
    10·1 answer
  • True or false scientists investigate and seek to explain the natural world
    14·1 answer
  • Ways to ask for help effectively include
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!