Answer:
3
Explanation:
We can split the expression into two sections
First Section:
7 // 2 = 3. Using the floor division we only utilize the integer part.
Second Section:
10 % 2**4 = 0**4 = 0
Bringing back the full version expression we have
3 + 0 = 3
Answer:
101.1
Explanation:
Keep in mind that octal has 8 numbers
Step 1: Split your number in 2 parts (integer part and decimal part):
- integer part 65
- decimal part 0.125
Step 2: Convert the decimal part. For this step you need to multiply your decimal part and 8 (8 correspond the octal base) and get the integer part until you need it:
0.125 * 8 = 1
So your decimal part correspond to number 1 in octal = (1)8
Step 3: Convert integer part: for this step you need to divide your integer part by 8 until you can and get the remainder
65 / 8 = 8 remainder 1
8 / 8 = 1 remainder 0
1 / 8 = 0 remainder 1
Step 4: join the remainders from bottom to top and get the integer part
101
Step 5: join the integer part and the decimal part to get the octal convertion
101.1
In cyber security, an exploit is a way attackers take advantage of certain vulnerabilities and gain malicious access to systems. There are very many types of exploits that exist in the cyber security world. However, I will mention those ones most commonly used.
DoS attacks – The denial of service attacks is very common. Hackers will gain access to servers and send so many packet requests at the same time. The servers become overwhelmed due to too much memory allocation and the huge amount of traffic ends up crashing the servers.
Unauthorized access – When an attacker has an illegal access to host machines
<u>Application Exploitation</u>
Code injection – This exploit can be used to maliciously inject invalid code into an application program or software and as a result change how the program behaves.
Cross-site scripting – Enable hackers inject malicious scripts on a website of a client. Once they have gained access, they will escalate their privileges and have more access to the site.
Clickjacking – A type of attack that tricks unknown victims into clicking links of a web page they believe are legitimate and end up revealing confidential information of themselves.
computer network is the answer