1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya692 [45]
4 years ago
15

Cyber Security Network Problem

Computers and Technology
1 answer:
atroni [7]4 years ago
7 0

Answer:

i don't understand what you put if you fix it so i can understand it i will try and figure it out

Explanation:

thank you so much but i don't understand it sorry.........

:(

You might be interested in
An input value has to be greater than 18 and less than 65 if a driving license is to be approved for issue. What type of input c
katrin2010 [14]

Answer:

You should use an "if" statement to check whether the number is greater than 18 or less than 65.

Explanation:

You usually use "if" statements whenever you want to compare a number to another. Keep in mind that "if" statements are not only used for comparison!

4 0
3 years ago
Here are a list of attributes that either belong to user model or system model. Please identify which attribute(s) belong to use
OverLord2011 [107]

Answer:

Explanation:

Before answering this question we need to first know the differences between System Mode and User Mode.

System Mode mainly runs code and at the same time overlooking the user's privileges and permissions.

the attribute(s) that belongs to the user model includes:

User Mode

  1. User programs typically execute in this mode
  2. Less-privilege mode

while the attribute(s) that belongs to the system model includes:

System Mode

  1. Also referred to as control mode or kernel mode
  2. Kernel of the operating system
  3. More-privilege mode

8 0
3 years ago
A company wishes to begin the process of implementing a multi-party system and is looking for other companies with similar inter
Andre45 [30]

If a company wishes to begin the process of implementing a multiparty system using block-chain, this provides Trust among the organizations.

<h3>What is a block chain?</h3>

A block chain is a listing of records referred to as blocks. Cryptography is used to link the blocks collectively.

Beginning a process of implementing a multi-party system provides trust among the organization, and not ownership, intent or uniqueness.

Read more about <em>systems </em>here:

brainly.com/question/14364696

7 0
2 years ago
On the Loan worksheet, in cell C9, enter a PMT function to calculate the monthly payment for the Altamonte Springs 2022 faciliti
ycow [4]

Answer:

Microsoft Excel, pmt function.

Explanation:

Microsoft Excel is a spreadsheet application used to manipulate and analyse data. It has several functions and tools to work with. An excel workbook can contain multiple worksheets. It has columns (or field) labelled alphabetically and also numbered rows ( or record).

The PMT function is a financial function used to calculate the periodic payment of loans. It's syntax is;

=PMT(interest rate increase, loan period, loan amount).

For example, if the interest rate increase is annual, and the value is a cell B7, the input would be B7/12. If the value of the loan period and amount are referenced in cells B6 and B5 respectively, the function would be ;

=PMT(B7/12, B6, B5).

But this will give a negative result. For positive result;

=PMT(B7/12, B6, -B5)

Now to make excel pick values from a specified group of cells, they are made absolute by adding the '$' to the columns and rows.

=PMT($B$7/12, $B$6, -$B$5).

The result would positive values spanning to twelve months with interest rate.

3 0
4 years ago
Consider a distributed denial of service (DDOS) attack, Assume the attacker has compromised a number of broadband connected comp
Daniel [21]

Answer:

A ) 200 Zombie systems

B ) 200 Zombie systems

Explanation:

maximum uplink data rate : 512 kbps = 512 * 1000 * 8  = 4096000 bits/sec

Determine the number of 512 byte  ICMP echo packets = 512 * 8 = 4096 bits

hence the maximum number of 512-byte ICMP echo request (ping) packets a single zombie computer can send per second = 400 packets/sec

i.e. for 512kbps = 400 packets/sec

Determine the number of Zombie systems that the attacker will need to flood a target server

A) For a fast ethernet

A fast ethernet = 100 mbps

The number of Zombie systems needed = 1 zombie system * 200

and 1 zombie system = 512 kbps

therefore for a Fast ethernet the number of zombies systems needed = 200

B) For A Gigabit Ethernet

same as a fast ethernet system i.e. = 200

4 0
3 years ago
Other questions:
  • All the processing-of work-done on a computer is performed by the what?
    11·1 answer
  • In the ______ stage of the systems development life cycle, the design specifications are translated into computer code.
    11·1 answer
  • How does the binary numbering system differ from the hexadecimal numbering system?
    14·2 answers
  • What do you need to do before you can sort and filter data in a database?
    8·1 answer
  • A(n) __ is a list of main points and sub-points of a topic to include in a presentation
    14·2 answers
  • If a fire should break out in your building, which of the following actions is NOT recommended?
    10·2 answers
  • Why do chloroplasts appear only in plant cells and lysosomes appear only in animal cells?
    13·1 answer
  • Location of a video or photoshoot is not important when it comes to preplanning the shoot.
    10·1 answer
  • 3. Find the best.
    13·1 answer
  • When methods have ____, other programs and methods may use the methods to get access to the private data.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!