1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
12

What is required for real-time surveillance of a suspects computer activity?/p Group of answer choices a. Blocking data transmis

sions between a suspect’s computer and a network server. b. Poisoning data transmissions between a suspect’s computer and a network server. c. Preventing data transmissions between a suspect’s computer and a network server. d. Sniffing data transmissions between a suspect’s computer and a network server.
Computers and Technology
1 answer:
Hitman42 [59]3 years ago
3 0

Answer:

c  Preventing data transmissions between a suspect’s computer and a network server

Explanation:

You might be interested in
Brianna Watt, a consultant doing business as Watt Gives, wants a program to create an invoice for consulting services. Normally,
GREYUIT [131]

Answer:

The pseudocode is as follows:

Total_Hours = 0

Input Client_Name

Rate = 30.00

For days = 1 to 5

      Input Hours_worked

      Total_Hours = Total_Hours + Hours_Worked

Charges = Rate * Total_Hours

Print "Brianna Watt"

Print Client_Name

Print Total_Hours

Print Rate

Print Charges

Explanation:

This initializes the total hours worked to 0

Total_Hours = 0

This gets input for the client name

Input Client_Name

This initializes the standard rate to 30.00

Rate = 30.00

This iterates through the 5 days of work

For days = 1 to 5

This gets input for the hours worked each day

      Input Hours_worked

This calculates the total hours worked for the 5 days

      Total_Hours = Total_Hours + Hours_Worked

This calculates the total charges

Charges = Rate * Total_Hours

This prints the company name

Print "Brianna Watt"

This prints the client name

Print Client_Name

This prints the total hours worked

Print Total_Hours

This prints the standard rate

Print Rate

This prints the total charges

Print Charges

7 0
3 years ago
Who is the smartest avenger??? :)
Rom4ik [11]

Answer:

Iron Man

Explanation:

5 0
3 years ago
Read 2 more answers
What task did the u.s. government undertake that many people identify as the birth of the internet
blsea [12.9K]
The answer is a. the government developed a computer system to be used in military communications. It started in the 1960s and was developed and used to serve as communication without experiencing disturbances from bombs and gain security for military purposes. This was the time when ARPANET (Advanced Research Projects Agency Network) came into the picture. Soon it was opened to people starting from the 70s when emails were used and became more popular. It then paved for further development and largely contributed to technology and communication.
8 0
3 years ago
Read 2 more answers
How does an author develop a charterer in a story
kakasveta [241]
Ways in which an author develops a character are with physical description, behavior, insight into the character's thought processes through dialogue or narration, and insight through the opinions of other characters in a story.
6 0
3 years ago
We have a 16 GB main memory and 256 MB fully-associative cache, with block size of 64 bytes. We wish to store a 6 x 6 matrix in
Veronika [31]

Answer:

Find attached the solution

Explanation:

Single precision floating point number is 8B in size.

Block size is 64B .

4 0
3 years ago
Other questions:
  • Theresa is a certified teacher. She just had a baby and would like to stay home, but still wants to teach. Which career would be
    11·2 answers
  • What is the definition of legal intrusion
    14·1 answer
  • The bluecross blueshield federal employee program (fep) is a(n) __________ health benefits program established by an act of cong
    8·1 answer
  • g You need to build a circuit to perform parallel data transfers from one set of registers to another. The interconnections betw
    6·2 answers
  • Which is an unethical use of technology and resources at the workplace?
    13·2 answers
  • Select the correct answer.
    10·2 answers
  • Page Up and Page Down keys fall under the ? keys category.
    14·2 answers
  • How can I put my keyboard back​
    9·1 answer
  • Assuming a 32bit processor If I have a double pointer defined as dPtr and I add 1 to it. How many bytes are added to the address
    15·1 answer
  • Value (related to the five 'v's' of big data) addresses the pursuit of a meaningful goal. true false
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!