Answer:A teardrop attack
Explanation:
A teardrop attack also called denial-of-service attack is one which an attacker, usually a hacker sends many fragmented bug data messages to a victim's machine causing a crash in the device. This is because data moves in small data packets of whose transmission should follow layers according to the model of the devise be it OSI or TCP/IP model. Now when a hacker continually sends huge amounts of packets of bug data, the process of data transmission fails and packet data becomes overlapped, making the victim 's device machine in disarray and difficult to reconstruct while trying to rearrange them. When the hacker continually sends in more bug data packets to the already confused machine, The machine system crashes.
Answer: Integrity
Explanation:
Based on the information given, it should be noted that the protection that the hashing activity provides is integrity. In cryptography, hashing is used in the verification of integrity.
To determine integrity, comparison can be made between data and a hash value. When data is hashed at a particular time, the hash value is protected. Then, to ensure integrity, the data can then be hashed again after which it'll be compared to the protected value.
Answer:
Google Earth is the program which can be used for viewing Bill Gates mansion online. It is a computer program which provides three dimensional representation of Earth, Cities, rivers etc. It utilizes the satellite imagery and superimposes it with aerial photography and GIS data onto a three dimensional globe. For doing a tour of Bill gates mansion one needs to enter its address and coordinates. The mansions address and coordinates can be found on Google.com. This program can also be used to view the globe of Moon and Mars.
Answer:
import java.io.*;
public class Main
{
public static void main(String[] args) throws IOException {
BufferedReader bufferObject=new BufferedReader(new InputStreamReader(System.in));
String stringObject=bufferObject.readLine();
while(!stringObject.equals("99:99AM")){
System.out.println(convertedTime(stringObject));
stringObject=bufferObject.readLine();
}
}
public static String convertedTime(String stringObject){
String s=stringObject.substring(stringObject.length()-2);
String[] timeObject=stringObject.substring(0,5).split(":");
if(s.equals("AM")){
if(timeObject[0].equals("12")) return "00"+timeObject[1];
else return timeObject[0]+timeObject[1];
}
else{
if(timeObject[0].equals("12")) return "12"+timeObject[1];
else{
int hours=Integer.valueOf(timeObject[0]);
timeObject[0]=String.valueOf(12+hours);
return timeObject[0]+timeObject[1];
}
}
}
}
Explanation:
- Inside the main method run a while loop until stringObject is not equal to the string "99:99AM".
- Call the convertedTime method and display the results.
- Use the same hours and minutes except for 12th hour If the time is in AM.
- Use "00" instead of 12, if it is 12th hour.
- Add hours to 12, if the time is in PM and don't change anything in case of 12.
Answer:
Tactical Level
Explanation:
Based on the information provided within the question it can be said that the level of the organization that is being mentioned is called the Tactical Level. In this level managers focus choosing the tactics depending on the information that they gather from everyday operational activities. This information is later sent to the higher levels of the organization.