1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
3 years ago
5

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network serv

ices, and/or sends attack instructions without entering the office or organization that owns the network. True or False True False
Computers and Technology
1 answer:
Varvara68 [4.7K]3 years ago
5 0

Answer: True

Explanation:

An hacking activity usually deal with the unauthorized access to ones system.

Similarly this technique of Drive by hacking by which the attacker release wireless networks. Then a computer user of an organization finding a wireless network tries to connect to the open network and it is this process when the computer or system user falls easy prey to the hacker. The attacker uses the wireless network as a medium to  intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

It is often accompanied with the SqL injection packets into the network.

This attack is also popular by the name hotspot attack.

You might be interested in
Related to Image Classification
loris [4]
<h3>Answers:</h3>

(1) Train the classifier.

(2) True

(3) Image Pre-processing

(4) Weakly Supervised Learning Algorithm

(5) SIFT (or SURF)

(6) True

(7) True

(8) True

(9) True

(10) Decision Tree Classifier

(11) Softmax


<h3>Explanations:</h3>

(1) In supervised learning, we have given labels (y) and we have input examples (X) which we need to classify. In Keras or in Scikit-learn, we have a function fit(X, y), which is used to train the classifier. In other words, you have to train the classifier by using the incoming inputs (X) and the labelled outputs (y). Hence, the correct answer is: The fit(X,y) is used to <em>train the classifier</em><em>. </em>

(2) This statement is primarily talking about the PCA, which stands for "Principal Component Analysis." It is a technique or method used to compress the given data, which is huge, into compact representation, which represents the original data. That representation is the collection of PCs, which are Principal components. PC1 represents the axis that covers the most variation in the data. PC2 represents the axis that covers the variation less than that of in PC1. Likewise, PC3 represents the axis that covers the variation less than that of in PC2, and so on. Therefore, it's <em>true</em> that the variation present in the PCs decrease as we move from the 1st PC to the last one.

(3) Image pre-processing is the phenomenon (or you can say the set of operation) used to improve and enhance the image by targeting the distortions within the image. That distortions are calculated using the neighbouring pixels of the given pixel in an image. Hence, the correct answer is <em>Image pre-processing</em>.

(4) SVM stands for State Vector Machine. It is basically a classifier, which is used to classify different (given) classes with precision. In simple terms, you can say that it is an algorithm, which is partially based on the given labeled data to predict the inputs. In technical terms, we call it weakly supervised learning algorithm. Hence, the correct answer is: <em>Weakly supervised learning algorithm.</em>

(5) There are many algorithms out there to detect the matching regions within two images. SURF (Scale Invariant Feature Transform) and SIFT (Speeded up Robust Feature) are two algorithms that can be used for matching patterns in the given images. Hence, you can choose any one of the two: SURF and SIFT.

(6) Indeed. Higher the accuracy is, better the classifier will be. However, there is a problem of <em>overfitting</em> that occurs when the accuracy of the classifier is way too high. Nevertheless, mostly, the classifier is better when there is higher accuracy. Hence, the correct answer to your question is <em>true</em>.

(7) True. Gradient descent is the process used to tune the parameters of the given neural network in order to decrease the error and increase the accuracy of the classifier. It calculates and fine-tune the parameters from the output to input direction by taking the gradient of the error function (sometimes called the loss function), which is the technique called backpropagation. Hence the correct answer is true.

(8) True. As explained in the part (5), SIFT which is called  scale-invariant feature transform, is an algorithm used to detech the features or the matching regions within given images. Hence, it's true that scale-invariant feature transform can be used to detect and describe local features in images.

(9) True. Clustering is indeed a supervised classification. In clusterning, we use graphs, which contains different data points in the form of clusters, to visualize the data as well. Imagine we have 7 fruits, out of which we know 6 of them, and we have to predict the 7th one. Let's say, 3 are apples and 3 are oranges. The set of apples is one cluster, and the set of oranges is another cluster. Now if we predict the 7th one by using the clustering technique, under the hood, that technique/algorithm will first train the model using the 6 fruits, which are known and then predict the 7th fruit. This kind of technique is a supervised learning, and hence, we can say that clustering is a supervised classification.

(10) In machine learning, Decision Tree Classifier is used to predict the value of the given input based on various known input variables. In this classifier, we can use both numeric and categorical values to get the results. Hence, the correct answer is <em>Decision Tree Classifier.</em>

(11) <em>Softmax </em>is the function which is used to convert the K-dimensional vector into the same shaped vector. The values of the Softmax function lies between 0 and 1, and it is primarily used as an activation function in a classification problems in neural networks (or deep neural networks). Hence, the correct answer is Softmax.

6 0
3 years ago
2.13.4 Colorful Caterpillarhel ????
exis [7]

Answer:

sorry don't know :(8685

3 0
3 years ago
The title element in the head section of an HTML document specifies the text
bagirrra123 [75]

Answer: c. that's displayed in the title bar of the browser

Explanation:

The title element in the html write up is used to describe the title of the work that is been carried out.

It has the format <title></title>, the title name is indicated between the opening and closing title tag.

The title does not display on the main page of the Web user's display, but it can be seen on the title bar of the Web browser.

The title element help Web user to have an idea of what a Web page is about.

7 0
3 years ago
What is the by stander effect
nignag [31]

Answer:

The bystander effect is a theory that people are less likely to help if there are others around.

hope this helped :D

4 0
3 years ago
_______ computing refers to applications and services that run on a distributed network using virtualized resources.
denis23 [38]
D.cloud is my answer
7 0
4 years ago
Other questions:
  • Constructors ________. initialize instance variables when overloaded, can have identical argument lists when overloaded, are sel
    11·1 answer
  • Why is it important to consider the readability of a Web page when selecting and applying a background color?
    12·1 answer
  • Which of the following is a typical concern for developers while using prototypes?
    6·2 answers
  • No workplace is immune to the threat of workplace violence. true or false
    9·2 answers
  • Consider an unpipelined or single-stage processor design like the one discussed in slide 6 of lecture 17. At the start of a cycl
    10·1 answer
  • PLEASE HELP!!!
    12·1 answer
  • Please help me with this , I’m stuck and cannot understand this , please help me with this , I’ll appreciate it alot
    13·1 answer
  • The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval
    15·1 answer
  • One of the earliest computer networks was the ARPANET, developed in the early 1960s. The purpose of this network was to:
    13·2 answers
  • Alina is using a small database that uses just one table to store data. What type of database is Alina using?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!