1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
6

Which term describes a process by which malicious code can enter from a non-secure network, and make a hairpin, or sharp turn, a

nd enter a secure network with little or no trouble because it is entering from a secure and verified endpoint?
Computers and Technology
1 answer:
lidiya [134]3 years ago
5 0

Answer:

The correct answer to the following question is Hairpinning.

Explanation:

Hairpinning is the returning message from one origin end-point and back in that direction from where it came, as the way to get it to the destination end-point.

All the conventional telephones systems use both digital and analog hairpinning connections.

In the VoIP (Voice over Internet Protocol), the hairpinning can be avoided and the two endpoints are connected after call has been initiated. This form of communication has following call setups which is called as shuffling.

You might be interested in
Dsl is an example of what type of internet access?.
iVinArrow [24]
Answer: Digital Subscriber Line (broadband connection)
8 0
2 years ago
Answer 1 question and get 10 points in return
AlekseyPX

Answer:

3

Explanation:

sorry if I'm wrong...it's been a while since I took a coding class.

5 0
3 years ago
Read 2 more answers
Consider the following relation: CAR_SALE (Car#, Date_sold, Salesman#, Commision%, Discount_amt Assume that a car may be sold by
Nady [450]

Answer:

See explaination

Explanation:

The given relation is:

CAR_SALE(Car#, Date_sold, Salesperson#, Commission%, Discount_amt)

Primary key: {Car#,Salesperson#}

We will first check whether the relation is in 1NF.

A relation is said to be in the 1st Normal form(1NF) if all the columns in the relation have atomic values. In this case, the relation is in 1NF.

A relation is said to be in the second normal form(2NF) if it satisfies the condition that all non keys are completely dependent on the primary key and just a part of the primary key.

In the case of the CAR_SALE relation, the Commission% depends only on the Salesperson# and not on the combination of Car# and Salesperson#. This means that the given relation is not in 2NF. To satisfy 2NF, we make two relationships as given below:

SALE_DETAIL(Salesperson#, Commission%)

and CAR_SALE(Car#, Date_sold, Salesperson#, Discount_amt)

Now both the relations are in 2NF.

For a relation to be in 3NF, no non-key should be functionally dependent on another non key.

In the case of the CAR_SALE relation, it is specified that the Date_sold field determines the Discount_amt. Therefore the modified CAR_SALE is not in 3NF.

To satisfy 3NF, we seperate the non key and the dependent non key and create a different table.

Final Relations:

SALE_DETAIL(Salesperson#, Commission%)

Discount_Detail(Date_Sold, Discount_Amt)

CAR_SALE(Car#, Date_sold, Salesperson#)

7 0
3 years ago
What is the answer to this question?
Helga [31]

Answer:

LoadFactorLimit >=1

Explanation:

The maximum Load factor limit allowed is equal to 1. And it cannot be greater than 1. And as the load factor limit is reached, the HashSet size is increased. And hence, the correct condition statement for this question is as mentioned above.

Remember the Load factor = number of keys stored in a HashSet divided by its capacity. And its maximum value cannot be more than 1.

7 0
3 years ago
After Nathan clicks the Bullets option, which bullet would appear with his list? checkmarks circle diamond square
Liono4ka [1.6K]

Answer:

After Nathan clicks the Bullets option, which bullet would appear with his list? CIRCLE

7 0
4 years ago
Other questions:
  • The tiny memory cards used by digital cameras and mobile devices are an example of ____ storage.
    15·1 answer
  • Which pane displays commands that change relative to the activity taking place in the presentation window's main work area?
    11·2 answers
  • Help verify each identity<br><img src="https://tex.z-dn.net/?f=%20%5Cfrac%7Bcsc%7D%7Bcot%20%5C%3A%20x%20%20%5C%3A%20%2B%20%20%5C
    9·1 answer
  • NOTE: in mathematics, the square root of a negative number is not real; in C therefore, passing such a value to the square root
    15·1 answer
  • A phonebook typically lists the name, address, and telephone number of everyone living in an area. Write code defining a structu
    15·1 answer
  • 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
    6·1 answer
  • a deque is a type of collection,but it is not automatically available when you open IDLE. What is missing that allows you to use
    14·2 answers
  • What will be displayed in the console when this program runs?
    15·1 answer
  • What are some catchy names for computer basics that you would put on a childrens poster?
    9·1 answer
  • Frank - as the Scrum Master of a Scrum Team - is invited for a Daily Scrum meeting at 9am. The teamgets together in front of the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!