1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
3 years ago
13

Can you find the ip address from a physical address

Computers and Technology
1 answer:
Alex787 [66]3 years ago
5 0

Answer: No. IP addresses are not tied to physical locations or even people. They're tied to devices.

You might be interested in
The term which refers to the attempt to gain unauthorized access to systems and computers used bya telephone company to operate
Alex787 [66]

Answer: Phreaker

Explanation:

Phreaker is defined as the unauthorized attack on  authorized communication system for stealing and manipulation phone networks.

  • Exploring,searching and identifying telecommunication field with help of technologies,equipment,tools etc is done to exploit the system and resources .
  • Other options are incorrect because phone hacking is attacking phone device, [email protected] is also hacking source and hacktivist hacks system to impact social and political field.
  • Thus, the correct option is option(d)
8 0
3 years ago
Rewrite the MERGE procedure so that it does not use sentinels, instead stopping once either array L or R has had all its element
Strike441 [17]

Answer:

Merge sort is a sorting technique based on divide and conquer technique.

Explanation:

MERGE(A, p, q, r)

   n1 = q - p + 1

   n2 = r - q

    L[1..n1] and R[1..n2]   this creates the new array

   for i = 1 to n1

       L[i] = A[p + i - 1]

   for j = 1 to n2

       R[j] = A[q + j]

   i = 1

   j = 1

   for k = p to r

       if i > n1

           A[k] = R[j]

           j = j + 1

       else if j > n2

           A[k] = L[i]

           i = i + 1

       else if L[i] ≤ R[j]

           A[k] = L[i]

           i = i + 1

       else

           A[k] = R[j]

           j = j + 1

4 0
3 years ago
Describe under what workloads c-scan would be preferred over c-look?
Gelneren [198K]

Many filesystems attempt to logically group inodes together in an attempt to keep data close together on the disk. Consider a file system configuration of 1KB size blocks, 16384 blocks/group, and 4096 inodes/group, with each inode sized 128 bytes.

3 0
3 years ago
Decisions are individual and reflect the situations that are in your own personal life true or false
Nesterboy [21]
It is false because some decisions can effect other people as well
6 0
4 years ago
Read 2 more answers
assume you are the Chief Information Officer (CIO)1 of the company that you dream of (any company, real or hypothetical). Give a
tino4ka555 [31]

Answer:

Suppose I am Chief information officer of a business firm which provide accounting related services to leading companies and brands. Obviously the data that my organization has excess of is prone to various cyber threats and because even a slight misuse of data will cause huge loss of clients, it is huge responsibility to secure every bit of data from any kind of cyber threat.

Majorly two type of security threats are there :-

External threat:-When threat is caused due to an external factor which is outside organization it is called external threat.                                                                                                                                

Criminal syndicates:- These are group of malicious professional attackers .They carefully chosen targets from which they expect good returns.

State-sponsored actors:-Their main goal is accessing the database of organization and an access to organizations.

Hacktivists:- Generally they carry out a malicious cyber activity to promote either a political agenda, religious belief or a social ideology. There has come many cases where these hackers shuts down websites, either for fun or for some political purpose time to time.

2. Internal threat:-Threats which comes from employees, ex-employees and third parties. It is very easy for someone from inside the organization to steal the data and misuse it.

Some of the methods by which we can make sure that the data of organization is secured are:-

Adopt for Penetration testing tool:- Penetration testing tools check the vulnerabilities or weak areas in the software systems.We can also install IDS (Intrusion Detection System) which will alert us if there is suspicious activity on the network. Further we would have to keep an eye on all the database access activity and usage patterns in real time to ensure that no data leakage is taking place, or there is unauthorized SQL.

Calculate risk scores:- Risk scores calculates the vulnerabilities and gives the extent of severity in the form of a numerical score. This will gives the company a bigger picture of data vulnerability.Security companies like Lucideus provide this service of risk score calculation.

A trained Workforce-Employees in the company would have to trained to recognize common cyber threats .Small mistakes that we all do like opening emails from mysterious senders should not be done. There is need of promoting a security conscious work culture. Further if ex employees leave the company on bad terms ,it may happen that they would misuse the data out of anger.So to make sure that this doesn't happen provide only a limited access to employees so that once they leave their privileges to access data of the organization is denied.

Encrypt Data:-Encryption is a process where data is converted to scrambled code before transmitting it by using special mathematical algorithms. Further decoding of that data can be done only when an authorized user accesses it. This will make sure that data is secured and is accessed only by right users.In current scenario, encryption is one of the most popular and effective data security methods used by organizations.

Cloud-based architectures:- It may sound bizarre but Cloud-based architectures are more disaster-tolerant to protect data.Clouds uses encryption to transmit the data and it is encrypted also when it is idle on the cloud servers.

Explanation:

7 0
3 years ago
Other questions:
  • Which computer device works like the human central nervous system by connecting all the computer’s parts together and allowing t
    9·1 answer
  • What is the device that allows users to manipulate data by controlling an onscreen pointer
    5·2 answers
  • Discuss what technologies you might see in use at an enterprise. For example, where would you most likely see fiber-optic Ethern
    9·1 answer
  • In this chapter, you subnetted a Class C private network into six subnets. In this project, you work with a Class B private netw
    10·1 answer
  • Instructions:Select the correct answer.
    9·2 answers
  • Not all hardware is connected with wires, some hardware might be connected wirelessly with
    9·1 answer
  • Free poi nts here you go
    5·1 answer
  • 1.The ___________ method adds a new element onto the end of the array.
    5·1 answer
  • Need answer ASAP
    14·1 answer
  • How to trigger watchers on initialization in vue.js ?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!