1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vsevolod [243]
3 years ago
8

n the Spring of 2015, three utility companies in the Ukraine received email purporting to come from Ukraine's parliament, the Ra

da. It was addressed to employees that were used to receiving communications from the Rada dealing with utility regulations. The email included an attached Microsoft Excel spreadsheet with malicious Macros. This was an example of what kind of attack
Engineering
1 answer:
Tresset [83]3 years ago
5 0

Answer:

Trojan horse

Explanation:

A trojan horse attack is a type of malware that misleads users, as it appears unsuspicious at first, but actually presents a threat to the user. A common example is that of an email that contains a malicious attachment. Another common example is that of a fake advertisement. The name comes from the Greek story of the Trojan horse that led to the fall of the city of Troy.

You might be interested in
Water flows through a pipe and enters a section where the cross sectional area is larger. Viscosity, friction, and gravitational
BaLLatris [955]

Answer:

(A) and (D)

Explanation:

1) P2 is less than P1, that is when P1 increases in pressure, the velocity V1 of the water also increases. Therefore, on the other hand, since P2 is directly proportional to V1, P2 and V2 will be less than P1 and V1 respectively.

2) For P2 greater than P1 and V2 also is greater than V1. Since P2 is directly proportional to V2, hence, when P2 increases in pressure, P1 reduces in pressure. Similarly, velocity, V2 also increases and V1 reduces.

3 0
3 years ago
Does anybody want 20 points? They're free get 'em while ya can...
DedPeter [7]

Answer:

hi

Explanation:

4 0
3 years ago
Read 2 more answers
Determine the period of each of the following discrete-time signals (if a signal is not periodic, denote its period by infinity)
sergiy2304 [10]

Answer:

a) it is periodic

N = (20/3)k = 20 { for K =3}

b) it is Non-Periodic.

N = ∞

c) x(n) is periodic

N = LCM ( 5, 20 )

Explanation:

We know that In Discrete time system, complex exponentials and sinusoidal signals are periodic only when ( 2π/w₀) ratio is a rational number.

then the period of the signal is given as

N = ( 2π/w₀)K

k is least integer for which N is also integer

Now, if x(n) = x1(n) + x2(n) and if x1(n) and x2(n) are periodic then x(n) will also be periodic; given N = LCM of N1 and N2

now

a) cos(2π(0.15)n)

w₀ = 2π(0.15)

Now, 2π/w₀ = 2π/2π(0.15) = 1/(0.15) = 1×20 / ( 0.15×20) = 20/3

so, it is periodic

N = (20/3)k = 20 { for K =3}

b) cos(2n);

w₀ = 2

Now, 2π/w₀ = 2π/2) = π

so, it is Non-Periodic.

N = ∞

c)  cos(π0.3n) + cos(π0.4n)

x(n) = x1(n) + x2(n)

x1(n) = cos(π0.3n)

x2(n) =  cos(π0.4n)

so

w₀ = π0.3

2π/w₀  = 2π/π0.3 = 2/0.3 = ( 2×10)/(0.3×10) = 20/3

∴ N1 = 20

AND

w₀ = π0.4

2π/w₀  = 2π/π0. = 2/0.4 = ( 2×10)/(0.4×10) = 20/4 = 5

∴ N² = 5

so, x(n) is periodic

N = LCM ( 5, 20 )

6 0
3 years ago
Think about a packed lunch and the
Mazyrski [523]

Answer:

They are combination structures made up of solid, and shell structures.

Explanation:

Thinking of a lunch pack which is shaped as a solid bag made up of different compartments to hold food, what comes to mind are;

1. The solid structure: This is seen in the form of the bag which has solid makeup.

2. The shell structure: This is seen in the different compartments holding the different types of foods. Shell structures are usually in the form of containers made to hold something in.

4 0
3 years ago
Select the option below that contains the correct order or sequence of events. A) 1) Add host to subscription, 2) Use host as re
butalik [34]

The  option that has the correct order or sequence of events are;

1) Scan host.

2) Add host to subscription.

3) Use host as report source.

<h3>What are host assets?</h3>

Host assets are known to be a kind of IP addresses in a person's account. This type of assets is one that can be used as a kind of  scan, map and also to report targets.

A person can view the hosts in their account by going the  Assets panel to  the Host Assets. One can add new hosts by the use of the New menu. The person can also only carry out actions like scanning, mapping and reporting on one's hosts.

Learn more about IP addresses from

brainly.com/question/24930846

5 0
2 years ago
Other questions:
  • The denominator of a fraction is 4 more than the numenator. If 4 is added to the numenator and 7 is added to the denominator, th
    15·1 answer
  • Serves as a protective barrier to prevent contact with engergized ("hot") parts<br> within the unit
    13·1 answer
  • What is the main purpose of the alternator?
    13·1 answer
  • Suppose there are n chairs in a row. We want to compute the number of ways to put 2 students into seats so that they are not nex
    12·1 answer
  • Effective presentations are: Have a central message Colorful and exciting Have many messages Are influence by a setting Created
    15·2 answers
  • Somebody help me!! It’s due today
    9·1 answer
  • How would you expect an increase in the austenite grain size to affect the hardenability of a steel alloy? Why?
    13·1 answer
  • 10.) A solid circular titanium control rod at 7,000 lb axial tension force where stress must not
    15·1 answer
  • What are the horizontal structures beneath a slab that help transfer the load from the slab to the columns?
    14·2 answers
  • 1)What are the three previous manufacturing revolutions Mr. Scalabre mentions? When did these take place?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!