1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sukhopar [10]
3 years ago
6

Many malware attacks are ____ attacks, which involve more than one type of malware and/or more than one type of transmission met

hod. Select one: a. rootkit b. blended c. malicious software d. unauthorized access
Computers and Technology
1 answer:
Sedbober [7]3 years ago
7 0

C. Malicious software (aka malware).

Hope this helps.

You might be interested in
___________ is an approach to boundary spanning that results from using sophisticated software to search through large amounts o
snow_tiger [21]

Answer: Business intelligence

Explanation:

Most of the enterprises and organizations collects huge amount of data through the use of MIS. These data can be based on any aspect of the business. But the collection of such large sets of data is useless until and unless there is a business intelligence associated with it. the work of business intelligence is to use software tools for analysis of the collected data so that it could be useful for enterprise or company to look for patterns and trends in the market.

The outcome of such business intelligence is very helpful particularly to managers, executives for taking particular decisions in the greater interest of the company.

So we can say, business intelligence is an approach to boundary spanning that results from using sophisticated software to search through large amounts of internal and external data to spot patterns, trends, and relationships that might be significant.

4 0
3 years ago
In the table below identify the data type that would be most suitable for the second field
marishachu [46]

Answer:

C.

Explanation:

The second field is Age. Age is expressed as a number so will most likely be stored in a number data type.

6 0
3 years ago
2. Which property is used for hiding text of the textbox?
Softa [21]

Answer:

password char

Explanation:

The password char property allows the text being written in the textbox to be hidden in the form of dots or stars. As such the user entering the password is secure, as no one nearby can know the password by watching the texts.

8 0
3 years ago
DHCP and FTP servers listen for and send network traffic on:
julsineya [31]

Answer: Well known ports

Explanation:

DHCP server transmit the response to the dynamic host configuration server protocol (DHCP) clients. DHCP default port is 67 and its port number is greater than the user data-gram specific port.

FTP server has its default listen at port 21 and file transition protocol(FTP) uses two transmission control protocol(TCP) connection for communication in the network. FTP passes information in port number 21, which is only used to send control information.

Well known port are use to identify the service of network on the public internet and private internet network. Therefore, port 21 and 67 are the well known ports.

 

5 0
3 years ago
Before going into space, astronauts spend many hours training on flight simulators allowing them to learn how to fly without lif
MaRussiya [10]

Answer:

The short answer is, for full-mission flight simulators, specifically by NASA, are built with actual hardware and supported by simulation software. These software take into account every possible scenarios that could be adjusted based on the training. As for the hardware, they receive signals from the software on what they should do.

Explanation:

Some technologies involved are (which are also part of the FAA's requirements):

  1. 6 Degrees of Freedom for motion
  2. Visual systems
  3. Realistic acoustics
  4. Visual effects

This also involves a lot of robotics.

On the topic of motion:

One big and important feature is how motion is simulated - which takes a combined effort of both software and hardware to actually simulate how external forces can also affect the body.

It also takes into account the vibration that is experienced during launch.

The 6 degrees of freedom for motion includes:

  1. Up and down
  2. Left and right - sliding motion
  3. Back and forward
  4. Yaw - turning motion
  5. Pitch - look up and down
  6. Roll

For flight simulators, there are several levels and requirements being used in the aviation training industry. But one thing that you need to know is that the hardware and software mostly take into account motion.

On the topic of visual systems:

The pilots or crew should have a visual representation of what the outside world looks like with at least 150 degrees of view.

Realistic acoustics:

During simulations, actual sounds should also be present based on the real-life sounds produced during flight.

Visual effects:

If the pilot pivots to the right, or is about to breach the exosphere, the system's display should also take that into account and show it to the crew. This also includes visual effects for specific motions being done.

And as a bonus:

Just until recently, everything was analog (meaning, with dials, buttons, and levers) for the actual aircraft simulation that the pilots/astronauts are using. Update are now being made in NASA and SpaceX along with other rocket and spacecraft companies to move from analog to digital (with touch screens).

While this is an abridged version, it should help you to understand the complexities of a flight simulator.

8 0
3 years ago
Other questions:
  • When pasting information copied from a Word document into an Excel spreadsheet, click in the cell that will be the _______ of th
    7·2 answers
  • The _____ is a narrative description of the product, service, or information system.
    7·1 answer
  • Who wants sum points? spam this and ill put 3 questions up for 100 points i have 7111 points rn
    7·2 answers
  • One of the most common uses of spreadsheet programs are communicating with others. O editing images and photos. O tracking and m
    8·2 answers
  • Which of the following would be considered a primary source of information?
    6·1 answer
  • A(n) _______________ is a collection of configuration and security settings that an administrator has created in order to apply
    14·1 answer
  • A software update is also referred to as what?
    15·2 answers
  • Tools used to type text on Ms paint​
    12·1 answer
  • Impromptu speaking ability is very important in the workplace to clearly and effectively communicate ideas. An effective impromp
    8·2 answers
  • What is the difference between the wiring configurations for a residential, 8-position, 8-contact (8P8C) modular plug and jack i
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!