1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
15

When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads,

Computers and Technology
1 answer:
pshichka [43]3 years ago
3 0

Answer:

This type of attack is called Malvertising

Explanation:

Malvertising (Malware Advertising)  is a term in computer security that refers to the act of spreading computer malware through online advertisements. It is done by injecting malicious code into genuine online advertisement platforms or malicious webpages that appear as though they are genuine and from reputable third-party advertisers. While it is quite a new concept it is difficult to combact because content for advertisement can be placed in genuine and reputable websites that users trust.

You might be interested in
_________ analysis is a data mining application that discovers co-occurrence relationships among activities performed by specifi
SSSSS [86.1K]

<u>Affinity analysis </u>is a data mining application that discovers co-occurrence relationships among activities performed by specific individuals or groups, such as market basket analysis.

<h3>What is affinity analysis?</h3>

Affinity Analysis is a type of predictive analysis method that uses data mining to uncover hidden, insightful correlations between various variables based on how frequently they occur between distinct persons or groups in the dataset.

The Product Affinities Analysis sheds light on the items that clients buy in tandem during a shopping trip, such as how they are filling out a broader weekly shopping trip or putting together specific meals.

Therefore, Affinity analysis is a data mining tool that identifies co-occurrence patterns between tasks carried out by particular people or groups, like market basket analysis.

To learn more about affinity analysis, refer to the link:

brainly.com/question/13077215

#SPJ5

5 0
1 year ago
Read 2 more answers
What objective behaves like a high level array
zavuch27 [327]

Answer:

C.Vector

Explanation:

Vector is a high level array used in C++.It has the capability of resizing itself when it gets full.it has many functions that increases it's functionality like size(),begin(),end(),erase(),clear(),push_back(),pop_back() and many more and we store any kind of data type in the vector.

syntax for declaring a vector:-

vector<data type> vector name.

8 0
3 years ago
3. (20 points) Write a C++ recursive function that finds the maximum value in an array (or vector) of integers without using any
Luden [163]

Answer:

Following are the code to this question:

In option (i):

#include <iostream>//defining header file

using namespace std;

int findMax(int B[], int x)//defining recursive method findMax

{

if (x == 1)//defining condition when value of n==1

return B[0];//return array first element

return max(B[x-1], findMax(B, x-1)); // calling recursive method inside max method and return value

}

int main() //defining main method  

{

int B[] = {12, 24, 55, 60, 50, 30, 29};//defining array B

int x= 7;//defining integer variable and assign a value

cout << "Maximum element value of the array is: "<<findMax(B, x)<<endl;//calling method findMax and print value

return 0;

}

Output:

Maximum element value of the array is: 60

In option (ii):

\Rightarrow \ T(n) = 1 + T(n-1)\\\Rightarrow  1 + 1 + T(n-2)\\ \Rightarrow  1 + 1 + 1 + ... n \ times \\\Rightarrow  O(n) \\

Explanation:

In the above-given program a recursive method "findMax" is defined, which accepts an array "B" and an integer variable "n" in its parameter, inside the method a conditional statement is used that, checks value of x equal to 1.

  • If the above condition is true it will return the first element of the array and find the max number.
  • Inside the main method, an array B is declared that assigns some values and an integer variable is declared, that also assigns some values, in the last step print method is used that pass value in method and prints its return value.
  • In the option (ii) we calculate the Big-O notation algorithm value.
5 0
4 years ago
write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'
natima [27]

Answer:

//check which string is greater

if(strcmp(name1,name2)>0)

//assign name1 to first, if the

    //name1 is greater than name2

    first=name1;

else

    //assign name2 to first, if the

    //name2 is greater than name1

    first=name2;

5)

//compare name1 and name2

    if(strcmp(name1,name2)>0)

   

         //compare name1 and name3

         if(strcmp(name1,name3)>0)

       

             //assign name1 to max, becuase

             //name1 is greater than name2 and name3

             max=name1;

       

Explanation:

7 0
3 years ago
The tuning systems were not always reliable during the Baroque period. Why did composers use key signatures?
lapo4ka [179]

Key signatures were used because simply by knowing how many sharps or flats there were, the tuning would be more uniform. Tuning systems were not developed yet during the Baroque era and the concept of key was not introduced by then.

<span> </span>

7 0
4 years ago
Other questions:
  • According to the text, what have humans used throughout history to overcome physical limits?
    12·1 answer
  • Lean production systems are sometimes referred to as pull systems because demand from customers activates the production actions
    5·1 answer
  • A(n) _____ is an organized collection of people, procedures, software, databases, and devices that stores and retrieves knowledg
    6·1 answer
  • The ability to send and receive transmissions at the same time on an ethernet cable is referred to by what term?
    7·1 answer
  • Explain the difference between good and bad table structures. How do you recognize the difference between good and bad structure
    14·1 answer
  • What are procedures that help keep a data base current
    7·2 answers
  • give the difference between functional and functional tools in the middle of to the circle give importance​
    10·1 answer
  • Write a print statement that displays a random integer between 5 and 5000. Assume the random library is imported.
    12·1 answer
  • A. Choose the correct answer.
    8·2 answers
  • In your opinion., which Zelda character is the hottest? Be honest.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!