1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
3 years ago
11

Worms often try to disguise from where they are sending data by using a bogus ip addresses instead of using an authorized ip add

ress belonging to the network
Computers and Technology
1 answer:
Katyanochek1 [597]3 years ago
5 0

If the question is asking whether it is true or false, the answer is false because worms are not responsible for disguising when they are sending data by using bogus ip addresses but it is the Trojan horses in which they are the one responsible for misleading users from the true intent or the real data.

You might be interested in
Please check my answer! (Java)
nlexa [21]

Correct, you're looking for an outer loop that loops from 0 to 15, and an inner loop from 0 to 50.

3 0
3 years ago
Is the cell phone changing our views about polite and impolite behavior? For example,
Otrada [13]

a cell phone is changing our views in both polite and unpolite ways because these days I see people at dinner tables on their phones taxting and not actually socializing with the people around them but at the same time people who like other people posts on instagram and wright good comments are being very polite to the person who posts it.

4 0
3 years ago
Read 2 more answers
Can you answer this question?
patriot [66]

Answer:

To do this you'll need to use malloc to assign memory to the pointers used.  You'll also need to use free to unassign that memory at the end of the program using the free.  Both of these are in stdlib.h.

#include <stdlib.h>

#include <stdio.h>

#define SIZE_X 3

#define SIZE_Y 4

int main(void){

       int **matrix, i, j;

       // allocate the memory

       matrix = (int**)malloc(SIZE_X * sizeof(int*));

       for(i = 0; i < SIZE_X; i++){

               matrix[i] = (int *)malloc(SIZE_Y * sizeof(int));

       }

       // assign the values

       for(i = 0; i < SIZE_X; i++){

               for(j = 0; j < SIZE_Y; j++){

                       matrix[i][j] = SIZE_Y * i + j + 1;

               }

       }

       // print it out

       for(i = 0; i < SIZE_X; i++){

               for(j = 0; j < SIZE_X; j++){

                       printf("%d, %d:  %d\n", i, j, matrix[i][j]);

               }

       }

       // free the memory

       for(i = 0; i < SIZE_X; i++){

               free(matrix[i]);

       }

       free(matrix);

       return 0;

}

3 0
3 years ago
Pseudocode is an improvement over the IPO chart because it lays out the a0 sequence of steps for a particular program.
Olegator [25]

Answer:

Yes. Pseudocode is an improvement over the IPO chart because it lays out the sequence of steps for a particular program

Explanation:

The input–process–output (IPO) chart is a widely used approach in systems analysis and software engineering for describing the structure of an information processing program or other process. The chart has three components (Input, Process and Output), and you write the description of each component in plain English, not code or mathematical formulas.

Pseudocode is a procedure for solving a problem in terms of the actions to be executed and the order in which those actions are to be executed.

Pseudocode is an improvement over the IPO chart because it shows the step by step sequence to be followed by a particular program unlike the IPO chart which just break the program into Input, Process and Output.

6 0
3 years ago
NO SPAMMERS, ONLY FULL ANSWER
melisa1 [442]

Answer:

true

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • What type of document would you use the landscape page orientation
    7·1 answer
  • What is an effective way to display calculations in a Word document
    7·2 answers
  • Help PLEASE (in attachment)
    8·1 answer
  • Are computer virus and human virus the same​
    6·1 answer
  • Write a Java program to count the characters in each word in a given sentence?Examples:Input : geeks for geeksOutput :geeks-&gt;
    10·1 answer
  • Unleashes the ability of each person on their team to improve performance, solve problems, and
    6·2 answers
  • Please help meeee , you will get 20 points
    9·2 answers
  • Which format of image files can be inserted in html?​
    8·2 answers
  • You have to cut a wood stick into pieces. The most affordable company, The Analog Cutting Machinery, Inc. (ACM), charges money a
    10·1 answer
  • Which three statements are true of lossless compression?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!