1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
3 years ago
8

Is the answer a,b,c,d

Computers and Technology
1 answer:
MariettaO [177]3 years ago
4 0
Well I got some numbers mixed up but I think it’s B
You might be interested in
How many invalid code sequences can we have in 5b/6b encoding?
mart [117]
<span>In the process of 5B/6B encoding, it is possible to have the following two kinds of data sequences: 1. 25=32 data sequences 2. 26=64 data sequences Therefore, this can left us with some unused code sequences that are 32 in number (=26 – 25). On the other hand, in the encoding process of 3B/4B, it is possible to another set of data sequences as follows: 1. 23=8 data sequences 2. 24=16 data sequences This type of encoding also leaves us with some unused code sequences that are 8 in number (=23-24). 2. </span>
6 0
3 years ago
Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping
tresset_1 [31]

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

6 0
4 years ago
What are the advantages of the java.util.Stack implementation of a stack?
klemol [59]

Explanation:

The advantages of java.util.Stack are as following:-

  1. java.util.Stack is an implementation of the vector class hence it can keep track of position of elements in the stack hence it is not required to store an additional pointer for each node.
  2. In the implementation it allocates space only that much is needed.

These are the two advantages of java.util.Stack.

3 0
4 years ago
When an organization implements a major accounting software package, it also inherits the system of internal control that is bui
Genrish500 [490]

Answer:

potata

Explanation:

potato

3 0
3 years ago
Machine language—0s and 1s—would be very difficult for a programmer to write in; thus a low-level (second-generation) language,
adelina 88 [10]

Answer:

Assembly Language.

Explanation:

Machine Language:- It is the lowest level programming language.It represent that the data in the form of 1's and 0's it is like this because the machines understand only binary or 1's and 0's.

Assembly Language:-It is the second generation of programming language.It can be used by a programmers to write program using abbreviations and basic words instead of binary numbers.

5 0
3 years ago
Other questions:
  • In excel, a cell is referred to by its cell __________, which is the coordinates of the intersection of a column and a row. answ
    14·1 answer
  • Input numbers and segregate them by placing their values into even or odd vectors based upon their value being even or odd. Then
    12·1 answer
  • You were replying to e-mail when suddenly your computer started to display random messages, and stopped responding to keyboard a
    10·1 answer
  • Many computer programs contain ____ that detail the specific instructions a computer should perform (in a specific order) to car
    9·1 answer
  • What are the 3 symbols that can’t be used when saving a document? (From Microsoft Word 2016) (pls helped me!)
    6·1 answer
  • Engineers perform a(n) blank to compare the possible negative effects of making a decision involving technology with the possibl
    9·2 answers
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • A _____ is an Access database object that allows you to arrange the fields of a record in any layout so you can enter, edit, and
    6·1 answer
  • Harry needs to make a presentation on packaging prototypes for a new product. Which presentation software elements can be use to
    9·1 answer
  • How have these advances in-home technology changed the role of technicians in our society?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!