1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
4 years ago
7

How has the growth of industries that use computer technology changed employment?

Computers and Technology
1 answer:
KIM [24]4 years ago
8 0
Well Member The Industrial Revolution? Well If You Forgot It Was Like Making Goods Like With Your Hands But Every Since The Factories Came Works Been Kind Of Hard To Find And Such , So If The Growth Of Industries That Use Technology Changes Employment Than We Wouldn't Have Work It Would Have Been The Industrial Revolution All Over Again
You might be interested in
How are computers classified into different types? Explain ​
zloy xaker [14]

Answer:

On the basis of size there are four types of computer. They are minicomputer, micro computer, mainframe computer and super computer. Super computer is the fastest, most expensive, big in size, and most powerful computer that can perform multiple tasks within no second.

3 0
2 years ago
How do you post a picture on brainly? How do you also lower the points to like 5,brainless to the first understandable answers
Morgarella [4.7K]
To post a picture you just need to click on the clipper looking thing 
3 0
3 years ago
A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate p
choli [55]

Answer:

Option B,C,E

Explanation:

4 0
3 years ago
You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
DedPeter [7]

ICMPv6 is used by IPv6 nodes to report errors encountered in processing packets, and to perform other internet-layer functions, such as diagnostics.  An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests.

Explanation:

Issues that are of concern which could be a problem include :

Denial-of-Service Attacks  

  • ICMPv6 can be used to cause a denial of service (DoS) in a number of  ways, including simply sending excessive numbers of ICMPv6 packets to destinations in the site and sending error messages that disrupt  established communications by causing sessions to be dropped.

Probing

  • A major security consideration is preventing attackers from probing  the site to determine the topology and identify hosts that might be vulnerable to attack.  Carefully crafted but, often, malformed  messages can be used to provoke ICMPv6 responses from hosts thereby  informing attackers of potential targets for future attacks.  However, the very large address space of IPv6 makes probing a less effective weapon as compared with IPv4 . Redirection Attacks

Redirection Attacks

  • A redirection attack could be used by a malicious sender to perform  man-in-the-middle attacks or divert packets either to a malicious  monitor or to cause DoS by blackholing the packets.  These attacks would normally have to be carried out locally on a link using the Redirect message.  Administrators need to decide if the improvement  in efficiency from using Redirect messages is worth the risk of  malicious use.  Factors to consider include the physical security of   the link and the complexity of addressing on the link

Renumbering Attacks

  • Spurious Renumbering messages can lead to the disruption of a site.  Although Renumbering messages are required to be authenticated with  IPsec, so that it is difficult to carry out such attacks in practice,  they should not be allowed through a site boundary firewall.  On the  other hand, a site may employ multiple "layers" of firewalls.

Problems Resulting from ICMPv6 Transparency

  • Because some ICMPv6 error packets need to be passed through a  firewall in both directions, malicious users can potentially use  these messages to communicate between inside and outside, bypassing  administrative inspection.

Packet types or specific circumstances in which ICMPv6 traffic could compromise network security :

Ping sweep — A type of attack that uses ICMP echo request messages to enumerate live hosts on a network.

Ping flood — Utilized to launch a denial of service attack (DoS), where the attacker sends ICMP requests in a rapid succession without waiting for the targeted system to respond.

ICMP tunneling — A method used to establish a covert communication channel between remote systems, most times between a client and a proxy. All communications are sent via ICMP requests and replies

Forged ICMP redirects —  The attacker would send a ICMP redirect message, which informs a host of a direct path to a destination, to the victim that contains the IP addresses of the attacker’s system. This allows an attacker to compromise network traffic via a man-in-the-middle attack or cause a DoS.

8 0
3 years ago
The Internet can both reduce and increase the bargaining power of suppliers, depending on the specific circumstances.
slamgirl [31]

Answer:

True                                                                                

Explanation:

Internet can reduce bargaining power of suppliers:

Internet is a powerful means which has strengthen competitiveness in organizations. This has led to competition which results in price wars. This decreases the bargaining power of suppliers as the competition among different suppliers intensifies and the need of the buyers to buy only from a few suppliers is lessened. This also results in the increased bargaining power of buyers. Internet enables buyers to save their time and money and has increased transparency e.g. services costs which resulted in increase bargaining power of buyers while reducing the bargaining power of suppliers. This transparency increased price competition and competitiveness . Consequently buyers are less loyal to certain suppliers and can choose the suppliers who meet their requisites.

Internet can increase bargaining power of suppliers:

Through internet the bargaining power of suppliers can be increased. The internet has given a cost effective platform to suppliers to reach to their customers which has increased competition between suppliers. Suppliers can access more customers and provides better services to them. With internet connectivity suppliers can directly communicate with their customers. The internet can increase the bargaining power of suppliers by allowing reduction of entry barriers and increasing number of competitors.

7 0
4 years ago
Other questions:
  • ____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a netw
    12·1 answer
  • If you were practicing keyboarding and the excercise contained the letters q,o,e,p,r and t, what section of the keyboard are you
    14·1 answer
  • Hazel has just finished adding pictures to her holiday newsletter. She decides to crop an image. What is cropping an image?
    5·1 answer
  • How do you use loops in code?
    7·1 answer
  • Write the C++ if statement that compares the contents of the quanity variable to the number 10. If the quantity variable contain
    12·1 answer
  • What are three metrics used to define consistent network application availability?
    5·1 answer
  • Write a program that prompts the user to enter a number then counts the number of odd numbers and even numbers the user enter. T
    15·1 answer
  • What are the pros and cons of stone, wood, brick, concrete, steel, and glass for architecture building materials?
    7·2 answers
  • I'll mark you the brainlest please help
    14·2 answers
  • How does the technology affect you daily living? Give situations where you use technology and how it helped you.​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!