1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ira Lisetskai [31]
3 years ago
14

This is a text message that is stored on a user's computer by a Web server that helps trace the user's browsing habits. a. Scrip

t b. Cookie c. ID theft d. Firewall e. Data file
Computers and Technology
1 answer:
icang [17]3 years ago
5 0

Answer:b)Cookie

Explanation: Cookies are the files which are of small size for keeping the track of the browsing data in a particular computer system.These files get stored automatically on the system.It has the accessibility through the web server and the computer system's client.

Other given options are incorrect because they don't store the modest websites that has been accessed by the user in the recent time.Thus , the correct option is option(b).

You might be interested in
My friend Leo wants to have an emergency plan for his final exams on University of Southern Algorithmville. He has N subjects to
Brut [27]

Answer:

Greedy algorithm

Explanation:

Greedy is an algorithmic paradigm that builds up a solution piece by piece, always choosing the next piece that offers the most obvious and immediate benefit. Greedy algorithms are used for optimization problems. An optimization problem can be solved using Greedy if the problem has the following property: At every step, we can make a choice that looks best at the moment, and we get the optimal solution of the complete problem.

If a Greedy Algorithm can solve a problem, then it generally becomes the best method to solve that problem as the Greedy algorithms are in general more efficient than other techniques like Dynamic Programming. But Greedy algorithms cannot always be applied. For example, the Fractional Knapsack problem (See this) can be solved using Greedy, but 0-1 Knapsack cannot be solved using Greedy.

The following are some standard algorithms that are Greedy algorithms.

1) Kruskal’s Minimum Spanning Tree (MST):

In Kruskal’s algorithm, we create an MST by picking edges one by one. The Greedy Choice is to pick the smallest weight edge that doesn’t cause a cycle in the MST constructed so far.

2) Prim’s Minimum Spanning Tree:

In Prim’s algorithm also, we create an MST by picking edges one by one. We maintain two sets: a set of the vertices already included in MST and the set of the vertices not yet included. The Greedy Choice is to pick the smallest weight edge that connects the two sets.

3) Dijkstra’s Shortest Path:

Dijkstra’s algorithm is very similar to Prim’s algorithm. The shortest-path tree is built up, edge by edge. We maintain two sets: a set of the vertices already included in the tree and the set of the vertices not yet included. The Greedy Choice is to pick the edge that connects the two sets and is on the smallest weight path from source to the set that contains not yet included vertices.

4) Huffman Coding:

Huffman Coding is a loss-less compression technique. It assigns variable-length bit codes to different characters. The Greedy Choice is to assign the least bit length code to the most frequent character.

The greedy algorithms are sometimes also used to get an approximation for Hard optimization problems. For example, the Traveling Salesman Problem is an NP-Hard problem. A Greedy choice for this problem is to pick the nearest unvisited city from the current city at every step. These solutions don’t always produce the best optimal solution but can be used to get an approximately optimal solution.

8 0
2 years ago
NEED HELP
amid [387]

Answer:

i would do B

Explanation:

I YOUNGI

I MIDDLE I

I   AGED  I

I     MEH   I

I_______ I

\ kinda old/

  \ ____ /

   I OLD I

3 0
3 years ago
Q2: Mark True or False in the corresponding Answer sheet (0.5 point each)
Zinaida [17]

The answers to the question are:

  1. True
  2. True
  3. True
  4. True
  5. False
  6. true
  7. True
  8. True
  9. False
  10. False
  11. false
  12. False
  13. True
<h3>Which words are combined to form malware?</h3>

Malware is known to be a kind of malicious software and it covers  viruses, worms, trojans and other bad computer programs that is often used by hackers to wreak and steal information from system.

The types Of Expansion Cards are:

  • Sound Card
  • Graphics Card
  • Network Interface Card
  • Modem,

A sound card known as an audio card which is said to be an internal expansion card that helps to give input and output of audio message to and from a computer system.

Learn more about  sound card from

brainly.com/question/26964065

#SPJ1

3 0
1 year ago
Which two approaches optimize test maintenance and support future declarative configuration changes? Choose 2 answers Create a m
patriot [66]

Answer:

B and C

Explanation:

B. Create a method that load valid account records from a static resource, then call this method within test method

C. Create a method that creates valid records, then call this method within test methods

3 0
3 years ago
For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also pro
elena-14-01-66 [18.8K]

Answer:

1. Option (a) is the correct answer. "Place a firewall between the Internet  and your Web server".

2.  Option (e) is the correct answer. "Require encryption for all traffic flowing into and out from the Ken 7 Windows environment".

3. Option (d) is the correct answer. "Implement Kerberos authentication for all internal servers".

4. The correct answer is option (g) "Require all personnel attend a lunch and learn session on updated network security policies".

5. Option (c) is the correct answer. "Enforce password complexity".

Explanation:

1. Users who tried to use ken 7 network resources for social media access will not be enable to do so.

2. Encryption for inflow and outflow of traffic from Ken 7 windows environment will monitor any personal devices which is connected to Ken 7 windows network.

3. The implementation of Kerberos authentication will deny anonymous users access to protected resources in Ken 7 infrastructure.

4.All personnel will be taught the network policies  to avoid sending report to unsecured printers.

5.  The more complex passwords are, the more secured the server will be. A complex password should be enforce for network security.

8 0
3 years ago
Other questions:
  • To use an outline for writing a formal business document what should you do after entering your bottom line statement
    10·1 answer
  • when you create workplace documents, it is most important to ensure that they are clear, professional, and a. short. b. informal
    7·1 answer
  • What is the sum of each pair of binary integers? (assuming 8-bit register is used)
    5·1 answer
  • For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f
    9·1 answer
  • Which of these is NOT a mathematical operator used in Python?
    12·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    13·1 answer
  • I ONLY HAVE 5 MIN HELPPPPPP
    15·2 answers
  • What are some best practices for file management
    8·1 answer
  • Create One print command in LOGO​
    12·1 answer
  • Where is the element coded in a web page.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!