1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
2 years ago
14

hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?

Computers and Technology
1 answer:
aalyn [17]2 years ago
3 0

Answer:

ICMP.

Explanation:

Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.

ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.

You might be interested in
Mary and Billy are moving away to college and both know in their hearts that they need to end their relationship. They move away
ivanzaharov [21]

In the case of Mary and Billy, the above is called Negotiated farewell.

<h3>What is Negotiated farewell?</h3>

In the case of  Negotiated Farewell, one can say that couples are knonw to jointly create the story of the end to what we say their marriage.

Note that Negotiated Farewell is one that is made for emotionally immature or any kind of combative people. hence, In the case of Mary and Billy, the above is called Negotiated farewell.

Learn more  about relationship from

brainly.com/question/10286547

#SPJ1

4 0
1 year ago
If user reading a document on computer, it allows you to navigate on any part of the document called?
VashaNatasha [74]
I Think Its either  B or C
6 0
2 years ago
How many instructions could fit into a 256 byte memory unit, given a 32-bit architecture?
andriy [413]

Answer:

64

Explanation:

We have given the 32 bit architecture

We know that 1 byte =8 bit

So memory of given architecture 32 bit \frac{32}{8}=4bytes

Total memory = 256 bytes

So total number of instruction that fit into 256 bytes \frac{256}{4}=64

So total 64 instruction can be fit in 256 byte memory.

3 0
2 years ago
2. Write a standalone function partyVolume() that takes accepts one argument, a string containing the name of a file. The object
laiz [17]

Answer:

The Python code is given below with appropriate comments

Explanation:

#required method, assuming Volume class is defined and is accessible

def partyVolume(filename):

   #opening file in read mode, assuming file exists

   file=open(filename,'r')

   #reading initial volume

   initial=float(file.readline())

   #creating a Volume object with initial volume

   v=Volume(initial)

   #looping through rest of the lines in file

   for line in file.readlines():

       #removing trailing/leading white spaces/newlines and splitting line by white

       #space to get a list of tokens

       line=line.strip().split(' ')

       #ensuring that length of resultant list is 2

       if len(line)==2:

           #reading first value as direction (U or D)

           dir=line[0].upper()

           #reading second value as float value

           value=float(line[1])

           if dir=='U':

               #turning volume up

               v.up(value)

           elif dir=='D':

               #turning volume down

               v.down(value)

   #closing file, saving changes

   file.close()

   #returning volume

   return v

8 0
2 years ago
There has been something I had to ask but I have to type this so it goes through: creeper?
VMariaS [17]

Answer:

<u><em>awwwwwwwwwwwwwwwwwww man</em></u>

Explanation:

So we back in the mine

Got our pickaxe swinging from side to side

Side-side to side

This task, a grueling one

Hope to find some diamonds tonight, night, night

Diamonds tonight

Heads up

You hear a sound, turn around and look up

Total shock fills your body

Oh, no, it's you again

I can never forget those eyes, eyes, eyes

Eyes-eye-eyes

'Cause, baby, tonight

The creeper's tryna steal all our stuff again

'Cause, baby, tonight

You grab your pick, shovel, and bolt again (Bolt again-gain)

And run, run until it's done, done

Until the sun comes up in the morn'

'Cause, baby, tonight

The creeper's tryna steal all our stuff again (Stuff again-gain)

Just when you think you're safe

Overhear some hissing from right behind

Right-right behind

That's a nice life you have

Shame it's gotta end at this time, time, time

Time-time-time-time

[Pre-Chorus: TryHardNinja]

Blows up

Then your health bar drops and you could use a one-up

Get inside, don't be tardy

So, now you're stuck in there

Half a heart is left, but don't die, die, die

Die-die-die

'Cause, baby, tonight

The creeper's tryna steal all our stuff again

'Cause, baby, tonight

You grab your pick, shovel, and bolt again (Bolt again-gain)

And run, run until it's done, done

Until the sun comes up in the morn'

'Cause, baby, tonight

The creeper's tryna steal all our stuff again

(Creepers, you're mine, haha)

Dig up diamonds and craft those diamonds

And make some armor, get it, baby

Go and forge that like you so MLG pro

The sword's made of diamonds, so come at me, bro, huh

Training in your room under the torchlight

Hone that form to get you ready for the big fight

Every single day and the whole night

Creeper's out prowlin', hoo, alright

Look at me, look at you

Take my revenge, that's what I'm gonna do

I'm a warrior, baby, what else is new?

And my blade's gonna tear through you, bring it

'Cause, baby, tonight

The creeper's tryna steal all our stuff again

(Gather your stuff, yeah, let's take back the world)

Yeah, baby, tonight (Haha)

Grab your sword, armor and go (It's on)

Take your revenge (Woo), oh-oh, oh-oh

So fight, fight, like it's the last, last night

Of your life, life, show them your bite (Woo)

'Cause, baby, tonight

The creeper's tryna steal all our stuff again

'Cause, baby, tonight

You grab your pick, shovel and bolt again (Bolt again-gain, woo)

And run, run until it's done, done

Until the sun comes up in the morn'

'Cause, baby, tonight (Come on, swing your sword up high)

The creeper's tryna steal all our stuff again (Come on, jab your sword down low)

(Woo)

3 0
3 years ago
Other questions:
  • If Mark is developing a website to be optimized for mobile devices, what would be the top-level domain?
    10·1 answer
  • Which of the following is not a typical step in the ethical hacking process? A. Planning B. Discovery C. Attack D. Recovery
    5·1 answer
  • ¿Cuál es el objetivo principal de los servicios?
    7·1 answer
  • What sequence is used to create a brochure document from a template?
    8·2 answers
  • Match each keyboard command with its result.
    6·1 answer
  • Create a function named first_a that uses a list comprehension. The function will take a single integer parameter n. Find every
    13·1 answer
  • When you expect a reader of your message to be uninterested, unwilling, displeased, or hostile, you should Group of answer choic
    15·1 answer
  • What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
    13·2 answers
  • What is your favorite LEGO set
    5·2 answers
  • Que significa WWW en informática ._.​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!