Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
Answer:
Algorithm
1.Start.
2.Using an input function, ask the user to input the name and store the Entered Value in string variable.
3.Print value stored in String Variable.
4.End.
Flow chart:
External hardware/peripherals are external devices connected to a computer that extend it's functionality. Some common ones are:
1. Monitor - output
2. Keyboard - input
3. Speakers - output
4. Printer - output
5. Microphone - input
6. Mouse - input
Input is anything that's used to feed/put data into a computer. So for a keyboard that's which keys you're pressing, microphone that's sound data etc. Output is a<span>ny </span>computer<span>-generated data displayed on screen, printed on paper or in machine readable form, such as a disk.</span>
<span />
Answer:
A ) 200 Zombie systems
B ) 200 Zombie systems
Explanation:
maximum uplink data rate : 512 kbps = 512 * 1000 * 8 = 4096000 bits/sec
Determine the number of 512 byte ICMP echo packets = 512 * 8 = 4096 bits
hence the maximum number of 512-byte ICMP echo request (ping) packets a single zombie computer can send per second = 400 packets/sec
i.e. for 512kbps = 400 packets/sec
Determine the number of Zombie systems that the attacker will need to flood a target server
A) For a fast ethernet
A fast ethernet = 100 mbps
The number of Zombie systems needed = 1 zombie system * 200
and 1 zombie system = 512 kbps
therefore for a Fast ethernet the number of zombies systems needed = 200
B) For A Gigabit Ethernet
same as a fast ethernet system i.e. = 200
Answer:
dang sis did u really have to but all of that