1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
3241004551 [841]
3 years ago
12

Which of these statements most accurately describes cookies?They have the capability to execute malicious software.Each cookie f

ile takes up a large amount of file space.They are small text files placed on a computer by a Web site.They can search for personal information on your hard drive.
Computers and Technology
1 answer:
Rasek [7]3 years ago
6 0
Answer is "They are small text files placed on a computer by a Web site."

Cookies are small text files put onto your computer and contain <span>data specific to a certain client and website</span>
You might be interested in
Write a c++ program that accepts a string from the user and then replaces all occurrences of the letter e with the letter x
mixer [17]

Answer:

#include <iostream>

using namespace std;

int main()

{

   string str;

   cout<<"Enter the string: ";

   cin>>str;

   for(int i=0;str[i]!='\0';i++){

       if(str[i]=='e'){

           str[i]='x';

       }

   }

   cout<<"the string is: "<<str<<endl;

  return 0;

}

Explanation:

First, include the library iostream for using the input/output instructions.

Create the main function and declare the variables.

Then, use the cout instruction and print the message on the screen.

cin store the string enter by the user into a variable.

After that, take a for loop and if-else statement for checking the condition if the string contains the 'e', then change that alphabet to 'x'.

This process continues until the string not empty.

Finally, print the updated string.

6 0
3 years ago
Which best compares appointments and events in Outlook 2010
lesantik [10]

In Microsoft Outlook, there are differences between appointment and event. Appointment is defined as <em>an activity that you schedule in your calendar which does not involve other people.</em> Appointments can be scheduled to a certain duration in a day. Event is defined as <em>an activity that you do with other people which lasts from 24 hours to longer. </em>

Thus, from these descriptions, the best answer to the question is (C) appointments have a start and end time of day, and events do not.

5 0
3 years ago
What are the most recent attacks on computer security that you face this month? Use the Internet to search for the latest attack
grigory [225]

Answer:

Now a days every thing can be done on the internet easily but this internet has various drawbacks with that as the most of our personal information we share on internet these days so if anyone attacks on your server then he/she can easily access all the private information including financial details and this attack is known as cyber attack. there are various ways to attack on the internet some of them are-

1.Malware- it is shortly known as the malicious software, malware can be described as worms, viruses, trojans these all are variety of malware which provide root access to the attacker by which they can control the system remotely.

2.phising- This is a technique by which the criminals craft emails to fool a target into taking some harmful action. The recipient might be tricked in downloading malware that disguised as an important document for instance or argued toclick on that link that takes them to a fake website where they can get the password which are necessary for any transaction.

3.Ransomware- This is like a malware which is stored in the computer and easily encrypt all the necessary files of the victim's computer and after that they demand some ransom to decrypt it.

4.SQL injection- This is the process by which the SQL command gets injected by the attacker into the victim's system so that the attacker can easily gather all the necessary information which they want to take control on the system.

These attacks are very dangerous for the system because the attacker can get all the necessary information about the user and can easily harm him/her by getting their personal information.

There are various steps to prevent these attacks which are-

I.secure your hardware- The user has to prevent their hardware from lost or steal. protect all devices with a complicated password, share that password with the device user only.

II.Encrypt and backup data- You have to prevent your data by making the backup of the necessary files so that if any of your information gets lost then you can retrieve it from your backup.

III. create a security focused workplace- Employees are the most common ways of breaching of the data as many don't recognise the external threats the internal one breaches the security and it cause the loss of the information.

some latest viruses are-

1.cyborg ransomware-This virus is present in the floppy disk which is used by the user and can cause the count of time the system reboot. it's new variant is present in windows 10.

2.Gobrut-This is also one of the latest viruses it is capable enough to detect weak passwords and can cause loss of information.

3.jokeroo-This virus works as the ransomware their author spread it in the computer system which will encrypt the files and for decrypting it they demand ransom for that.

4.Trojan Glupteba- Once this virus enters the system the user cannot know that the system is infected and it will slowly communicates with the IP of the system which results in loss of the confidential information.

Most vulnerable platforms are-

1.Social engineering- The social networking sites has most of your personal information of the user which can be used by the attacker to get the necessary information.

2.cloud computing services- More companies use to store their most of the information on the cloud which is used by the attacker to get the confidential passwords which can cause loss of the essential information.

Explanation:

6 0
3 years ago
All the data points lie within UCL &amp; LCL and all of the data points are randomly distributed about the mean value central li
nata0808 [166]

Answer: Common causes

Explanation:

Variation comes from two sources, common and special causes. Lets you at this scenario, how long it takes you to get to school in the morning. Maybe it takes you 40 minutes on average. Some days it may take a little longer, some days a little shorter. But as long as you are within a certain range, you are not concerned. The range may be from 35 to 45 minutes. This variation represents common cause variation --- it is the variation that is always present in the process. And this type of variation is consistent, random and predictable. You don't know how long it will take to get to schooltomorrow, but you know that it will be between 35and 45 minutes as long as the process remains the same.

Now, in thecase of special cause variation suppose there was an accident on the road and there was heavy non moving traffic . How long will it take you to get to work? Definitely longer than the 35 to 45 minutes in your "normal" variation. Maybe it takes you an hour longer. This is a special cause of variation. Something is different. Something happened that was not supposed to happen. It is not part of the normal process. Special causes are not predictable, non random and are sporadic in nature.

6 0
3 years ago
Assuming you can use infinite number of CPUS for performance improvements, what would be the maximum speed up when the paralleli
natita [175]

Answer:

correct option is D i.e. 20

Explanation:

Given data:

Parallelizable portion is  given as 95%

so remaining will be serial portion i.e. 5%

we know that, for infinite number of cpus, maximum speed is calculated as

v =\frac{1}{f}

where f denote serial portion = 5% = 0.05

v = \frac{1}{0.05}

v = 20

hence so for serial portion of 5%, maximum speed is 20

correct option is D i.e. 20

3 0
3 years ago
Other questions:
  • he Saffir-Simpson Hurricane Scale classifies hurricanes into five categories numbered 1 through 5. Write an application named Hu
    10·2 answers
  • Write a C++ program that determines if a given string is a palindrome. A palindrome is a word or phrase that reads the same back
    6·1 answer
  • PLEASE HELP
    15·2 answers
  • The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of dat
    8·1 answer
  • Unemployment can be viewed as
    14·1 answer
  • In the design phase of the systems development life cycle (SDLC), the _____ design is an overview of the system and does not inc
    10·1 answer
  • Hello help me with this please if you want to thank you I would give brainlist!
    13·2 answers
  • What is file management?can please help me​
    14·2 answers
  • What are the cloud storage components
    6·1 answer
  • explain why it would be preferable to use a DATE data type to store date data insetad of a character data type
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!