1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
12

An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel i

frame that directs all website visitors to a webpage of his choosing that then installs malware on the visitors' computers. The attacker did this explicitly because he knows that US policymakers frequent the website. This would be an example of a ___________ attack.
Computers and Technology
1 answer:
Stolb23 [73]3 years ago
5 0

Answer:

Water holing is the correct answer to this question.

Explanation:

Waterholing:-

It is a kind of attack in which the attacker detects the sites that the targets of the group frequently access and then afflicts the sites with the ransomware. Which afflicts selected representatives of the target group.

The watering hole assault is a data breach wherein the individual attempts to infiltrate a particular demographic of end-users by harming sites reported to be visited by team members. The aim is to compromise a specific target data and gain network access at the perpetrator's place of work.

You might be interested in
What is the difference between render and draw in game programming?
leonid [27]
The way I've understood it in my programming classes, that rendering is the whole <span>process of transforming and lighting vertices, processing fragments, and filling in all necessary buffers, where the drawing is only the last step.

Hope this helps you. </span>
5 0
3 years ago
An online service provider provides its users with hosted​ computers, an operating​ system, and a database management system​ (D
kondaur [170]

Answer:

<em>platform as a service (PaaS)</em>

Explanation:

Platform as a Service (PaaS) <em>is a cloud services system in which a third-party vendor offers hardware and software services</em> – usually the ones required for the production of applications – to internet users.

The hardware and software are managed by a PaaS company on its own network.

As more of a consequence, PaaS helps users to access in-house technology for designing or running a new app.

8 0
3 years ago
. In the select algorithm that finds the median we divide the input elements into groups of 5. Will the algorithm work in linear
8090 [49]

Answer:

we have that it grows more quickly than linear.

Explanation:

It will still work if they are divided into groups of 77, because we will still know that the median of medians is less than at least 44 elements from half of the \lceil n / 7 \rceil⌈n/7⌉ groups, so, it is greater than roughly 4n / 144n/14 of the elements.

Similarly, it is less than roughly 4n / 144n/14 of the elements. So, we are never calling it recursively on more than 10n / 1410n/14 elements. T(n) \le T(n / 7) + T(10n / 14) + O(n)T(n)≤T(n/7)+T(10n/14)+O(n). So, we can show by substitution this is linear.

We guess T(n) < cnT(n)<cn for n < kn<k. Then, for m \ge km≥k,

\begin{aligned} T(m) & \le T(m / 7) + T(10m / 14) + O(m) \\ & \le cm(1 / 7 + 10 / 14) + O(m), \end{aligned}

T(m)

​

 

≤T(m/7)+T(10m/14)+O(m)

≤cm(1/7+10/14)+O(m),

​

therefore, as long as we have that the constant hidden in the big-Oh notation is less than c / 7c/7, we have the desired result.

Suppose now that we use groups of size 33 instead. So, For similar reasons, we have that the recurrence we are able to get is T(n) = T(\lceil n / 3 \rceil) + T(4n / 6) + O(n) \ge T(n / 3) + T(2n / 3) + O(n)T(n)=T(⌈n/3⌉)+T(4n/6)+O(n)≥T(n/3)+T(2n/3)+O(n) So, we will show it is \ge cn \lg n≥cnlgn.

\begin{aligned} T(m) & \ge c(m / 3)\lg (m / 3) + c(2m / 3) \lg (2m / 3) + O(m) \\ & \ge cm\lg m + O(m), \end{aligned}

T(m)

​

 

≥c(m/3)lg(m/3)+c(2m/3)lg(2m/3)+O(m)

≥cmlgm+O(m),

​

therefore, we have that it grows more quickly than linear.

5 0
3 years ago
Suppose that, even unrealistically, we are to search a list of 700 million items using Binary Search, Recursive (Algorithm 2.1).
damaskus [11]

Answer:

There is also an attachment below

Explanation:

Since we are talking about binary search, let's assume that the items are sorted according to some criteria.

Time complexity of binary search is O(logN) in worst case, best case and average case as well. That means it can search for an item in Log N time where N is size of the input. Here problem talks about the item not getting found. So, this is a worst case scenario. Even in this case, binary search runs in O(logN) time.

N = 700000000.

So, number of comparisions can be log(N) = 29.3 = 29.

So, in the worst case it does comparisions 29 times

7 0
3 years ago
Complete the sentences about interactive media.
maksim [4K]

Answer:

teletext

dynamic media

Explanation:

5 0
3 years ago
Other questions:
  • Consider the following JavaScript program:
    8·1 answer
  • Which view of data deals with how the data is actually formatted and located? physical view logical view information view techni
    12·1 answer
  • As a digital forensics examiner, it’s a good idea to build a list of references for information on privacy laws in other countri
    13·1 answer
  • Consider the following declaration.int[] beta = new int[3];int j;Which of the following input statements correctly input values
    11·1 answer
  • According to the SANS Institute, a __________ is typically a document that outlines specific requirements or rules that must be
    13·1 answer
  • DNA structure can be described as a twisted ladder. Imagine you are climbing a model of DNA, just as if you were climbing a ladd
    10·2 answers
  • Which of the following is a correctly named cell?<br> B8<br> BB-8<br> 8-B<br> 8B
    11·1 answer
  • Tell me the errors please
    14·1 answer
  • Why is a salt added to a password that is being stored in a database?
    5·1 answer
  • *the sticker, available in the middle section of the prescription label, will indicate if the customer requested non-safety caps
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!