1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gala2k [10]
4 years ago
13

Demi loves playing online games. She surfs through many websites to find new, interesting games. One day she finds that her mail

box is filled with emails suggesting websites for online games and ads promoting a few online offers. In this scenario, a(n) _____ tracks Demi's computer behavior to send her targeted mails and ads.
A. Firewall
B. Spyware
C. Bastion host
D. Attack tree
Computers and Technology
1 answer:
Marianna [84]4 years ago
4 0

Answer:

Option (B) is the correct answer.

Explanation:

The following terms are as follows:

Firewall: Firewall can be described as a security system for a network, which is used to check the incoming and outgoing data on the network on the basis of rules determined by the system.

Spyware: Spyware defines as a program that can record your activity secretly and then use it for many purposes i.e advertisements, promotions, and many other legal and illegal purposes.

Bastion host: Bastion host mainly used to access the private network from any other network.

Attack trees: Attack trees are used to examine the security of any system against any attacks.

According to the scenario, the most appropriate answer is option (B) because spywares are also used for promotion.

You might be interested in
Which of the following can be used to replace internal network addresses with one or more different addresses so the traffic tha
love history [14]

Answer:

A Proxy Server

Explanation:

In data communication and computer networks, proxy servers are intermediaries or a gateway that sits between the user and the internet. The users are therefore separated from the web they browse. The proxy servers then provide filters and firewalls.

7 0
3 years ago
What is the output of this program ? Assume the user enters 3,6 and 11​
Nostrana [21]

Answer:

C++

Explanation:

C++ Standards

C++ is standardized as ISO/IEC 14882. Currently, there are two versions:

C++98 (ISO/IEC 14882:1998): First standard version of C++.

C++03 (ISO/IEC 14882:2003): minor "bug-fix" to C++98 with no change to the language. Commonly refer to as C++98/C++03 or First C++ standard.

C++11 (ISO/IEC 14882:2011): Second standard version of C++. Informally called C++0x, as it was expected to finalize in 200x but was not released until 2011. It adds some new features to the language; more significantly, it greatly extends the C++ standard library and standard template library (STL).

C++14: Infomally called C++1y, is a small extension to C++11, with bug fixes and small improvement.

C++17: informally called C++1z.

C++2a: the next planned standard in 2020.

C++ Features

C++ is C. C++ supports (almost) all the features of C. Like C, C++ allows programmers to manage the memory directly, so as to develop efficient programs.

C++ is OO. C++ enhances the procedural-oriented C language with the object-oriented extension. The OO extension facilitates design, reuse and maintenance for complex software.

Template C++. C++ introduces generic programming, via the so-called template. You can apply the same algorithm to different data types.

STL. C++ provides a huge set of reusable standard libraries, in particular, the Standard Template Library (STL).

C++ Strength and Pitfall

C++ is a powerful language for high-performance applications, including writing operating systems and their subsystems, games and animation. C++ is also a complex and difficult programming language, which is really not meant for dummies. For example, to effectively use the C++ Standard Template Library (STL), you need to understand these difficult concepts: pointers, references, operator overloading and template, on top of the object-oriented programming concepts such as classes and objects, inheritance and polymorphism; and the traditional constructs such as decision and loop. C++ is performance centric. The C++ compiler does not issue warning/error message for many obvious programming mistakes, undefined and unspecified behaviors, such as array index out of range, using an uninitialized variable, etc, due to the focus on performance and efficiency rather than the ease of use - it assumes that those who choose to program in C++ are not dummies.

6 0
3 years ago
Submitting Unit 11 Assignment – Step 1 Python CS Fundamentals<br> Need the code to this.
oksano4ka [1.4K]

The Step 1 Python CS Fundamentals  coding work is given in the document attached below.

<h3 /><h3>What are the basic fundamentals of Python?</h3>

The basic steps or lessons in Python is made up of:

  • Kinds of Data types ( such as int, float, strings)
  • The kinds of Compound data structures ( such as lists, tuples, and dictionaries), etc.

Note that by knowing the Step 1  of the Python CS Fundamentals  coding work, one can know what to do next. See the document attached for more information.

Learn more about Coding from

brainly.com/question/16397886

#SPJ1

Download docx
8 0
2 years ago
Which of these is the function of a modeler?
Liono4ka [1.6K]

Answer:

Create 3D assets from sketches

Explanation:

A modeler Job is to model all of the 3D/2D assets needed to obtain the final result wanted by the developers. The modeler creates the assets from sketches or images provided to him according to the theme.

5 0
3 years ago
Read 2 more answers
Help pls nnnnnnnnnnnnnnnnnnnn
kiruha [24]

Answer:

3rd choice

Explanation:

i did that yesterday

5 0
3 years ago
Other questions:
  • ?What protocol is used to provide a common language between virtualized service applications and a network's physical devices?
    10·1 answer
  • Declare a character variable letterStart. Write a statement to read a letter from the user into letterStart, followed by stateme
    10·1 answer
  • Why would you use a topic web?
    7·2 answers
  • What would be advantageous for a laptop user to carry when the laptop gets a lot of use?
    14·1 answer
  • A binary message consisting of four bits was sent to you by a friend. The message was supposed to be ABAB. Unfortunately, your f
    8·1 answer
  • A user complains that her computer is performing slowly. She tells you the problem started about a week ago when new database so
    12·1 answer
  • Does trend in computing important for organization management?​
    8·1 answer
  • Write a program to
    5·1 answer
  • You are building a game that needs to do the following:
    5·1 answer
  • The ____ statement can be used to eliminate the use of certain (flag) variables.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!