1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karolina [17]
2 years ago
10

1. Which of the following is not related to a buffer overflow? A. Static buffer overflow B. Index error C. Canonicalization erro

r D. Heap overflow
Computers and Technology
1 answer:
GaryK [48]2 years ago
4 0

Answer: C) Canonicalization error

Explanation:

Canonicalization error is the error or fault that occurs when data is changed into canonical form or standard form that persist different representation.This can create fault when different filenames or structure is assigned to data and canonization cannot take place as it works for simple data representation.

  • Other options are incorrect because static buffer flow is stable writing or reading of data that reaches outside the buffer boundary.Index error is accessing of index by any user that is found beyond the index's list boundary.
  • Heap overflow is the stack gets overlowed outside the boundary while overwriting heap.Thus, the correct option is option(C).
You might be interested in
Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi
zavuch27 [327]

Answer:

This is not a good solution

Explanation:

Your web browser uses port 80 outgoing to make web requests, so if you’re blocking incoming port 80, all you’re blocking is users of the organization from connecting to the internet. You have indeed close a vulnerable port to access from hackers, but this also can reduce the productivity of the organization.

3 0
3 years ago
What are three consequences of a negative digital Trail​
Vladimir79 [104]

Answer:

The digital footprint that is had behind can have repercussions in every aspect of your adolescent's life, conceivably bringing about botched occupation chances, public sharing of individual data, destroyed connections

Explanation:

Digital trail what's left behind as you calmly peruse the web, post via web-based media or even sort into a visit administration. Regardless of whether you're mindful, you add to your advanced impression or profile every day when you sign onto the Internet. The sites you visit, the news posts you remark on, the remarks you leave via web-based media stages—every one of these things meet up to make a representation of your online life.  

The digital footprint that is had behind can have repercussions in every aspect of your adolescent's life, conceivably bringing about botched occupation chances, public sharing of individual data, destroyed connections — or, in what is likely more pertinent to them at this moment: Their folks discovering what they've been up to and along these lines being rebuffed.

8 0
2 years ago
Write a Java program that reads an 8-bit binary number from the keyboard as a string and then converts it into decimal. For exam
cestrela7 [59]

Answer:

public class Brainly

{

 public static void main(String[] args)

 {

   BinaryConverter conv = new BinaryConverter();

   String binStr = "01001101";

   System.out.print(binStr + " in decimal is "+conv.BinToDec(binStr));

 }

}

public class BinaryConverter

{

 public int BinToDec(String binStr)

 {

   int d = 0;

   while(binStr.length() > 0)

   {

     d = (d << 1) + ((binStr.charAt(0) == '1') ? 1: 0);

     binStr = binStr.substring(1);

   }

   return d;

 }

}

Explanation:

The program "eats" the string from left to right, and builds up the integer representation in variable "d" on the go. While there are digits left, it shifts the previous result to the left and sets the least signficant bit to 1 only if the corresponding string character is a 1.

5 0
3 years ago
In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell r
timama [110]

The equations that uses addition, subtraction, multiplication and division operators and other values in a spread sheet is known as formulas. They are a way of having to provide symbols in means of expressing information regarding a mathematical formula that are being solved or showing its solution along with it.

4 0
3 years ago
In the excerpt above, what can be inferred by the statement, “The Dillingham had been flung to the breeze during a former period
galina1969 [7]
The best and the most correct answer among the choices provided by the question is the first choice. We can infer from the excerpt that <span>Jim felt important enough to place his full name on the mailbox when he enjoyed a higher income. </span>I hope my answer has come to your help. God bless and have a nice day ahead!
3 0
2 years ago
Read 2 more answers
Other questions:
  • Consider this scenario: A major government agency experiences a data breach. As a result, more than 100,000 personal records are
    7·2 answers
  • The top-down approach is an appropriate strategy for most
    13·1 answer
  • Which type of virus includes protective code that prevents outside examination of critical elements?
    14·1 answer
  • Examine the following algorithm.
    9·1 answer
  • Ohanians “great big secret” is that:
    8·1 answer
  • Even if you cannot afford it you should donate at least 5 of your earnings to charity true or false
    8·1 answer
  • Cómo se transmite la voz en el sistema telefónico?
    12·1 answer
  • Consider the following method.
    14·1 answer
  • When delivering digital technologies to clients, what is a best practice to make those solutions sustainable?
    10·1 answer
  • 9.18 lab: even/odd values in a vector write a program that reads a list of integers, and outputs whether the list contains all e
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!