1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
3 years ago
10

What two items must be given to the socket function in order to create a socket object? A) The socket type that will be used. B)

The socket port that will be used. C) The IP address to be used. D) The socket family that will be used.
Computers and Technology
1 answer:
Yuki888 [10]3 years ago
5 0

Answer:

The correct option are:-

a) The socket type that will be used

d) The socket family that will be used  

Explanation:

The socket() method generates the unbound socket in a networking domain and returns a descriptor of the register, which can be used in subsequent socket function calls.

The socket() method takes three arguments:  

Domain:- The domain for which a socket is to be built is defined.

Type:- The socket type to be generated is defined.

Protocol:- It specifies a common socket protocol to use. The protocol setting of 0 causes socket() to use a default uninstalled protocol that is suitable for the socket type requested.

You might be interested in
a password to a certain database consists of digits that cannot be repeated. if the password is known to consist of at least 8 d
BaLLatris [955]

Answer:

\frac{10!}{2}mins

Explanation:

12 seconds to try one combination will be equivalent to  \frac{1}{12}\times 60 = \frac{1}{5} \ mins

Password contain at least 8 digit i.e. password can contain 8, 9, 10 digit.

Password cannot contain more than 10 digit because it will give room for repetition which it is clearly stated that digit cannot be repeated.

Possible digit that can be used: 9,8,7,6,5,4,3,2,1,0.

Total number of passwords combination possible for each position in 8 digit.

1st position = 10, 2nd position = 9, 3rd position = 8, 4th position = 7, 5th position = 6, 6th position = 5, 7th position = 4, 8th position = 3. Total number of passwords combination possible in 8 digit is equivalent to \frac{10!}{2}.

Total number of passwords combination possible for each position in 9 digit.  

1st position = 10, 2nd position = 9, 3rd position = 8, 4th position = 7, 5th position = 6, 6th position = 5, 7th position = 4, 8th position = 3, 9th position = 2. Total number of passwords combination possible in 9 digit is equivalent to \frac{10!}{1}.

Total number of passwords combination possible for each position in 10 digit.

1st position = 10, 2nd position = 9, 3rd position = 8, 4th position = 7, 5th position = 6, 6th position = 5, 7th position = 4, 8th position = 3, 9th position = 2, 10th position = 1.  Total number of passwords combination possible in 10 digit is equivalent to 10!.

Adding them up and multiplying by  \frac{1}{5} \ mins  to get the total number of time needed to guarantee access to database =  [\frac{10!}{2}\times\ \frac{10!}{1} \times 10!] \frac{1}{5}\ mins = \frac{10!}{2}

7 0
4 years ago
Which of the following statements is true?
kompoz [17]
The answer to your question is A.
7 0
3 years ago
Based on the strength of the magnetic fields they produce, arrange the solenoids from strongest to weakest
Deffense [45]

Answer:

C, D, B and A.

Explanation:

Electromagnet in option C is strongest because it has an iron core and the largest current as compared to other solenoids, following by D and then B whereas solenoid A is the weakest because of the absence of an iron core and has the smallest current. Solenoid having iron core is the strongest solenoid because the core produces more strong magnetic field as compared to no iron core.

8 0
3 years ago
Dropdown Complete the sentence. To protect a web-based database, you should apply to any online forms that add data to it. princ
sergey [27]

To protect a web-based database, you should apply <u>principle of least privilege</u> to any online forms that add data to it.

<h3>What is principle of least privilege?</h3>

Principle of least privilege is also referred to as the principle of minimal privilege (least authority) and it can be defined as a security concept that involves giving an end user, software program, or process the minimum levels of access or permissions necessary to perform an action in a database.

In this context, a network administrator should apply the <u>principle </u><u>of least </u><u>privilege</u> to any online forms that add data to a web-based database, in order to protect it.

Read more on least privilege here: brainly.com/question/4365850

3 0
3 years ago
Read 2 more answers
The process of deciding a court case based on the basis of previous decisions is the principle of which of the following?
Zina [86]
I believe the answer is precedent, because establishing precedent is the exact definition that you are looking for. Hope this helps!
8 0
4 years ago
Other questions:
  • Which step can most directly help your team follow up on decisions made during Web development meetings?This task contains the r
    6·1 answer
  • Given the lists list1 and list2 that are of the same length, create a new list consisting of the last element of list1 followed
    13·1 answer
  • A programmer writing code in class Point attempts to override the following inherited method:public boolean equals( Object o ) {
    12·1 answer
  • Why do electronic devices gather so much dust? Thanks
    8·1 answer
  • The keyboard shortcut to enter the current date in a field is
    11·1 answer
  • Differentiate between CD-ROMS and DVD-ROMS​
    8·1 answer
  • Who is the founded the java computer language?​
    5·1 answer
  • Which is an advantage of using a flat file instead of a relational database?
    5·1 answer
  • 1.Discuss the complexities of owning and sharing digital information.
    5·1 answer
  • To freeze rows 1 and 2, and columns 1, 2, and 3, which cell should you highlight before selecting freeze panes?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!