1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mel-nik [20]
3 years ago
8

What service converts ip addresses into more recognizable alphanumeric names??

Computers and Technology
1 answer:
tresset_1 [31]3 years ago
6 0
I think is DNS..........
You might be interested in
How do open online courses help with independent learning? (1 point)
Dominik [7]

I personally have online courses, A. seems like a fitting choice in my opinion. I hope this helps.

4 0
3 years ago
Read 2 more answers
Question # 1 Multiple Select Which of the following shows the assignment of a string to a variable? Select 3 options. answer = "
bazaltina [42]

Answer:

answer = input("How old are you?")

Explanation:

Answer is a variable The Input function takes a string

6 0
3 years ago
Read 2 more answers
Can you structure this code in if-statements?
Naddika [18.5K]
Not sure what quizScore1-5 is, but here it is. Also, I'm not entirely sure what language you're working with here, but null can't be returned as an integer. If it were a string, for example, it'd be possible as string is an object reference type.

public int getData(int dataNumber)
{
    if (dataNumber == 1)
        return quizScore1;
    else if (dataNumber == 2)
        return quizScore2;
    else if (dataNumber == 3)
        return quizScore3;
    else if (dataNumber == 4)
        return quizScore4;
    else if (dataNumber == 5)
        return quizScore5;
    else
        return 0;
}
3 0
3 years ago
if a hacker wants to exploit the TCP three-way handshake, what is the most effective way to go about it?
goldfiish [28.3K]

The most effective way to exploit TCP three-way handshake is TCP SYN flood.

  • SYN flood attack is simply a kind of computer attack that begins with 3-way TCP handshake.
  • TCP SYN flood is also called SYN flood and it is a type of distributed Denial of Service (DDoS) attack that uses every part of the normal TCP three-way handshake to eat up resources on the known server and render it non-functional
  • With TCP SYN flood, a hacker can eat up resources of target's computer and makes it unresponsive.

From the above, we can therefore say that the most effective way to exploit TCP three-way handshake is TCP SYN flood.

Learn more from:

brainly.com/question/14739766

7 0
2 years ago
Employees at the Red Bluff Golf Club & Pro Shop have the opportunity to become certified trainers if they log enough hours.
vodka [1.7K]

Answer:

Following are the solution to this question:

Explanation:

Some of the data is missing in the question, which is defined in the attached file. Please find it.

Follows are the formula which is used in the question:

  • EmployeeAnalysis Worksheet IF(C5>49,"Certified","Not Certified")
  • Transactions Worksheet IF(F10="No","",0.07)

In the first condition, it checks "C5" is greater than 49 if the condition is true, it will give "Certified" otherwise, it will give "Not Certified".

In the second condition, it checks "F10" is equal to "No" if the condition is true, it will give a blank or space otherwise, it will give "0.07".

3 0
3 years ago
Other questions:
  • you are a software engineering consultant and have been called in by the vice president of finance of a corporation that manufac
    10·1 answer
  • Write a program that reads a list of scores and then assigns grades python
    9·1 answer
  • A manager wants to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will s
    5·1 answer
  • Write a statement that toggles the value of the bool variable onoffswitch. that is, if onoffswitch is false , its value is chang
    10·1 answer
  • American company Software Unlimited is planning to expand its operations to the Bangor Republic where the group is the primary u
    7·1 answer
  • What computer is designed to meet the computing needs of several people simultaneously in a small to medium-size business enviro
    5·1 answer
  • The diagnostic test that involves watching a computer monitor with alternating checkerboard patterns while an eeg is performed i
    11·2 answers
  • It is possible to change the shape of a text box.
    10·1 answer
  • Explain four sitting postures in a computer laboratory​
    9·1 answer
  • PLEASE HELP
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!