1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
3 years ago
11

(BRAINLIEST QUESTION!!!)

Computers and Technology
1 answer:
docker41 [41]3 years ago
4 0

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

You might be interested in
You may declare an unlimited number of variables in a statement as long as the variables are ____.
k0ka [10]

Answer:

b. the same data type

Explanation:

Any number of variables can be declared in a statement as long as the variables have the same data type. For example:

1) int a,b,c,d,e;

Here each of the declared variables a,b,c,d,e have the type int.

2) char p,q,r,s,t,u,v,w;

In this case variables p to w all have the type char.

3) float x,y,z;

x,y and z are all of type float.

6 0
3 years ago
A computer program is tested by 5 independent tests. If there is an error, these tests will discover it with probabilities 0.1,
Svetllana [295]

Answer:

0.8488

Explanation:

Let E =error found by test 1

Let F=error found by test 2

Let G=error found by test 3

Let H=error found by test 4

Let I= error found by test 5

Given P(E)=0.1, P(F)=0.2, P(G)=0.3, P (H)= 0.4, P (I)=0.5

therefore P(notE)=0.9, P(notF)=0.8, P(notG)=0.7, P(not H)=0.6, P (notI)=0.5

Tests are independent P(not E & not F &not G & not H & not I=P(notE)*P(notF)*P(notG)*P (notH)*P (not I) =0.9*0.8*0.7*0.6*0.5 =0.1512

P(found by at least one test)= 1- P(not found by any test)=1-P(not E& not F & not G & not H & not I ) = 1-0.1512 = 0.8488

5 0
3 years ago
10 Ejemplos de Software de Sistema. AYUDENME POR FAVOR SE LOS SUPLICO
bearhunter [10]

Answer:

MacOS, Linux, Android, Microsoft Windows, software de ciencia computacional, motores de juegos, automatización industrial y aplicaciones de software como servicio.

:-) (-:

6 0
3 years ago
Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first
irinina [24]

Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first acknowledgement is lost, but the second acknowledgement arrives before the timer for the first segment expires is True.

True

<u>Explanation:</u>

In network packet loss is considered as connectivity loss. In this scenario host A send two segment to host B and acknowledgement from host B Is awaiting at host A.

Since first acknowledgement is lost it is marked as packet lost. Since in network packet waiting for acknowledgement is keep continues process and waiting or trying to accept acknowledgement for certain period of time, once period limits cross then it is declared as packet loss.

Meanwhile second comes acknowledged is success. For end user assumes second segments comes first before first segment. But any how first segment expires.

3 0
3 years ago
Find the error in the following code fragment. int a: System.out.print(a):​
trapecia [35]

Answer:

If your using java, then its supposed to be "System.out.print("a")"    

Explanation:

its supposed to have quotations

7 0
2 years ago
Other questions:
  • In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac
    6·1 answer
  • Where should you click to edit an existing formula?
    12·2 answers
  • Which device can be installed on the edge of your network to allow multiple remote users to connect securely to your internal en
    9·1 answer
  • Susan has always wanted to be a veterinarian. When doing her research, she answers all self-assessments geared toward that caree
    13·1 answer
  • Jamey did a lot of research on his paper topic but can't figure out where to start writing. He has a loose plan in mind, but it'
    9·2 answers
  • What icon is usually used to indicate an attachment feature?
    14·2 answers
  • PLEASE HELP!!!!!!!!!
    8·1 answer
  • Part 1: For this assignment, call it assign0 Implement the following library and driver program under assign0: Your library will
    5·1 answer
  • 1) You are working with an organization as a network manager. The organization has
    6·1 answer
  • Bob The Penguin is a real you-tuber, and he plays Mine-craft. Who is his owner?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!