1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
3 years ago
10

List and briefly describe passive and active security attacks.

Computers and Technology
1 answer:
Rama09 [41]3 years ago
4 0

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

You might be interested in
Your essay is due tomorrow and you don't have time to write it. You decide to buy an essay online. You've paid for it, so it can
Reptile [31]

Answer:

FALSE

Explanation:

because even though you have paid for it , its still technically not writen by you . and would there for be seen as plagiarism......hope this helps

6 0
3 years ago
Write a static method that implements a recursive formula for factorials. Place this method in a test program that allows the us
matrenka [14]

Answer:

Written in Java

import java.util.*;

public class Main {

  public static int fact(int n) {

     if (n == 1)

        return n;

     else

        return n * fact(n - 1);

  }

  public static void main(String[] args) {

     int num;

     Scanner input = new Scanner(System.in);

     char tryagain = 'y';

     while(tryagain == 'y'){

     System.out.print("Number: ");

     num = input.nextInt();

     System.out.println(num+"! = "+ fact(num));

     System.out.print("Try another input? y/n : ");

     tryagain = input.next().charAt(0);

}        

  }

}

Explanation:

The static method is defines here

  public static int fact(int n) {

This checks if n is 1. If yes, it returns 1

     if (n == 1)

        return n;

If otherwise, it returns the factorial of n, recursively

     else

        return n * fact(n - 1);

  }

The main method starts here. Where the user can continue executing different values of n. The program keep prompting user to try again for another number until user signals for stoppage

  public static void main(String[] args) {

This declares num as integer

     int num;

     Scanner input = new Scanner(System.in);

This initializes tryagain as y

     char tryagain = 'y';

This checks if user wants to check the factorial of a number

     while(tryagain == 'y'){

This prompts user for input

     System.out.print("Number: ");

This gets user input

     num = input.nextInt();

This passes user input to the function and also prints the result

     System.out.println(num+"! = "+ fact(num));

This prompts user to try again for another value

     System.out.print("Try another input? y/n : ");

This gets user response

     tryagain = input.next().charAt(0);

}        

Download txt
4 0
2 years ago
What does a driver do?
kompoz [17]
A driver is a piece of software that allows things such as a keyboard, mouse, hard drive, etc. connect to a computer. Normally found on the manufactures website, you can update drivers with advanced and modern technology. Or, if a device is really old you can download a driver to allow that device to connect to a PC.
6 0
3 years ago
How do individuals differ in terms of their ability to process information?
Alla [95]
Oh that is easy first they differ the therms of their ability and that helps them process the information ( sorry for doing that lol)
5 0
3 years ago
TULPCOAONIAC<br>TRUOESP<br> this is un scrambled word​
MaRussiya [10]

<em>Answer:</em>

1.)OCCUPATIONAL

2.)POSTURE

<em>This is the answer thank youu!</em>♡︎♡︎

4 0
3 years ago
Read 2 more answers
Other questions:
  • Ziffcorp, an it firm, uses a technology that automatically updates the antivirus software in all the computers in the firm whene
    13·1 answer
  • Para que se utiliza openoffice en la vida cotidiana?
    7·2 answers
  • Please answer this I know that no one else does but I can't think right now
    10·1 answer
  • To have the most impact when using email, you should structure your messages so that
    5·1 answer
  • Blank determines the overall brightness or darkness of an entire image
    5·1 answer
  • What is the output of the following program?
    8·1 answer
  • What are four differences between tablets and smartphones?
    6·2 answers
  • Data is best described as
    5·2 answers
  • 1) Coding for Table in Html<br>​
    6·1 answer
  • should variables that contain numbers always be declared as integer or floating-point data types? why or why not? name potential
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!