1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sauron [17]
3 years ago
9

__________ are decoy systems designed to lure potential attackers away from critical systems.

Computers and Technology
1 answer:
allsm [11]3 years ago
6 0
Honeypots are decoy systems designed to lure potential attackers away from crucial systems.

A network of honeypots is called a honeynet.
You might be interested in
This is a python program.
denpristay [2]

Answer:

word = input("Type your name: ")

print(len(word))

Explanation:

The len function will count all the chars in the string.

7 0
4 years ago
(10 points) [Edhesive] 3.6 Code Practice
Digiron [165]

Answer:

  • You need to create a variable outside (before) the input loop.
  • You need a variable inside your loop that temporarily holds the user input.
  • In your loop, you will compare if the variable outside the loop is greater than (or less than) the new user input.

I don't know what program language you are using, but I will use python since it's easy to read and you will get the idea if you're using a different programming language.

<u>Code (Python)</u>

largestnum = 0

for x in range(6): <em>#loops 6 times</em>

   newnum = int(input("Enter a number: ")) #ask user for input & converts to int.

   if newnum > largestnum: <em>#if new number is greater than largest num </em>

     largestnum = newnum     <em>#make it the largest number</em>

<em>    </em>print("Largest:", largestnum)

The reason why you need a variable outside of the loop is because after the loop is done all variables inside the loop are trashed and can no longer be accessed outside of the loop.

3 0
4 years ago
sales reps at universal containers use salesforce on their mobile devices. They want a way to add new contacts quickly and then
Mamont248 [21]

Answer:

Build a global action to create Contacts

Explanation:

Based on the information given the mobile solution that an app builder should recommend should be GLOBAL ACTION because global action enables new contact to be created quickly ,Global actions also enables the creation or update of records as well sending email, all without leaving the page the person is working on which is why GLOBAL ACTION is often recommended because it saves time.

6 0
4 years ago
The laser printer in your accounting department is printing faded prints that are getting lighter over time.
algol [13]

Answer:

Option D is correct.

Explanation:

The laser printer well into the finance department of the user publishes blurred images, which are becoming thinner across the time. The paper picking rollers for the fading prints are carried.

  • Option A is not correct because the following option is not related to the faded prints through the laser printer.
  • Option B is not correct because 'fuser' is the Linux command and it is not related to the temperature.
  • Option C is not correct because when the toner is low then it missed the prints.
8 0
4 years ago
Why is it important that software be compatible with your operating system? What kind of complications may occur if the two are
Svetllana [295]

Answer:

it is important for software to be compatible with your operating system so that you can use the software you acquired. The complications you may encounter if your software is not compatible with your operating system would be error codes, money wasted, and/or possible system changed that you do not want to change since it wouldn't be appropriate for your operating system.

Explanation:

Incompatible software is not something you should use with your operating system.

4 0
3 years ago
Other questions:
  • In memory ads for DIMMs, you notice DDR 2400 CL15 in one ad and PC4 21300 CL9 in another. Which ad is advertising the faster mem
    12·1 answer
  • If a user copies the formula D15 into D16, what would the formula read in D16?
    15·2 answers
  • What is text box and label control​
    10·2 answers
  • A slide in Olivia's presentation has the Title and Content layout applied. The bulleted list on the slide contains 14 items and
    15·1 answer
  • What makes up data encryption standard ?
    9·1 answer
  • This is your code.
    9·1 answer
  • g Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source
    13·1 answer
  • When can design templates be applied to the presentation?
    5·1 answer
  • Which type of protocol provides a way to transfer files from one computer to another over any tcp/ip network, such as a lan or t
    14·1 answer
  • write pseudocode to represent the logic of a program that allows the user to enter two values. The program outputs the sum of an
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!