1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alik [6]
3 years ago
15

Help with computer. homework

Computers and Technology
1 answer:
drek231 [11]3 years ago
8 0
Im pretty sure the answer would be 82 because it's concatenating 2 to string(y)
You might be interested in
One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
GaryK [48]

Answer:

Email Bomb

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the statement is False. The term being defined by the statement in the question is not called a mail spoof instead it is actually called an Email Bomb.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
4 years ago
What are the disadvantages of a Cessna 172?
Brut [27]

Answer:

The 172 accounted for 17-percent of the active fleet and flew 16-percent of the hours flown while accounting for six-percent of the fatal accidents.

Explanation:

In a two-year period there was but one fatal 172 accident that was due to a mechanical failure. That was an engine failure related to a valve. There were no fatal accidents related to fuel exhaustion or starvation.

Despite the good record in that area, the 172 is probably involved in just as many forced landings as any like airplane. It just appears more adaptable to impromptu arrivals than some other airplanes. The low landing speed contributes to this. There is no available statistic on this, but I would bet that most 172 forced landings don’t result in what the NTSB classifies as an accident.

I looked at fatal 172 accidents that occurred during two more recent years (2012 and 2013) when virtually all the NTSB reports were final as opposed to preliminary. There were 25 such accidents in the 48 contiguous states. If the methodology I used years ago is applied to that number, the 172 safety record appears to have improved, maybe substantially.

6 0
3 years ago
Which filter lets you improve an image's appearance by manipulating the look and depth of its surface?
serg [7]

Answer:

A

Explanation:

5 0
4 years ago
Read 2 more answers
5. Many large organizations have had their database system hacked and customer data stolen. How should the security for the data
yawa3891 [41]

Answer:

Security is very crucial for any system. Vulnerability can be exposed on different levels which includes database breach, network level attacks and application level attacks. Different kinds of attacks can be carried out for different components. Attacks carried out on databases are different from other kinds of attacks.  

Attacks on databases can be because of any of the following exposed vulnerability.  

  • Poor system design and weak architecture
  • Incorrect configurations  
  • SQL injection attacks  
  • Weak Authentication
  • Brute Force attacks on user credentials
  • Improper privilege mechanisms  
  • Privilege abuse and excessive access.  
  • Poor design and flaws in programming
  • Data loss and information corruption

Security of database systems should be designed by considering best database security design practices. Network security will ensures that all the networks level attacks are detected and mitigated which includes DDOS attacks, Syn flood attacks, Session Attacks, DOS attacks and web security will focus on detecting and protecting attacks on web applications and on application layer attacks. This includes XSS attacks, XML attacks DOS attacks, DDOS attacks, Slow DDOS attacks, JSON violations, Protocol violations etc. However, Security of database will be different than the rest of security and should be based on following best practices

 

  • Physical and Network Access Security.
  • Access control by managing the database access strictly.
  • Encryption of Data
  • Authentication  
  • Web Application Firewalls  
  • Controlling Database Integrations
  • Manual and Scheduled Backups through secured channels.  
  • Auditing and Logging
  • Reporting and Monitoring

Explanation:

<em>Physical and Network Access Security is essential </em>as the database will be hosted on many physical servers or cloud servers. If the databases are hosted on web or cloud servers and gaining access to such servers will eventually give out root user permissions.

Attackers can have control access of databases as root users if they succeed in getting into physical servers.Use of network firewalls and Intrusion detection and prevention systems will provide security against physical system access.

<em>Access control </em> will allow only specific users to access the database. User Based access control will give restricted or policy based privileges to different users. An user will be allowed to perform only certain actions in such cases which will avoid user-access abuse.  

<em> </em><em>Data encryption</em><em> </em>will make sure that eves dropper will not be able to read any data during transmission or during inter process calls. Authentication mechanisms will help to use strong cryptic authentications for users. Use of great encryption, key exchange and hashing algorithms will harden the security and will make databases robust.  

<em> Web Application firewalls</em> will provide a strong security against SQL injection attacks, database connection flood attacks, other web related attacks which will safeguard the databases at the cloud storage and also will block the attacker by flagging them.  

<em>Best coding practices</em> and vulnerability scanning and assessment will secure all the database integrations. <em>Database integrations</em><em> </em>with other components needs to be carried out with utmost care by making sure to analyse all the impacted areas.  

It is always a good practice to have <em>scheduled and manual backup of databases</em> which will be useful against data corruption because of erroneous user actions. This will ensure that data is safe and can be recovered during toxic situations. This will help to control the damage.  

<em> Auditing of logs</em> to verify all the actions performed on the database by different users is necessary as it will help to analyse any misbehavior or compromised user access. <em>Monitoring and reporting</em> will make sure that only the right user has the right access and also it will alert any attacks on the database system.

8 0
4 years ago
What characters denote a field name in the main document but do not appear in the merged document?
Sedaia [141]
The term that is being referred above is the CHEVRONS. The chevrons look like this << >>. This character is shaped in an inverted V pattern and is typically used in documents, specifically, those old documents. This character can also be seen as part of the road warning signs.
7 0
3 years ago
Other questions:
  • Universal Windows Platform is designed for which Windows 10 version?
    7·1 answer
  • An internal _____ refers to a specific representation of an internal model, using the database constructs supported by the chose
    8·1 answer
  • Which is a good plan for backing up data?
    6·1 answer
  • The _____ is the button that you push to take a photograph. i think its B Help PLZ
    5·1 answer
  • Match the file extensions to the file types. Some file types may be used more than once.
    11·1 answer
  • Which model emphasizes the risk analysis phase of development
    12·1 answer
  • All of the Internet in your country disappears. What happens next?
    13·1 answer
  • Why it is not recommended to add sound effect on slide transition? Write at least two reasons.​
    6·1 answer
  • Pick the correct statements on the 64-bit machine representation of numbers.
    5·1 answer
  • What is word processing program,Give 3 types of word processing program​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!