1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serga [27]
3 years ago
10

Natalie is a secretary and must complete a large amount of filing this afternoon. At 1:00 PM, the office receptionist gets sick

and goes home. The manager asks Natalie to fill in at the front desk for the rest of the afternoon. Which trait does Natalie demonstrate by adjusting her schedule?
Computers and Technology
1 answer:
True [87]3 years ago
8 0

Answer:

flexibility

Explanation:

she is able to adjust to the task that is being asked of her

You might be interested in
The ________ multiple-selection PHP statement is used to handle decision making and can be used to replace multiple if and if...
Sedaia [141]

Answer:

Option (4) is the correct answer of this question.

Explanation:

The switch is used to handle the multiple selections in the program when we need to choose on the condition and we have more then one condition arises then we have used the switch statement in the PHP.

Syntax of using Switch:-

switch(variable)  

{

case 1. statement

Break;

..................

default :

case n:

statement n

}

Other options do not use multiple selections so they are incorrect options.

7 0
3 years ago
WHICH PROGRAMMING LANGUAGES ARE THE BEST AND COMPATIBLE FOR 3D PRINTERS?
Serggg [28]

Answer:

G-code and C++ can be used

5 0
3 years ago
In a bubble sort, you use a(n) ____ loop to make pair comparisons.
GarryVolchara [31]
In a bubble sort, you use an inner loop to make pair comparisons.
5 0
3 years ago
A smart phone is always a _____.<br> client<br> server<br> network<br> process
kogti [31]
A smart phone should always be a client due to the fact that it gathers information from a server.
3 0
3 years ago
Why is a DNS cache poisoning attack dangerous? Check all that apply. A. Errrr...it's not actually dangerous. B. It allows an att
larisa [96]

Answer:

(B) It allows an attacker to redirect targets to malicious webserver.

(D) It affects any clients querying the poisoned DNS server.

Explanation:

DNS cache poisoning is a serious type of attack that is designed to exploit the vulnerabilities inherent in a Domain Name Server (DNS) where a user is redirected from a real server to a fake one. It is also called DNS spoofing.

Normally, when your browser tries to visits a website through a given domain name, it goes through the DNS server. A DNS server maintains a list of domain names and their equivalent Internet Protocol addresses. This server (DNS) then responds to the request with one or more IP addresses for the browser to reach the website through the domain name.

The computer browser then get to the intended website through the IP address.

Now, if the DNS cache is poisoned, then it has a wrong entry for IP addresses. This might be via hacking or a physical access to the DNS server to modify the stored information on it. Therefore, rather than responding with the real IP address, the DNS replies with a wrong IP address which then redirects the user to an unreal website.

Although they might not be able to control your computer remotely as long as you are not trying to visit a web page via the poisoned information, there are other dangers attached to this type of attack.

Once the DNS server has been poisoned, any client trying to query the server will also be affected since there is no direct way of knowing if the information received from the server is actually correct.

4 0
4 years ago
Other questions:
  • Which statement describes the word "iterative"?
    7·2 answers
  • The section called Breaking Substitution Ciphers (p. 166) describes a "random substitution cipher," in which each letter of the
    11·1 answer
  • How do you convert a decimal to binary?
    9·2 answers
  • PLZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ HELP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    11·2 answers
  • What was the original motivation for developing the internet?
    7·1 answer
  • Explain what middleware is. Name a common middleware in two-tier client/server architecture for database applications.
    10·1 answer
  • An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that c
    8·2 answers
  • Question 1 of 10 Chase lives in Oregon but works for a company that is located in Florida. What business trend is this an exampl
    11·2 answers
  • 3. Discuss microprocessor components, chips,
    15·1 answer
  • 10.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!