1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
4 years ago
15

A database, a database management system, and the application programs that use the data, make up a database environment.

Computers and Technology
1 answer:
BlackZzzverrR [31]4 years ago
8 0

Answer:

A) The statement is true

You might be interested in
As we move up a energy pyrimad the amount of a energy avaliable to each level of consumers
AleksandrR [38]

Explanation:

As it progresses high around an atmosphere, the amount of power through each tropic stage reduces. Little enough as 10% including its power is passed towards the next layer at every primary producers; the remainder is essentially wasted as heat by physiological activities.

8 0
3 years ago
List three reasons you might use hwinfo when troubleshooting and upgrading a computer
Elza [17]

Solution:

three reasons you might use hwinfo when troubleshooting and upgrading a computer are as follows:

1) If we want to identify a hardware component with out opening the case.

2. if we want identify Features of a motherboard, video card, or processor.

3. establish benchmarks for the components in

8 0
4 years ago
The _____________ loop allows the receiver to communicate with the sender in the imc process.
postnew [5]
Feedbacks
perhaps !!
<span>The feedback loop allows the receiver to communicate with the sender in the imc process.</span>
4 0
3 years ago
Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping
tresset_1 [31]

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

6 0
4 years ago
Can someone please give me two (2) thesis statement for this question?
ira [324]

Answer: On a personal note it has changed not a bit, i go to online school so nothing has changed.

Explanation:

3 0
3 years ago
Other questions:
  • If you have cut or copied a set of information, which procedure will NOT work to paste it back into the worksheet?
    14·1 answer
  • A ________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the custom
    11·1 answer
  • Mindy wants to create a new subdirectory at ~/2019projects/projectx/projectplans to start storing the initial project plans for
    14·1 answer
  • What is a burned edge ?
    8·1 answer
  • Write a program that asks the user for the names of two files. The first file should be opened for reading and the second file s
    13·1 answer
  • The federal government is the largest employer of cybersecurity professionals true or false
    5·1 answer
  • In this lab, you complete a partially prewritten Python program that uses a list.
    12·1 answer
  • Please help
    11·1 answer
  • An engineer is designing an HTML page and wants to specify a title for the browser tab to display, along with some meta data on
    12·1 answer
  • We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!