1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenKa [72]
3 years ago
11

Can you determine if an external web site was likely accessed from a computer in you department a couple of seconds ago?

Computers and Technology
1 answer:
fredd [130]3 years ago
3 0

Answer:

Yes, it can be determined if an an external web site was likely accessed from a computer in the same department a couple of seconds ago.

Explanation:

Yes. “Dig” can be used to search that website in the local DNS server. A practical example would be to insert “dig google.com” and that will give us the result of the query time for searching and finding google.com. Supposing google.com was accessed a few seconds ago, then an entry for google.com is cached in the local DNS cache and the search or query time is 0 msec. If not the query time will be large.

You might be interested in
Someone please help ASAP will brainlist
Arada [10]

Answer:

i cant help

Explanation:

4 0
3 years ago
Read 2 more answers
Which steps of the management science process can either be a recommended decision or information that helps a manager a decisio
Step2247 [10]
Probably c or a with the question your asking
8 0
2 years ago
In your own words, what is pair-programming? What is the role of the driver? What is the role of the navigator? What are some be
KATRIN_1 [288]

<u>Paired programming:</u>

Paired programming is a new technique where one person gets one another to<em> write the code</em>. Here one will write the code and other will start verifying as the type.

So we might think it is waste to employ two person for same task but it is not so. There are many <em>benefits in incorporating this technique</em>. Let us see those benefits one by one.

  • <em>Inter-personal skill gets improved </em>
  • <em>Lower amount of coding mistake </em>
  • <em>Learn from each other </em>
  • <em>Peer review enhance collaboration </em>

Challenges expect to arise during pair-programming

  • Two heads are superior to one. On the off chance that the driver experiences a <em>hitch with the code</em>, there will be two of them who'll take care of the issue.  
  • Builds up your <em>staff's relational aptitudes</em>. Working together on a solitary venture encourages your group to welcome the estimation of <em>correspondence and collaboration.  </em>

Overcome Method

The most ideal approach to move <em>toward blending</em> is to accomplice two software engineers and have them share a PC. The pair ought to have the option to choose how to part the work, and it is prudent that they should <em>switch jobs frequently.</em>

7 0
3 years ago
Adam is using the software development life cycle to create a new game. He made an outline of what functionality the game will r
Olin [163]

Answer:

Write pseudocode and create a mock-up of how the game will work and look

Explanation:

Since in the question it is mentioned that Adam wants to develop a new game for this he made an outline with respect to game functions needed, time period, people who help him.

After that, he writes the pseudocode i.e a programming language and then develops a model i.e mock up that reflects the working of the game and its look so that he would get to know how much work is pending.

3 0
3 years ago
True or False <br><br> Rootkits are only made by black-hat hackers.
andreyandreev [35.5K]

Answer:

True

Explanation:

Rootkits are malicious software that allows an unauthorized user to access a computer and restricted areas of software. Rootkits are difficult to detect on your computer because it may be able to subvert there that is intended to find it. Rootkits are created by Black-hat hackers to attack your computer and steal.

Rootkit tools:

1. Keyloggers

2. antivirus disablers

3. password stealers

4. banking credential stealers

5. bots for DDoS attacks

8 0
3 years ago
Other questions:
  • major m,ajorrr points helpppppppppppppppppppppppppppi have a question i hit a few buttons and now my computer is saying everythi
    11·2 answers
  • Which of the following functions does a browser perform?
    7·2 answers
  • The function below takes a string argument sentence. Complete the function to return the second word of the sentence. You can as
    5·1 answer
  • To what type of user does he most likely have access? Jae is using a computer at the public library to do research she's able to
    9·1 answer
  • Technologies are having a negative impact on businesses.
    8·1 answer
  • Jerry wants to save his company money. He decides to move to open source software for his word processing needs. Jerry then down
    5·1 answer
  • Public class Square extends Shape{
    13·1 answer
  • Edhesive 3.5 code practice quetion one
    9·1 answer
  • How are keyboards applied in the real world
    13·1 answer
  • Phoebe is a Counselor who is trying to schedule a meeting with one of her patients. Which best describes an inappropriate locati
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!