1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Contact [7]
3 years ago
9

What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messag

es back to the computer that originated the suspected spam? Multiple Choice typosquatting teergrubing Internet censorship website name stealing
Computers and Technology
2 answers:
Burka [1]3 years ago
8 0

Answer:

Teergrubing.

Explanation:

Teergrubing is an antis-pamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

It is a good antis-pamming approach because it slows response to the Simple Mail Transfer Protocol (SMTP) commands, thus tying up resources.

Aloiza [94]3 years ago
4 0

Answer:

teergrubing

Explanation:

The tern "teergrubing" was derived from the German term "tar pit." A teergrube is a process where the email system on a computer's main server is  intentionally set slow so that it can detect and sniff out potential spam attacks on the computer's email system. In addition, the system ensures that the email system is enabled to bounce off the emails from the spammers by identifying the pathway used to send the email. As soon as the email is labelled malicious, the email is immediatetl labelled "spam"or as potentially dangerous and is shifted to the spam folder or sent back quickly to the owner. as a rejected email.

You might be interested in
File Sales.java contains a Java program that prompts for and reads in the sales for each of 5 salespeople in a company. It then
myrzilka [38]

Answer:

import java.util.Scanner;

public class Sales

{

public static void main(String[] args) {

   

    int sum;

    Scanner input = new Scanner(System.in);

   

    System.out.print("Enter number of salespeople: ");

    int salespeople = input.nextInt();

    int[] sales = new int[salespeople];

       

    for (int i=0; i<sales.length; i++)

    {

     System.out.print("Enter sales for salesperson " + (i+1) + ": ");

     sales[i] = input.nextInt();

    }

    System.out.println("\nSalesperson   Sales");

    System.out.println("--------------------");

    sum = 0;

       int maxSale = sales[0];

       int minSale  = sales[0];

       int minId=1;

       int maxId=1;

    for (int i=0; i<sales.length; i++)

    {

               System.out.println("     " + (i+1) + "         " + sales[i]);

 sum += sales[i];

  if(maxSale < sales[i])

           {

               maxSale = sales[i];

               maxId = i+1;

           }

           if(minSale > sales[i])

           {

               minSale = sales[i];

               minId = i+1;

           }

   }

System.out.println("Total sales: " + sum);

       System.out.println("The average sale is: " + sum / salespeople );

       System.out.println("Salesperson "+ maxId + " had the highest sale with "+ maxSale + ".");

       System.out.println("Salesperson "+ minId + " had the lowest sale with "+ minSale + ".");

       

       int amount = 0;

       int counter = 0;

       System.out.print("Enter an amount: ");

       amount = input.nextInt();

       for (int i=0; i<sales.length; i++)

    {

     if(sales[i] > amount) {

         counter++;

         System.out.println("Salesperson "+ (i+1) + " exceeded given amount. (Number of sales: " + sales[i] +")");

     }

    }

       System.out.println("Number of salespeople exceeded given amount is: "+ counter);

}

}

Explanation:

- Ask the user for the number of salesperson

- According to entered number, create an array called sales to hold sale number for each person

- In the first for loop, assign the given sales numbers

-  In the second for loop, print all the sales people with sales, calculate the total sales. Also, find the minimum and maximum sales numbers with associated individuals.

- Print total, average, highest, and lowest sales.

- Ask user enter an amount

- In the third for loop, find the sales people who exceeded this amount.

- Print number of sales people who exceeded the amount.

8 0
4 years ago
What are some common security threats for our home devices and IoTs?
musickatia [10]

Answer:

  • Botnets. A botnet is a network that combines various systems together to remotely take control over a victim’s system and distribute malware.
  • A denial-of-service (DoS) attack deliberately tries to cause a capacity overload in the target system by sending multiple requests.
  • In a Man-in-the-Middle (MiTM) attack, a hacker breaches the communication channel between two individual systems in an attempt to intercept messages among them.
  • Hackers use social engineering to manipulate people into giving up their sensitive information such as passwords and bank details.
  • Ransomware attacks have become one of the most notorious cyber threats. In this attack, a hacker uses malware to encrypt data that may be required for business operations. An attacker will decrypt critical data only after receiving a ransom.

Explanation:

6 0
3 years ago
Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based
Nikolay [14]

Answer:

Secure Sockets Layer (SSL)            

Explanation:

  • SSL is a  standard security technology for setting up an encrypted link between a server and a client (in this case web browsers and web server).
  • SSL is a security protocol that transmits sensitive information securely.
  • As we know data transmitted between browsers and web servers is sent in the form of plain text.
  • If a hacker is able to seize data being transmitted between a browser and a web server, they can misuse that information.  
  • So SSL makes the web servers and web browsers to communicate with each other securely.
  • When transmitting confidential information, a web server and browser set up a secure connection using SSL certificate.
  • The link between web server and browser is encrypted by SSL which makes sure that all data transmitted between them remains private and protected.
  • Due to the sensitive nature of the business SSL is most suitable solution to keep sensitive information sent across internet encrypted making sure that only intended receiver can access it.
  • SSL certificate is used for authentication purpose.
  • For making sure that information is sent to right server, web browsers give indication of secured connection via a lock icon attached or uses https.
5 0
3 years ago
A file named numbers.txt contains an unknown number of lines, each consisting of a single positive integer. Write some code that
Reptile [31]

Answer:

  1. with(open("numbers.txt")) as file:
  2.    data = file.readlines()  
  3.    runsum = 0
  4.    largest = 0
  5.    
  6.    for x in data:
  7.        if(int(x) > largest):
  8.            largest = int(x)
  9.            runsum += largest  
  10.    
  11.    print(runsum)

Explanation:

The solution code is written in Python 3.

Firstly, open a filestream for numbers.txt (Line 1) and then use readlines method to get every row of data from the text files (Line 2).

Create a variable runsum to hold the running sum of number bigger than the maximum value read up to that iteration in a for loop (Line 3).

Use a for loop to traverse through the read data and then check if the current row of integer is bigger than the maximum value up to that point, set the current integer to largest variable and then add the largest to runsum (Line 6 - 9).

At last display the runsum to console terminal (Line 11).

8 0
4 years ago
The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n)
nataly862011 [7]

Answer:

D). Algorithm

Explanation:

The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called an algorithm.

From the question, it is clear the correct option is algorithm.

In simple terms, to solve a problem the set of rules to follow is called algorithm. Algorithm in computer programming describes the steps that explains not only the task that needs to be performed, but also how to do it.

In algorithm, the steps are needed to be in the right sequence.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Create a test that prompts a user to enter a 5-digit PIN in the main procedure and then calls Validate PIN procedure to validate
    12·1 answer
  • Do questions have to be about school work on this website or can they be questions about video games?
    11·2 answers
  • Which of the following might not exist in a URL?
    10·2 answers
  • You’re browsing the internet and realize your browser is not responding. Which of the following will allow you to immediately ex
    11·1 answer
  • Please help with the question no. 5 and 7 please help ​
    6·1 answer
  • The term "exception propagation" means:
    5·1 answer
  • To make slides in a PowerPoint Online application presentation have the same transition effect, select __________ on the Transit
    11·2 answers
  • Please help I don’t know
    5·1 answer
  • Select the best answer from the drop-down menu. Sometimes people feel threatened by new ideas and different ways of doing things
    5·1 answer
  • Three classifications of operating system​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!