1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
3 years ago
13

You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen ha

s a banner ad for Dallas Cowboy hats and shirts. This banner ad is most likely the result of :_________a. tracking softwareb. a coincidencec. the Internet crime of theft of private informationd. encryption software
Computers and Technology
1 answer:
masha68 [24]3 years ago
4 0

Answer:

The correct answer is A. You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen has a banner ad for Dallas Cowboy hats and shirts. This banner ad is most likely the result of tracking software.

Explanation:

Tracking software are programs installed by various websites that have the function of collecting search data from the internet user, in order to redirect advertising on topics that said user is interested in, as they have previously searched for them. These programs, for example, are used to offer products that have been previously investigated by the user, such as airline tickets or clothing offers, among many other things.

You might be interested in
What feature, new to Windows Server 2012, provides the ability to find identical sets of data on a SAN-based storage array and r
GenaCL600 [577]

Answer:

Data De-duplication

Explanation:

Data De-duplication is a feature that can help reduce the impact of redundant data on storage costs.

When enabled,<em> </em>Data De-duplication optimizes free space on a volume by examining the data on the volume <em>by looking for duplicated portions</em> on the volume. Duplicated portions of the volume's data set are stored once and are (optionally) compressed for additional savings.

Data De-duplication optimizes redundancies without compromising data fidelity or integrity.

7 0
3 years ago
Which command displays the status of the ipsec installation?
Alexandra [31]
Character command shows the status.
8 0
3 years ago
Say you find a module in a package that does a lot of awesomely useful things, but the name of it is module_that_does_many_aweso
Ber [7]

Answer:

IDRK rename it!

3 0
3 years ago
a password to a certain database consists of digits that cannot be repeated. if the password is known to consist of at least 8 d
BaLLatris [955]

Answer:

\frac{10!}{2}mins

Explanation:

12 seconds to try one combination will be equivalent to  \frac{1}{12}\times 60 = \frac{1}{5} \ mins

Password contain at least 8 digit i.e. password can contain 8, 9, 10 digit.

Password cannot contain more than 10 digit because it will give room for repetition which it is clearly stated that digit cannot be repeated.

Possible digit that can be used: 9,8,7,6,5,4,3,2,1,0.

Total number of passwords combination possible for each position in 8 digit.

1st position = 10, 2nd position = 9, 3rd position = 8, 4th position = 7, 5th position = 6, 6th position = 5, 7th position = 4, 8th position = 3. Total number of passwords combination possible in 8 digit is equivalent to \frac{10!}{2}.

Total number of passwords combination possible for each position in 9 digit.  

1st position = 10, 2nd position = 9, 3rd position = 8, 4th position = 7, 5th position = 6, 6th position = 5, 7th position = 4, 8th position = 3, 9th position = 2. Total number of passwords combination possible in 9 digit is equivalent to \frac{10!}{1}.

Total number of passwords combination possible for each position in 10 digit.

1st position = 10, 2nd position = 9, 3rd position = 8, 4th position = 7, 5th position = 6, 6th position = 5, 7th position = 4, 8th position = 3, 9th position = 2, 10th position = 1.  Total number of passwords combination possible in 10 digit is equivalent to 10!.

Adding them up and multiplying by  \frac{1}{5} \ mins  to get the total number of time needed to guarantee access to database =  [\frac{10!}{2}\times\ \frac{10!}{1} \times 10!] \frac{1}{5}\ mins = \frac{10!}{2}

7 0
3 years ago
In certain programming languages, comments appear between delimiters such as /# and #/. Let C be the language of all valid delim
geniusboy [140]

Answer:

The DFA and regular expression is given in the attached file.

Explanation:

               

Download docx
8 0
4 years ago
Other questions:
  • Morgan's cursor is blinking in the center of the page but he would like to move it to the left margin. He should _____.
    10·1 answer
  • In what era did plants begin to flourish?
    9·1 answer
  • You are a police officer trying to crack a case. You want to check whether an important file is in the evidence room. Files have
    5·2 answers
  • How is the illusion of animation achieved using Sprites with multiple costumes?
    12·1 answer
  • How is a technical certificate like a computer-related associate degree?
    12·2 answers
  • The CTRL, ALT, and WINDOWS keys are commonly used for keyboard shortcuts, which are keystrokes that can quickly perform an opera
    9·1 answer
  • Which feature is used to help identify the appropriate content for particular form fields?
    9·1 answer
  • The Ingenuity and the MOXIE are two new pieces of technology on the Perseverance. What role will these instruments play? How wil
    6·2 answers
  • You are the PC technician for a company. An employee has gone to a meeting while you fix the computer in her office. She acciden
    15·1 answer
  • What is a use case of factorization in quantum computing?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!