Answer: Stealth scanning technique
Explanation:
Stealth Scanning technique includes the following steps:
1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.
2. The port is assumed to be in closed state if the RST packe t is sent from the server.
3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.
Answer: Provided in the explanation section
Explanation:
The question to this problem says;
Question:
I am sorting data that is stored over a network connection. Based on the properties of that connection, it is extremely expensive to "swap" two elements. But looping over the elements and looking at their values is very inexpensive. I want to minimize swaps above all other factors. Choose the sorting algorithm we studied that will perform the best:
ANSWER
1. Merge Sort
Because merge sort uses additional memory instead of swapping the elements.
2. Merge Sort and Quick Sort both can be used with multi processor.
cheers i hope this helps !!!
Answer:
D. Pedestrians ignoring DON'T WALK signs
Explanation:
Pedestrians ignoring DON'T WALK signs is something you need to keep an eye out for near packed intersections.
Just try to answer some questions as well, then you can keep a nice balance.
ps. Only answer the questions you know.