1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldi70 [24.7K]
4 years ago
9

Which is the term for a computer typically located in an area with limited security and loaded with software and data files that

appear to be authentic, yet they are imitations of real data files?
a. port scanner
b. honeynet
c. honeypot
d. honeycomb
Computers and Technology
1 answer:
wariber [46]4 years ago
4 0

Answer:

c. honeypot

Explanation:

A honeypot is a computer or a network used to mimic the actual target of a cyberattack. It is also used to detect attacks on the network and divert them from the real network. This is used to gain insight into how cyberattacks are carried out. With such knowledge, robust security systems can be put in place.

You might be interested in
By the definition of a computer, justify if a mobile phone and a calculator are computers or not​
likoan [24]

Answer:

It depends on the features of the Calculator but most mobile phones are computers.

Explanation:

A computer is an electronic device that can accept data (Both can), process the data (both can), produce the results of the processed data (both can) and store both result and initial data (some calculators can, some cannot but most mobile phones can).

In my opinion, they are computers but that's dependent on their features especially storage.

3 0
3 years ago
Click this link to view O*NET’s Work Styles section for Petroleum Engineers. Note that common work styles are listed toward the
inysia [295]

Answer:

2 (cooperation )

3 (integrity)

5 (analytical thinking)

6 (dependability)

Explanation:

Good luck! Hope this helps.

4 0
3 years ago
Read 2 more answers
Write a program to input an integer num from the keyboard and: : find the area of a square whose side length is num. : find the
NeX [460]

Answer:

# include<iostream>  

# include<math.h>  

using namespace::std;  

void calc (int num)  

{

     cout<<"Area of Square" <<num*num;   

     cout<<"Volume of a sphere" << (4/3) *3.14*num*num*num;

     cout<<"Side of a Square" <<sqrt(num);  

     }  

int main ()  

{  

     int num;

     cout<<"Enter the Number"; cin>>num;  

      calc(num);  

      return 0;  

}  

Explanation:

I have used the swtich for the selection purpose. Also, I have used sqrt() function, and for that I have included math,h library.  And the various formula comes from mensuration. Rest part is self explanatory.

3 0
4 years ago
The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of dat
igor_vitrenko [27]

Answer:

Explanation:

In data communications, a protocol is <em>connectionless </em>if it describes communication between two devices in a network without first establishing or verifying establishment of some link (connection) between the two devices. In a connectionless protocol, data are exchanged between processes or devices without a prior check of whether the processes are ready to transmit data or not. In this type of protocol, there's no verification put in place to remember if these processes were or are in communication. Connectionless protocols are also called stateless protocols. Because connectionless protocol cannot be relied upon due to its lack of delivery-assurance policy, it is sometimes referred to as <em>unreliable protocol</em>. In other words, delivery of data packets is not guaranteed. An example of a connectionless protocol is the UDP (User Datagram Protocol).

However, if the protocol defines some checks to ascertain that there is first a connection between two communicating processes before beginning transmission, then, the protocol is <em>connection-oriented. </em>An example of this is the TCP (Transmission Control Protocol). Connection-oriented protocols are reliable since they ensure connection be made between processes before transmitting data packets.

A typical application of a connectionless/unreliable protocol is in the streaming of real time videos or voice communication where packets of data could be dropped and not resent.

An example of the connection-oriented/reliable protocol is analogous to making a telephone call where data packets (voice messages) are not sent until the receiver on the other end makes a connection.

6 0
3 years ago
Describe how place value is used in the binary number system. How is it similar or different from the way place value is used in
daser333 [38]
The binary number system is also referred as base-2 numeral system. The numeric values in the binary system are represented with only two symbols "0" and "1". The base 10 number system on the other hand is the usual number system that uses decimal numbers.
In the binary system the number to the left of the point is a whole number and every number further left gets 2 times bigger. The first digit on the right means halves and every number further right is 2 times smaller.
In the base 10 system number greater than 1 appear to the left of a decimal point. Values that are a fraction appear to the right of the decimal point. Every number further  left is 10 times bigger, and right 10 times smaller.







7 0
3 years ago
Other questions:
  • The first electric, general-purpose computer, ENIAC, was programmed by calculating algorithms on paper entering code directly in
    14·1 answer
  • Have you ever tried to teach a class full of restless, active sixth-graders? I have. I taught sixth-grade students for 12 years.
    15·1 answer
  • What machine is considered by many to be the first all-programmable electronic digital computer?
    15·1 answer
  • Which directory in the FHS stores programs and configuration information that can only be executed and modified by the root user
    10·1 answer
  • In linear​ programming, choices available to a decision maker are called
    12·1 answer
  • A device that does not work well in a system can sometimes be improved by updating its ___computer ____________.
    13·1 answer
  • 30 points!! What should I do if I plug my computer in and it starts making noises and sounds and it starts smelling.
    9·1 answer
  • Scientists measure an object’s mass in kilograms and its weight in newtons. If you knowthe amount of mass of an object in kilogr
    5·1 answer
  • A web page that allows interaction from the user​
    12·1 answer
  • 1. How can you help prevent being a target of cyberbullying?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!