1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
3 years ago
5

Write the algorithm and draw a flowchart to display the greatest number among any two different numbers....

Computers and Technology
1 answer:
joja [24]3 years ago
7 0

Answer:

Please check the attachment.

Explanation:

Please check the attachment.

Download docx
You might be interested in
Uinjsiodj9fijsdiokjdwe0okakj09dw9j09jw09
erica [24]

Answer:

hi

Explanation:

hii

3 0
3 years ago
Read 2 more answers
attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
bogdanovich [222]

Attackers frequently use ACK scans to circumvent a firewall or other filtering tools. During a NULL scan, all packet flags are enabled. The most recent versions of Nessus Server and Client are compatible with Windows, Mac OS X, FreeBSD, and the vast majority of Linux variants.

<h3>What is ack scan ?</h3>
  • ACK scans are used to identify hosts or ports that have been blocked or are resistant to other types of scanning. An attacker uses TCP ACK segments to learn about firewall or ACL configuration.
  • Attackers probe our router or send unsolicited SYN, ACK, and FIN requests to specific UDP/TCP ports.
  • TCP ACK Scan sends an ACK message to the target port to determine whether or not it is filtered.
  • On unfiltered ports, a RST reply packet will be sent for both open and closed ports. Filtered ports will either generate no response or generate an ICMP reply packet with an unreachable destination.
  • The TCP ACK scanning technique attempts to determine whether a port is filtered by using packets with the ACK flag set.

To learn more about ask scan refer to:

brainly.com/question/13055134

#SPJ4

3 0
1 year ago
An open system consists of nonproprietary hardware and software based on publicly known standards that allows third parties to c
kolezko [41]

Answer:

The answer is "Option D".

Explanation:

A system or a group of components that communicate with your environment through the sharing of resources, materials, and knowledge with a view to system regeneration and development is known as an Open system. In other words, we can say that it is a system that includes a non-proprietary hardware and advert-based software which enables third parties to add or interact with products to plug in the system and It is freely available on the internet. In this question, the incorrect options can be described as follows:

  • In option A, The management system is used by an organization. It is a paid system that's why it is not correct.
  • In option B, This system enables users in online communities and evaluates one another that's why it is not correct.
  • In option C, This type of system provides resources for upgrade user knowledge. It is a paid system that's why it is not correct.  

6 0
3 years ago
Suh my lil cuddys.... tell me what ur favorite candy is.....
LenKa [72]

Answer:

ok imma little scared, but my fav candy would have to be reeses peanut butter cups or hershey's with almonds.

8 0
3 years ago
It is next to impossible for someone to prove that information I used in a class assignment came from somewhere on the Internet/
Rashid [163]

Answer:

False

Explanation:

It is wrong to say that plagiarism can not be detected, there is a wide range of technologies available to prove that the information provided that a person is gotten directly from a source and it was not His own words. Plagiarism checking tools include web applications and software made to check plagiarism and they available for use, most of which are paid software and some are free.

3 0
3 years ago
Other questions:
  • 1. Mobile devices have a _________ viewport that displays a web page content that fits within a mobile screen.
    11·1 answer
  • Which statement about trees is false?
    12·1 answer
  • Does Windows 7 support secure boot in UEFI? Windows eight? Linux UBUNTU version 14?
    8·1 answer
  • 2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
    15·1 answer
  • What are the four stages a customer goes through when buying a product?
    7·2 answers
  • What is the output of the following program?
    5·1 answer
  • Define the instance method inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids. Sample output for th
    6·1 answer
  • Write a function longer_string() with two string input parameters that returns the string that has more characters in it. If the
    5·1 answer
  • Dominic list his camera for sale on an online auction site Chloe is the highest bitter and purchase as the camera how does the a
    14·1 answer
  • The project objective is the detailed description of the characteristics of the project. True or False?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!