Answer:
See Explanation Below
Explanation:
The new code segment is
int feb = 28;
if ((year % 4) == 0 && (year % 100) != 0) // assume that year is an integer with a valid year value
{
System.out.println("This is a leap year");
feb = 29;
}
Assume year = 2020, the assigned value of feb is 29;
Reason below;
At line 2 of the new code segment, two conditions are tested both of which must be satisfied.
1. year % 4 == 0
2020 % 4 = 0
0 = 0 (True)
2. year % 100 != 0
2020 % 100 != 0
20 != 0 (True)
Since both conditions are true, the value assigned to feb will be 29 and
"This is a leap year" will be printed without the quotes
The spell checker and thesaurus are not underneath the view tab, so 1 and 2 are wrong.
If you replace every instance of the word gorgeous, then you would not be adding variety. So d is incorrect.
Therefore:
The only correct answer is C, as it is correct navigation and it adds word variety.
Answer:
1 b 2 b 3 a 4 d 5 b 6 b 7 c 8 d
Explanation:
D, To communicate with a computer through a device or program :)
When we talk about TCP/IP, we are talking about a protocol suite designed as a layered approach and used to interconnect computing devices across the entire continent. Internet Protocol (IP) is like the epitome protocol of the entire TCP/IP protocol suite and helps in the delivery of services. This IP is encapsulated into an IP header before your message is sent. Having briefly discussed about the IP protocol and the encapsulation, here is where typical TCP/IP attacks occur.
Explanation:
- IP address spoofing – As mentioned above, IP is encapsulated into packet headers and inside of those headers are information such as IP source and destination addresses. IP source and destination addresses are needed by the routers to determine the best route path. If hackers can get access to the IP layer, they could easily spoof the source address and somehow make it pretend as if it was another legit host.
- TCP sequence number prediction attack– This is very common. TCT/IP protocol suite contains a three way handshake. For instance, when you do a web search, what is happening is that you are sending information to the server. The server will receive this info and send an acknowledgment receipt with the information it received back to you. You will then send an acknowledgment message to the server and communication will be established. In between this handshake, there is a sequence number called ISN that hackers are able to predict from their own host computers, and this sequence number could send malicious packets to impersonate another source host on a network.
- Port Scanning – It is not a technique used to directly launch an attack. However, hackers can use port scanning to scan a target network for exploitable open ports or listening servers.
Learn more about cyber security
brainly.com/question/10889739
brainly.com/question/11111886
brainly.com/question/8603826
#LearnWithBrainly