1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
8

PLEASE HELP THIS WAS DUE YESTERDAY AND I DIDN'T GET TO IT IN TIME!!!!!!

Computers and Technology
1 answer:
kykrilka [37]3 years ago
7 0

Answer:

dDAgv

Explanation:

sdc sdc sdc trust me

You might be interested in
You work as a Network Administrator for wwwpany Inc. You have suspected a bad driver or perhaps malware. Which of the following
vichka [17]

Answer:

Explanation:

There is a solution called ETA (Encrypted Traffic Analytics) this is a security advanced network that helps us to identify malware between the encrypted data, but with this tool is no necessary to break any protection and privacy chain.

This technology use machine learning to read all the traffic without deciphering it, in this way we can detect a difference between reliable and malicious traffic.

En windows we can use Microsoft Security Essentials like antivirus and detect virus, we can use Process Explorer, analyze the traffic, we can use Microsoft Network Monitor.

8 0
3 years ago
5. Write few lines of code that creates two arrays with malloc. Then write a statement that can create a memory leak. Discuss wh
Darina [25.2K]

Answer:

 // function with memory leak  

void func_to_show_mem_leak()  {  

int *pointer;

pointer = malloc(10 * sizeof(int));

*(pointer+3) = 99;}  

 

// driver code  

int main()  

{  

    // Call the function  

   // to get the memory leak  

   func_to_show_mem_leak();  

     return 0;  }

Explanation:

Memory leakage occurs when programmers allocates memory by using new keyword and forgets to deallocate the memory by using delete() function or delete[] operator. One of the most memory leakage occurs by using wrong delete operator. The delete operator should be used to free a single allocated memory space, whereas the delete [] operator should be used to free an array of data values.

3 0
3 years ago
Question # 1 Multiple Select Which features are important when you plan a program? Select 4 options. Knowing what information is
Black_prince [1.1K]

Answer:

c

Explanation:

7 0
3 years ago
_____ allow you to resize a graphic using the mouse.
timofeeve [1]
Microsoft.././/.//././././././.
5 0
3 years ago
Read 2 more answers
The quicksort is an example of a divide and conquer algorithm in that it divides the sorting problem into smaller problems by di
ankoles [38]

Answer:

The quicksort pivot is an arbitrary element within the collection that is being sorted.  Using the pivot point, the collection of elements is partitioned into two smaller lists of elements.  Using some logic, the smaller elements are placed left of the pivot point, and larger elements are placed to the right of the pivot point.  Ideally, you would prefer you pivot point to be a median of your dataset to optimize the creation of the two sublists into a balanced state.

Cheers.

8 0
4 years ago
Other questions:
  • Is the cell phone changing our views about polite and impolite behavior? For example,
    9·2 answers
  • _____ allows you to use the internet for making phone calls instead of leasing traditional telephone lines from the phone compan
    6·1 answer
  • According to your course, two benefits of a cloud-based system are_ and_
    12·1 answer
  • Which of these port transmits digital video
    12·2 answers
  • According to the order of operation in Excel: a. Excel performs exponentiation, then multiplication, then division, then subtrac
    10·1 answer
  • You are responsible for performing all routine maintenance on your company's laser printers. Which of the following maintenance
    15·1 answer
  • Write a program that reads numbers from a file (or allow user to input data) and creates an ordered binary tree. The program sho
    8·1 answer
  • Matching: match each step with its correct sequence number. This question tests whether you know the order in which a CPU perfor
    14·1 answer
  • Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the ap
    14·1 answer
  • Can some one help please
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!