1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka2103 [35]
3 years ago
5

Why is a port scan detected from the same ip on a subnet an alarming alert to receive from yourids?

Computers and Technology
1 answer:
Eddi Din [679]3 years ago
3 0
It's an indication that either the machine or the user is mapping the network. In the case of the machine, it may have been hacked.
You might be interested in
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
Zina [86]

Answer:

Here is the C++ program:

#include <iostream> // to include input output functions

using namespace std; // to identify objects like cin cout

int counter(string userString, char character) { //function counter

   int count = 0;   // counts the no of times a character appears in the string

   for (int i=0;i<userString.length();i++)  

// loop to move through the string to find the occurrence of the character

       if (userString[i] == character) //if characters is found in the string

           count++;   //counts the occurrence of the character in the string

   return count; }   //returns the no of times character occurs in the string

int main() { //start of the main() function body

   string s; // stores the string entered by the user

   cout<<"Enter a string: "; //prompts user to enter the string

   cin>>s; //reads the string from user

   char ch; //stores the character entered by the user

   cout<<"Enter a character: "; //prompts user to enter a character

   cin>>ch; //reads the character from user

   cout << counter(s, ch) << endl; }  

//calls counter function to find the number of times a character occurs in the //string

Explanation:

The counter function works as following:

It has a count variable which stores the number of occurrences of a character in the userString.

It uses a for loop which loops through the entire string.

It has i position variable which starts with the first character of the string and checks if the first character of userString matches with the required character.

If it matches the character then count variable counts the first occurrence of the character and in the userString and is incremented to 1.

If the character does not match with the first character of the userString then the loops keeps traversing through the userString until the end of the userString is reached which is specified by the length() function which returns the length of the string.

After the loop ends the return count statement is used to return the number of occurrences of the character in the userString.

The main() function prompts the user to enter a string and a character. It then calls counter() function passing string s and character ch arguments to it in order to get the number of times ch appears in s.

The output is attached in a screenshot.

6 0
4 years ago
Types of network model​
dexar [7]

Answer:

OSI Model and TCP/IP Model

Explanation:

4 0
3 years ago
I have python homework and I’m struggling with it
melamori03 [73]

Answer:

okay

Explanation:

what's the question

5 0
3 years ago
Symmetric cryptography uses identical keys for both encryption and decryption. True False
Margarita [4]

Answer:

True

Explanation:

7 0
3 years ago
which button will allow you to insert quotes and notes into text into a document​ A comment B compare C research d margins
inysia [295]

Answer:

D margins

Explanation:

mark brainlist

3 0
3 years ago
Other questions:
  • OSHA has authority over the employers of
    5·2 answers
  • What is a content creator? Multiple Choice The person responsible for creating the original website content. The person responsi
    14·1 answer
  • What feature is available to add a suggestion in the margin of someone else's document?
    7·1 answer
  • Which type of address is used at the transport layer to identify the receiving application?
    14·1 answer
  • Business conducted using the internet
    9·1 answer
  • C. What is the computer memory? What is the role of the memory in a computer?​
    14·1 answer
  • Write a method named countInRange that accepts three parameters: an ArrayList of integers, a minimum and maximum integer, and re
    6·1 answer
  • WILL GIVE BRAINLIEST!! 20 PNTS!!
    7·2 answers
  • Activities provided for the satisfaction of others and consumed at the time of purchase<br> are…
    6·1 answer
  • The Home editions of Windows 7 do not include the Local Security Policy or Print Management.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!