1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allisa [31]
3 years ago
7

What is the most likely to be a possible physical attack?

Computers and Technology
2 answers:
alexira [117]3 years ago
6 0

Answer:

Physical attacks (also called kinetic attack) are. intentional offensive actions which aim to destroy, expose, alter, disable, steal or gain unauthorised access to physical assets such as infrastructure, hardware, or interconnection.

Explanation:

Serga [27]3 years ago
4 0

Answer:

a punch to the face

Explanation:

You might be interested in
Write three statements to print the first three elements of array runTimes. Follow each statement with a newline. Ex: If runTime
yawa3891 [41]

Answer:

Following are the code to this question:

for (i = 0; i <3; ++i)//defining loop to print value

{

cout<<runTimes[i]<<endl;//print value

}

Explanation:

Full program code to this question:

#include<iostream>//defining header file

using namespace std;

int main() //defining main method

{

const int NUM_ELEMENTS = 5;//defining const integer variable

int runTimes[NUM_ELEMENTS]; //defining integer array

int i;//defining integer variable

for (i = 0; i < NUM_ELEMENTS; ++i)//defining loop to input value

{

cin >> runTimes[i];//input value  

}

cout<<"print three elements value of array: "<<endl;

for (i = 0; i <3; ++i)//defining loop to print value

{

cout<<runTimes[i]<<endl;//print value

}

return 0;

}

Output:

Please find the attachment.

Description:

  • In the above code, an integer const variable "NUM_ELEMENTS" is declared, that assign value "5" which is array size, in the next step, an array "runTimes" is declared.
  • In the next step, for loop is used, that uses an integer variable "i", which is used to input all array elements.
  • In the next line, another for loop is used, which uses "i" variable, which starts from 0 and ends when its value less than 3, inside the loop print method, used that prints 3 array elements.  

8 0
3 years ago
Answer to this problem
True [87]

Answer:

hi..,.................................................

3 0
3 years ago
Samuel is working on decimal and binary conversion for his college project.He is using the binary number 111011 and wants to exp
Bond [772]

The answer would be to multiply the binary code with all results from the formula Samuel used to encode the desired number, until he gets 59 as a result.

(P.s. 111011 isn't 59, it results in a semicolon if you convert it using an binary code translator. It rather states that 00110101 00111001 is 59)

6 0
4 years ago
What is the name of the process that is used to establish whether or not a user’s identity is legitimate?
pogonyaev

Answer:

Authentication

Explanation:

The authentication process is used to check the identification of the particular user or computer system .we can give authentication to any user by the username and password. If a particular user puts the correct username and password into the website then it has the authority to access that particular website.

For example: In the any mail website, if a particular user login with the correct username and password then it has an authenticated user. It means it has the right to access the mail of that account .  

8 0
3 years ago
Sketch f(x) = 5x2 - 20 labelling any intercepts.​
Norma-Jean [14]

Answer:

  • The graph of the function is attached below.
  • The x-intercepts will be: (2, 0), (-2, 0)
  • The y-intercept will be: (-20, 0)

Explanation:

Given the function

f\left(x\right)\:=\:5x^2-\:20

As we know that the x-intercept(s) can be obtained by setting the value y=0

so

y=\:5x^2-\:20

switching sides

5x^2-20=0

Add 20 to both sides

5x^2-20+20=0+20

5x^2=20

Dividing both sides by 5

\frac{5x^2}{5}=\frac{20}{5}

x^2=4

\mathrm{For\:}x^2=f\left(a\right)\mathrm{\:the\:solutions\:are\:}x=\sqrt{f\left(a\right)},\:\:-\sqrt{f\left(a\right)}

x=\sqrt{4},\:x=-\sqrt{4}

x=2,\:x=-2

so the x-intercepts will be: (2, 0), (-2, 0)

we also know that the y-intercept(s) can obtained by setting the value x=0

so

y=\:5(0)^2-\:20

y=0-20

y=-20

so the y-intercept will be: (-20, 0)

From the attached figure, all the intercepts are labeled.

8 0
3 years ago
Other questions:
  • (2) Complete the get_num_of_characters() function, which returns the number of characters in the user's string. We encourage you
    5·1 answer
  • 50 pts. please help ! Explain briefly the role, responsibilities, and required background of the production designer of a film.
    12·1 answer
  • The OSI is a reference system that is used by most types of technicians EXCEPT _____.
    11·2 answers
  • A(n) ________ is a web application that allows users to easily add and edit content on a web page.
    15·1 answer
  • what are the benefits of VolP? select all that apply. A:cheaper printings B:clearer calls C: faster download D: increased effici
    11·2 answers
  • All of the followingshould be followed by entrepreneur for being effective
    10·1 answer
  • 20
    6·1 answer
  • Which of the following events happened first
    15·2 answers
  • Can anyone talk to me?
    9·2 answers
  • String objects are modified with string slices true or false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!