High-level language programs must be translated into machine language before they can be executed. (Machine language instructions are encoded as binary numbers that are meant to be used by a machine, not read or written by people. The Java compiler translates Java programs into a language called Java bytecode.
Answer:
INPUT
Explanation:
Information Processing Cycle is defined as the series of stages followed in processing information. Those stages include:
- Input
- Processing
- Storage
- Output
Input involve entering the data/information into the computer
Processing involve the computer performing some computation on the data
Storage involve saving the data and/or result to the any medium for future use.
Output involve displaying or presenting the results to the user.
Answer:
What?
Explanation:
I would like to help, but what is the question
The
nmap.org website
Nmap is an open source utility for security auditing and network
discovery. Many network admins also use it for networks inventory and
monitoring host or service uptime. It uses raw IP packets in novel ways to
determine what hosts are available on the network.
Answer:
The answer is reflective DNS attack
Explanation:
Reflective DNS Attack is used in many distributed DDoS attacks to knock down an internet pipe. The attack is divided in two stages: first the attacker sends lots of requests to one or more legitimate DNS servers while using spoofed source IP of the target person, and then, in the second stage, the DNS server receiving the semi-legitimate requests replies to the spoofed IP, thereby unknowingly lauching an attack on the target computer with responses to requests never sent by the victim.