1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
densk [106]
3 years ago
9

What does Old Man Warner most likely represent?

English
1 answer:
Zielflug [23.3K]3 years ago
5 0

Answer:

Old Values and Unchanged traditions

Explanation:

You might be interested in
Whats the answer giving brainliest please help:)
agasfer [191]

Answer:

D.

Explanation:

3 0
3 years ago
Read 2 more answers
which sentence is not an example of an effective thesis for an essay comparing two texts about neclear power in the united state
notsponge [240]
What are the sentences ?


One good one might be
“(claim) because (reason 1) (reason 2) (reason 3)” (if you want, you can add more reasons. Each reason is one body paragraph)
7 0
3 years ago
What is your favorite gadget ?
mote1985 [20]

Answer:

computer is my favourite gadget

6 0
3 years ago
Read 2 more answers
Thanks to a project called After Dark which uses robots to broadcast gallery tours via a web feed people from around the world h
AnnyKZ [126]

Answer:

False. The real name of the project is "Tate After Dark".

Explanation:

The "Tate After Dark" is a project that aims to allow individuals who do not have access to London's Tate Britain art gallery to view the arch of the place in their homes, however this visit is made in the dark. This is because the project consists of allowing robots from cameras at different angylos from 5 pm (London time) to circulate in the gallery filming the works of art and transmitting them through a website, where users can watch the transmissions. This project was a very promising initiative and aimed to reduce the electrification of art.

5 0
2 years ago
Information flow is a useful mechanism that can enforce a variety of security policies that are hard to describe in simple acces
I am Lyosha [343]

Answer / Explanation

For proper clarity, we redefine information flow as the navigation of data between humans and systems.

A proper and well secured mode of movement of information or data flow information flow is a critical factor when considering the performance of a process, decision making and in communications. The following are common types of information flow.

It should also be noted that the advantages of an information flow process can not be over emphasized.

Referring back to the question where we are being asked to describe how information flow serve as a building block to curb attacks can also point back to some of its advantages.

(1) Buffer Overflow attack: This can be described as an abnormal behaviour where a program while writing data or transferring data to a buffer exceeds the buffer's boundary and overwrites to adjacent memory locations which may result in abnormal program behavior including memory access errors, incorrect results, and crashes.  We should also understand that buffers are allotted areas of memory set aside to hold data, often while moving it from one section of a program to another, or between programs. Thus, information flow helps to curb the buffer overflow attach by setting a boundary limit in the process of transfer of communication between the program and the buffer therefor casing a stoppage in the overwrite process of a buffer overflow.

(2)  This can be likened to the page catch attack or Directory Traversal Attacks  where an attacker is are able to traverse out of the current directory into parent directories usually by supplying a series of “../” (dot dot slashes). Sometimes it is possible to back out of the root directory of the Web server and traverse into other directories on the file system. Typically, directory traversal attacks allow the attacker to access or overwrite files that are not intended to be accessible. Now to link the attack, it should be noted that the attacker tries to overwrite the buffer therefore intentionally creating a loophole in the program. Thus, by implementing the information flow, we can also curb this.

(3) This can be likened to the aforementioned process. If passwords are accidentally stored in a location where it is accessible to everyone, then it posses a risk of it being hacked or the password being changed. However, to prevent this, we can simply make use of the clear catch or clear buffer catch process, this way, we are sure of the security of the transfer of data which also streamlines it down to one of the functionality of the information flow process.

3 0
3 years ago
Other questions:
  • The curtains trembled gently as the cool breeze whispered through the open window and the pattering rain set a soft rhythm. Her
    10·2 answers
  • 1. What type of document was the “Gospel of Wealth?” Underline the best answer.
    6·2 answers
  • what is fortas's opinion about the notion that free speech can cause controversy? a. that free speech has led us to war too may
    14·1 answer
  • What can a reader infer about Iroquois culture from
    8·1 answer
  • Including facts in an essay
    15·1 answer
  • ......is your desire to make an effort
    10·1 answer
  • 15.2
    10·2 answers
  • The study of word origins and changes in languages over time is called
    11·1 answer
  • What is the main problem stated in this excerpt?
    7·1 answer
  • Describe why you agree or disagree with the teachers being replaced by computers.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!