1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xz_007 [3.2K]
3 years ago
15

If u reading this ,DO THAT WORK

Computers and Technology
1 answer:
Ivenika [448]3 years ago
7 0
I am.


Explanation


Characters
You might be interested in
I'm in middle school but when I singed in I accidentally put high school, how can I change that?
Pani-rosa [81]
Go to edit profile then go to preferences and select school level

8 0
3 years ago
Read 2 more answers
Who is a creator in the context of online photo sharing?
solniwko [45]
Image sharing, or photo sharing, is the publishing or transfer of a user's digital photos online. Image sharing websites offer services such as uploading, hosting, managing and sharing of photos (publicly or privately).[1] This function is provided through both websites and applications that facilitate the upload and display of images. The term can also be loosely applied to the use of online photo galleries that are set up and managed by individual users, including photoblogs. Sharing means that other users can view but not necessarily download images, and users can select different copyright options for their images.

While photoblogs tend only to display a chronological view of user-selected medium-sized photos, most photo sharing sites provide multiple views (such as thumbnailsand slideshows), the ability to classify photos into albums, and add annotations (such as captions or tags).

Desktop photo management applications may include their own photo-sharing features or integration with sites for uploading images to them. There are also desktop applications whose sole function is sharing images, generally using peer-to-peer networking. Basic image sharing functionality can be found in applications that allow you to email photos, for example by dragging and dropping them into pre-designed templates.

Photo sharing is not confined to the web and personal computers, but is also possible from portable devices such as camera phones, either directly or via MMS. Some cameras now come equipped with wireless networkingand similar sharing functionality themselves

photo-sharing website that helps people create an account this is answer


4 0
4 years ago
Read 2 more answers
Which sentence is correctly punctuated? WILL GIVE YU MONEY GIVE ME YOUR CASH APP PLS
Genrish500 [490]
The third one is best in me owns opinion
3 0
3 years ago
Read 2 more answers
Define a function GetVolume() that takes one integer parameter passed by reference as totalCups and two integer parameters as ga
Viefleur [7K]

The computer program that takes one integer parameter is illustrated below.

<h3>What is a computer program?</h3>

A computer program is a set of instructions in a programming language for a computer to execute. A computer program in its human-readable form is called source code.

The program is illustrated below:

#include<iostream>

using namespace std;

void ConvertVolume(int totalTablespoons, int &cups, int &tablespoons) {

   // compute the cups and tablespoons

   // as they are passed by reference,

   // the change will also reflect in the main function

   cups = totalTablespoons / 16;

   tablespoons = totalTablespoons % 16;

}

int main() {

   int usrCups;

   int usrTablespoons;

   int totalTablespoons;

   

   // user input

   cin>>totalTablespoons;

   

   // call the function

   ConvertVolume(totalTablespoons, usrCups, usrTablespoons);

   

   // print the output

   cout<<usrCups<<" cups and "<<usrTablespoons<<" tablespoons"<<endl;

   

   return 0;

Learn more about programs on:

brainly.com/question/26642771

#SPJ1

3 0
2 years ago
You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
DedPeter [7]

ICMPv6 is used by IPv6 nodes to report errors encountered in processing packets, and to perform other internet-layer functions, such as diagnostics.  An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests.

Explanation:

Issues that are of concern which could be a problem include :

Denial-of-Service Attacks  

  • ICMPv6 can be used to cause a denial of service (DoS) in a number of  ways, including simply sending excessive numbers of ICMPv6 packets to destinations in the site and sending error messages that disrupt  established communications by causing sessions to be dropped.

Probing

  • A major security consideration is preventing attackers from probing  the site to determine the topology and identify hosts that might be vulnerable to attack.  Carefully crafted but, often, malformed  messages can be used to provoke ICMPv6 responses from hosts thereby  informing attackers of potential targets for future attacks.  However, the very large address space of IPv6 makes probing a less effective weapon as compared with IPv4 . Redirection Attacks

Redirection Attacks

  • A redirection attack could be used by a malicious sender to perform  man-in-the-middle attacks or divert packets either to a malicious  monitor or to cause DoS by blackholing the packets.  These attacks would normally have to be carried out locally on a link using the Redirect message.  Administrators need to decide if the improvement  in efficiency from using Redirect messages is worth the risk of  malicious use.  Factors to consider include the physical security of   the link and the complexity of addressing on the link

Renumbering Attacks

  • Spurious Renumbering messages can lead to the disruption of a site.  Although Renumbering messages are required to be authenticated with  IPsec, so that it is difficult to carry out such attacks in practice,  they should not be allowed through a site boundary firewall.  On the  other hand, a site may employ multiple "layers" of firewalls.

Problems Resulting from ICMPv6 Transparency

  • Because some ICMPv6 error packets need to be passed through a  firewall in both directions, malicious users can potentially use  these messages to communicate between inside and outside, bypassing  administrative inspection.

Packet types or specific circumstances in which ICMPv6 traffic could compromise network security :

Ping sweep — A type of attack that uses ICMP echo request messages to enumerate live hosts on a network.

Ping flood — Utilized to launch a denial of service attack (DoS), where the attacker sends ICMP requests in a rapid succession without waiting for the targeted system to respond.

ICMP tunneling — A method used to establish a covert communication channel between remote systems, most times between a client and a proxy. All communications are sent via ICMP requests and replies

Forged ICMP redirects —  The attacker would send a ICMP redirect message, which informs a host of a direct path to a destination, to the victim that contains the IP addresses of the attacker’s system. This allows an attacker to compromise network traffic via a man-in-the-middle attack or cause a DoS.

8 0
3 years ago
Other questions:
  • Privacy concerns, financial information, security of your personal data has
    14·1 answer
  • What hex value is the standard indicator for jpeg graphics files?​?
    6·1 answer
  • Write an INSERT statement that adds this row to the Categories table: category_name: Brass Code the INSERT statement so MySQL au
    6·1 answer
  • What kind of a bug is 404 page not found
    10·2 answers
  • In addition to librarians, what other type of worker would you expect to find employed in a school or library
    10·2 answers
  • Which action should be done throughout the mail merge process
    14·2 answers
  • Advantages of python programming language
    10·1 answer
  • Discuss why it is important to know the history of social media​
    10·1 answer
  • 0.6 tenths of an hour would be how many minutes?
    9·2 answers
  • Which disipline involves creating computer networks
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!