1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phantasy [73]
3 years ago
12

10.

Computers and Technology
1 answer:
vredina [299]3 years ago
3 0

Answer:

192.37.48.98 is Class C

You might be interested in
In the context of social bookmarking, what does tagging allow you to do?
tatyana61 [14]

Social bookmarking is a way for people to store, organize, search, and manage “bookmarks” of web pages. Users save links to web pages that they like or want to share, using a social bookmarking site to store these links. These bookmarks are usually public, and can be viewed by other members of the site where they are stored. Examples of social bookmarking sites include del.icio.us  and digg.com .

 

Most social bookmark services are organized by users applying “tags” or keywords to content on a Web site. This means that other users can view bookmarks that are associated with a chosen tag, and see information about the number of users who have bookmarked them. In many cases, users can also comment or vote on bookmarked items.

 

Social bookmarking is also interchangeably sometimes referred to as folksonomy, collaborative tagging, social classification, social indexing, and social tagging. “Folksonomy” is a combination of the words folk and taxonomy, hence a folksonomy is a taxonomy generated by a person or group of people

4 0
3 years ago
Read 2 more answers
Give big-O estimate for the number of operations (multiplication or addition) used in the following algorithm segment (ignore co
Novay_Z [31]
<span>'m pretty sure the big O is actually O(log n) Not really a proof but anyway. If you write out the values before each iteration of the loop you get. L - iteration number L i t 1 1 0 2 1 2 3 3 6 4 9 18 5 27 54 6 81 162 So if n was 80 it would take 6 iterations You can see i is growing like 3^(L-2) So if n was 1000 1000 = 3^(L-2) log(1000) [base 3] = L - 2 log(1000) [base 3] + 2 = L 8.287709822868152 = L and if you ceil the answer you get L = 9 and just to check with the table 6 81 162 7 243 486 8 729 1458 9 2187 ... The table isn't perfect but hopefully you get the main idea.</span>
6 0
4 years ago
Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identi
kvasek [131]

Answer:

B. Intrusion Detection Software (IDS)

Explanation:

An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS  product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.

3 0
3 years ago
What is a malicious actor essentially looking for when attempting a network attack?
ahrayia [7]

Answer:

information of personnel

Explanation:

4 0
3 years ago
Why is the lack of a sense of humor a serious limitation for AI?
sergejj [24]

Answer:

they arent made to Express emotion? can you be a little more specific with the question?

3 0
3 years ago
Other questions:
  • Why do scientists use computers to map El Nino?
    10·2 answers
  • Which term describes a protocol to manage a network able to configure out a network monitor activity and control devices
    14·1 answer
  • GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
    8·1 answer
  • 25 POINTS! Complete each sentence to describe the Excel interface.
    12·2 answers
  • In filmmaking, who is ultimately responsible for the creative process?
    15·1 answer
  • When reading words with a scanner object, a word is defined as ____?
    15·1 answer
  • 5. Describe the concept behind a digital signature and explain how it relates to cybersecurity by providing a hypothetical examp
    6·1 answer
  • What is 54663266326-737237232732773
    5·1 answer
  • What responds to both visual appeal and functional needs? (1 point) A.) applied art B.) performance art C.) fine art D.) visual
    14·1 answer
  • What is an example of using the internet of things (iot) to deliver innovative cloud-based solutions to customers?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!