1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inysia [295]
3 years ago
15

Please help!!

Computers and Technology
1 answer:
Margarita [4]3 years ago
6 0

Answer:

<h2>Server</h2>

Explanation:

<h3>i hope its help you</h3>
You might be interested in
One example of how psychological research can be used to control harmful behavior would be __________. A. fooling individuals th
Sati [7]

The results of a psychological research can be used for malignant purposes, such as fooling individuals through their emotions, using propaganda to change beliefs, and manipulating others through the media.

But it can also be used for good – which is what the question is asking. It is clear that from the available options, only (D) improving communication and relationships are an example of how psychological research is used for good.

8 0
3 years ago
Read 2 more answers
A student should be most cautious using a web address ending in
Inessa [10]

Answer:

It is .com because all the others are school-safe. And .com is snatch-able.

Explanation:

4 0
3 years ago
PLEASE ILL GIVE BRAINLIEST IMMEDIATELY
leva [86]

Answer:

AI

Explanation:

The answer is Artificial intelligence.

4 0
3 years ago
Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the publi
vesna_86 [32]

In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

<h3>What is a person in the middle attack?</h3>

A man-in-the-middle (MiTM) attack is  known to be a form of a type of cyber attack where the attacker is known to often and secretly intercepts and pass messages that occurs between two parties who think they are communicating directly with one another.

Hence, In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

Se full question below

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key.

Which type of hacking attack is Amber perpetrating?

a. A denial-of-service attack

b. A man-in-the-middle attack

c. A drive-by attack

d. A malware attack

Learn more about hacking attack from

brainly.com/question/7065536

#SPJ1

4 0
2 years ago
If a stop-and-wait protocol is used, what is the fraction of time, in seconds, that the sender is busy sending bits into the cha
olganol [36]

Answer:

This question is incomplete, here is the complete question;

If a stop-and-wait protocol is used, what is the fraction of time, in seconds, that the sender is busy sending bits into the channel (the utilization), given that the round-trip-time (RTT) for a router is 20ms when sending 2000 Byte packets ( a byte is 8 bits) at 500Mega bits per second (Mbps)? Answer to the nearest tenth of a microsecond. Recall that the formula for utilization U is L/R / (L/R + RTT). Be careful of your units. Provide the answer in microseconds with one decimal place. Do not label your answer with the units, just provide the number .

Explanation:

The Answer to the question is given with proper step by step solution.

Given that : the round-trip-time (RTT in abbreviation) = 20ms = 0.02 micro seconds

L = 2000

Byte = 2000*8

bits = 16000 bits

R = 500Mbps = 500*106 bps

Now,calculate L/R = 16000 / 500*106

= 32 / 106

= 32 micro seconds

The Utilization (U) = fraction when the time sender is busy sending

= (L/R) / (L/R + RTT)

= (32) / (32 + 0.02)

= 32 / 32.02

= 0.99937539 seconds

= 999375.39 micro seconds

= 999375.4 (nearest tenth)

5 0
3 years ago
Other questions:
  • Using Karnaugh maps, simplify the following Boolean function:
    14·1 answer
  • The first step to changing lanes is
    8·2 answers
  • Write a program that displays a menu allowing the user to select air water, or steel. After the user has made a selection, the n
    10·1 answer
  • The incompatibilities in speed between the various devices and the CPU make I/O synchronization difficult, especially if there a
    6·1 answer
  • Which of the following is a possible disadvantage of recursion? Question 10 options: Recursive solutions can be less efficient t
    8·1 answer
  • The visitor's age is stored in the variable age, the day of the week is stored in a variable day, and the price in dollars is st
    8·1 answer
  • 14. Which of the following is NOT likely to be one of the future development gaming industry?
    7·1 answer
  • Choose the term that describes each step of the cycle.
    13·1 answer
  • The primary source of help for technical problems with BC Online (computer settings, password, etc.) is:
    14·1 answer
  • Explain why you would use the soft on/off jumper when working on ATX system
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!