1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
poizon [28]
3 years ago
12

An intruder monitors an admin's unsecure connection to a server and finds some required data, like a cookie file, that legitimat

ely establishes a session with a web server. What type of attack can the intruder perform with the cookie file?
Computers and Technology
1 answer:
yKpoI14uk [10]3 years ago
7 0
A cookie replay attack
You might be interested in
1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
Tom [10]

Answer:

See explaination

Explanation:

Cache can be referred to as a hardware or software component that stores data so that future requests for that data can be served faster; these stored data in a cache might be the result of an earlier computation or a copy of data stored elsewhere.

Please kindly check attachment for step by step solution.

8 0
3 years ago
Which statement best describes desktop publishing?
Naddik [55]

Answer:

the process of designing and laying out printed material

Explanation:

The other answers were wrong. Option A is correct

4 0
3 years ago
Briefly explain the benefits and consequences of technology. //PLEASE ANSWER//
Wittaler [7]

Answer:

advantages and disadvantages of technology

Explanation:

Advantages of technology

First, the evolution of technology is beneficial to humans for several reasons. At the medical level, technology can help treat more sick people and consequently save many lives and combat very harmful viruses and bacteria.

The invention of the computer was a very important point. Communication is thus enhanced, and companies can communicate more easily with foreign countries. Research is also simplified.

For companies, progress in implementing strategic technology trends is helping them save time and therefore, money. Exchanges are faster especially with the internet. Sales and purchases are now facilitated and possible worldwide. This allows businesses to buy raw materials with discounts or at reduced prices. Similarly, global tourism has grown.

>See also: Technology is revolutionising the property industry

Technology has also increased the productivity of almost every industry in the world. Thanks to technology, we can even pay with bitcoins instead of using banks. The digital coin has been such a game changing factor, that many realised that this is the right time to open a bitcoin demo account.

When observed more closely, new things are discovered every day. Let’s take for instance when radio waves were discovered, radio broadcasts followed suit almost immediately. The same applies to the television and electricity. If no one had discovered that electricity could be generated, then the entertainment industry wouldn’t be at it’s current stage of development.

Technology improves daily lives; allowing to move physical storage units to virtual storage banks and more. Scientists of the time are also able to send astronauts to the moon thanks to technology.

>See also: How digital technology is transforming internal communication

In the modern industrial world, machines carry out most of the agricultural and industrial work and as a result, workers produce much more goods than a century ago and work less. They have more time to exercise and work in safer environments.

Disadvantages and risks of technology

On the other hand, the evolution of modern technology has disadvantages, for example, dependence on new technology. Man no longer needs to think. Even if the calculator is a good invention, man no longer makes mental calculation and no longer works his memory. The decline of human capital implies an increase in unemployment. In some areas, devices can replace the human mind.

The use of technology certainly needs rule and new laws. For example internet use is an individual freedom. However, the invention of the atomic bomb cannot be an individual freedom. In fact, regulations are difficult to implement when these technologies are introduced – such as regulation surrounding the impending arrival of autonomous vehicles.

Finally, as most technological discoveries aim to reduce human effort, it would imply that more work is done by machines. This equates to less work for people: the human is becoming ever so obsolete by the day, as processes become automated and jobs are made redundant.

3 0
3 years ago
Write the name of the tab, the command group, and the icon that you need to use to justify
Dafna11 [192]

Answer:

Tab: Home Tab

Command Group: Paragraph

Icon: Justify Icon

<em>The icon has no name; rather it is represented by 4 horizontal lines that are aligned on both edges</em>

<em />

Explanation:

To answer this question, I'll make use of the following attachment

<em>Where</em>

<em>1- represents the home tab</em>

<em>2 - represents the paragraph</em>

<em>3 - represents the justify icon</em>

<em />

3 0
4 years ago
An app builder has created a report for sales people to view records from the custom object, some users have complained that the
a_sh-v [17]

Answer:

Check sharing rules

Check organization-wide defaults

Check the user s profile for object settings

Explanation:

There is a need for some people to see the total transparency of the records that are meant to be shared with a select group of people. There are certain things that can be done for this. The first one is that the sharing rules should be checked. To whom are the details shared with. The next one is the filters that are used.

These can be reported and changed accordingly. Lastly, the whole organization’s defaults can be checked. This is something that can be done when the previous methods that were done did not work that well. Once some changes are done, the people can check if they already work and if the records can be viewed.

6 0
4 years ago
Other questions:
  • What advantage does having ultraviolet vision give bees?
    10·2 answers
  • I need help with this​
    7·1 answer
  • What is the default method of referencing cells in formulas?
    6·1 answer
  • -..
    11·1 answer
  • Which is a characteristic of multimedia systems?
    7·1 answer
  • Lucy wants to add some notes in her research paper that provide additional information to the reader. She also wants to display
    14·1 answer
  • Why must a mobile application be easily customized and personalized?
    14·2 answers
  • What method do phishing and spoofing scammers use
    12·1 answer
  • Do you all like IXL?
    8·1 answer
  • The process of recording and reporting the financial data for a business is known as:
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!