which program monitors the computer by looking for known trouble makers as well as suspicious behavior​

Answers

Answer 1

Answer:

i think spyware because spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers.

Explanation:


Related Questions

Which of the following is an input device on a toaster?
O the heating element
the tray
O the start button
the electrical outlet

Answers

The electrical outlet
The start button the electrical oulet

2. Use the correct membership operator to check if "banana" is not present in the fruits object
fruits = ["mango", "orange") if
"banana"
fruits:
print("Yes, apple is a fruit!")​

Answers

Answer:

if not "banana" in fruits:

Explanation:

Given the code segment

Required

Fill in the missing blank

Literally, membership operators are used to check the membership of an item in lists, tuples, strings, etc.

The given code segment defines a list named fruits with two items.

To check if "banana" is not in fruit, we make use of the following statement:

if not "banana" in fruits:

Which means if banana is not in fruit

Having done that, the complete program would be:

fruits = ["mango", "orange"]

if not "banana" in fruits:

    print("Yes, apple is a fruit!")

An IT suspects that an unauthorized device is connected to a wireless network. This is a result of pastry sharing on a device brought from home. What is put in place to stop such activity.

1- Media Access Control Filtering

2- Channel Overlap

3-WiFi Protected Access 2

4- collision Domain

Answers

Answer:

3. WiFi Protected Access 2

Explanation:

Given that Wi-Fi Protected Access 2 often referred to as WAP 2 is a form of computer security or privacy measure to ensure that Wireless networks are furnished with powerful security of data network access control.

Hence, when a user employed or utilize WPA2. It gives such a user a high degree of maximum certainty of controlling the users that can have access to his wireless network.

Hence, in this case, what is put in place to stop such activity is Wi-Fi Protected Access 2

Consider the use of 1000-bit frames on a 1-Mbps satellite channel with a 270-ms delay. What is the maximum link utilization for,
a. Stop-and-wait flow control?
b. Continuous flow control with a window size of 7?
c. Continuous flow control with a window size of 127?

Answers

i feel as if it would be B.

1. Do our shared social experiences lead us to think

communication is a cure-all?

Answers

Answer:

Yes

Explanation:

Shared social illustrations have always shown that any problem of any kind can be sorted by communication.

Eg : Whenever societies face any problem - eg recession, the competent people related to that area of problem (representing different interests of various groups also) sit & discuss (ie communicate in detail) about it.  

These communications have seen to be solution to all problems world has faced.

Yes,  our shared social experiences lead us to think communication is a cure-all.

This is because, helps the individual in shaping their mental and emotional health for the rest of their life.

With shared social experiences , there would be communication among people and it serves as a cure-all.

Therefore, shared social experiences lead us to think communication is a cure-all.

Learn more about social experiences at:

https://brainly.com/question/24452126

what is suitable equipment to meet customer needs from
1 stand alone pcs
2 networked pcs
3 servers
4 network equipment
5 operating system
6 application software

Answers

uh i think it’s uh carrot

Switched backbone networks:_____.a. always use a ring topology.b. require much more management that do routed backbone networks.c. use a star topology with one device, usually a switch.d. are the least common type of BN used in one building.e. switch the traffic based on layer 3 addresses.

Answers

Answer:

c

Explanation:

spongo  

Write an application named Hurricane that outputs a hurricane’s category based on the user’s input of the wind speed. Category 5 hurricanes have sustained winds of at least 157 miles per hour. The minimum sustained wind speeds for categories 4 through 1 are 130, 111, 96, and 74 miles per hour, respectively. Any storm with winds of less than 74 miles per hour is not a hurricane. If a storm falls into one of the hurricane categories, output This is a category # hurricane, with # replaced by the category number. If a storm is not a hurricane, output This is not a hurricane.

Answers

Answer:

def Hurricane(wind_speed):

   if wind_speed >= 157:

       print("Category 5 hurricane")

   elif wind_speed >= 130:

       print("Category 4 hurricane")

   elif wind_speed >= 111:

       print("Category 3 hurricane")

   elif wind_speed >= 96:

       print("Category 2 hurricane")

   elif wind_speed >= 74:

       print("Category 1 hurricane")

   else:

       print("Not a hurricane")

Hurricane(121)

Explanation:

The function "Hurricane" in the python code accepts only one argument which is the recorded speed of a hurricane. The nested if-statement evaluates the speed of the hurricane and output the appropriate category of the hurricane based on the speed.

which of the following file formats cannot be imported using Get & Transform

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In this question, the given options are:

A.) Access Data table  

B.)CVS  

C.)HTML  

D.)MP3

The correct option to this question is D- MP3.

Because all other options can be imported using the Get statement and can be further transformed into meaningful information. But MP3 can not be imported using the GET statement and for further Transformation.

As you know that the GET statement is used to get data from the file and do further processing and transformation.

How DNS service are to be deployed on the network (15 -30 words)

Answers

Each device connected to the Internet has a unique IP address which other machines use to find the device. DNS servers eliminate the need for humans to memorize IP addresses such as 192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as 2400:cb00:2048:1::c629:d7a2 (in IPv6).

Comment on the following 2 arrays. int *a1[8]; int *(a2[8]); a1 is pointer to an array; a2 is array of pointers a1 is pointer to an array; a2 is pointer to an array a1 is array of pointers; a2 is pointer to an array a1 is array of pointers; a2 is array of pointers

Answers

Answer:

The answer is "a1 and a2 is an array of pointers".

Explanation:

In this question, A collection of pointers refers to an array of elements where each pointer array element points to a data array element. In the above-given statement, the two-pointer type array "a1 and a2" is declared that holds the same size "8" elements in the array, and each element points towards the array's first element of the array, therefore, both a1 and a2 are pointer arrays.

Given that a computer required​ service, what is the probability that it was a​ laptop? Given that the computer required​ service, the probability that it was a laptop is nothing?

Answers

Complete Question:

A campus bookstore sells both types and in the last semester sold 56% laptops and 44% desktops. Reliability rates for the two types of machines are quite different, however. In the first year, 5% of desktops require service, while 15% of laptops have problems requiring service.

Given that a computer required service, what is the probability that it was a laptop?

Answer:

Probability = 0.084

Explanation:

Given

Laptops = 56%

Desktop = 44%

Service Required (Laptop) = 15%

Service Required (Desktop) = 5%

Required

Determine the probability that a selected computer is a laptop and it requires service.

The question tests our knowledge of probabilities using "and" condition.

What the question requires is that, we calculate the probability of selecting a LAPTOP that REQUIRES SERVICE

Note the capitalised words.

This will be calculated as follows:

Probability = P(Laptop) and P(Service Required (Laptop))

[Substitute values for P(Laptop) and P(Service Required (Laptop))]

Probability = 56% * 15%

[Convert to decimal]

Probability = 0.56 * 0.15

Probability = 0.084

Copy the formula from cell c5 to the range c6- c11

Answers

Answer:

Where is cell c5

Explanation:

/*this function represents
*what karel has to do
*/
function start() {
turnLeft();
buildTower();
turnRight();
if(frontIsClear()){
toMove();
}
while(noBallsPresent();
turnLeft();
buildTower();
}
if(frontIsBlocked()){
goBack();
}
}

/*This represents karel is
*putting down the balls for making the tower
*/
function buildTower(){
putBall();
move();
putBall();
move();
putBall();
}

function
move();
turnRight();
move();
move();
turnLeft();
move();
}

i need help finding the issues

Answers

anything

Explanation:

I know what to say this time

Answer:

turn right

Explanation:

i think sorry if it is wrong

PLS HELP I WILL MARK BRAINLIEST

Answers

Answer:

C

Explanation:

Animal cells each have a centrosome and lysosomes, whereas plant cells do not. Plant cells have a cell wall, chloroplasts and other specialized plastids, and a large central vacuole, and animal cells do not.

The long-run average cost curve is typically _______________________. a) downward-sloping at first but then b) upward-sloping upward-sloping at first but then c) downward-sloping always d) downward-sloping always upward-sloping

Answers

Answer:

A. downward-sloping at first but then upward-sloping

Explanation:

The long-run average cost curve is typical "downward-sloping at first but then upward-sloping." This can be shown as the long-run average cost curve is graphically represented in a U shape.

The reason is that the long-run average cost of production initially falls as a result of increase returns to scale as output is increased, however, at some stage beyond this certain this, the long-run average cost of production rises because of decreasing returns of scale.

Which items are placed at the end of a
document
O Header
O Footer
O Foot Note
O End note​

Answers

Answer:

End note, I think plz tell me if im wrong thank you

you should restrict access to your system both online and offline. Is it true or false​

Answers

Answer:

false

Explanation:

to keep personal information secure

Susan is taking a French class in college and has been asked to create a publication for her class. What feature can she
use to help her develop her publication in French?
Research
Grammar
Language
Spell Check

Answers

Answer:

Essayons

Explanation:

the answer is Language

(Decimal to binary) Write a recursive method that converts a decimal number into a binary number as a string. The method header is public static String dec2Bin(int value) Write a test program that prompts the user to enter a decimal number and displays its binary equivalent.

Answers

Answer and Explanation:

import java.util.Scanner;

public class convertToBinary {

public static String declToBin(int value){

if(value == 1){

return declToBin((value/2) + "" + (value%2);

}

else{

declToBin((value/2) + "" + (value%2);

}

}

public static void main(String args[]){

int number;

Scanner change = new Scanner(System.in);

System.out.print("Enter decimal value: ");

number = change.nextInt();

System.out.println(declToBin(number));

}

}

The recursive function declToBin(int value) keeps executing code until value==1. Recursive functions reduces lines of code and makes it more efficient.

Note: Decimal is number in base 10(denary). To convert a decimal number to base 2(binary), we keep dividing the decimal number entered by the user by 2 until the result is zero(when the number divided is one)

We use the Java programming language here. First we import the Scanner object(import.java.util.Scanner). We use the method nextint() from the object to convert the string value entered by the user to int value( because our declToBin function takes an int parameter).

Builder Software is used to create _____? answers: 3d digital art design for cameras audio special effects

Answers

Answer:

HTML website without inputting manual codes

Explanation:

A Builder Software in computer engineering or science is a general name of the software that is designed to give users the ability to build HTML websites without inputting the manual codes themselves. The software comes with tools that help to create the user interface without adding code.

Example of Builder Software is Squarespace, Wix, Dudamonile, Weebly, OnDevice, RedTim, etc.

Answer:

I think it's used to create 3-D digital art

Explanation:

What is a trojan horse in computer science?

Answers

Answer:A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program

Explanation:

Refer to the exhibit. What kind of NAT is configured on the ASA device?

Answers

Answer:

A network administrator has configured NAT on an ASA device

Explanation:

The project sponsor has asked Franz to hold a kickoff meeting for their project. What is the purpose of a
kickoff meeting?
Select an answer:
Introduce the team to the project, processes, and to one another.
Obtain approval for the team to start work on their assignments.
Provide an opportunity for the sponsor to talk about the project,
Obtain approval of the project plan.

Answers

Answer:

Introduce the team to the project

Explanation:

You never want to get ahead always start slown and easy for the team so none gets left behind also can i get brainliest

The purpose of the kickoff meeting is Introduce the team to the project, processes, and to one another.

The information regarding the kickoff meeting is as follows:

In this, the team members get to know each other.It helps team members to understand the objectives of the project.Also it permits the stakeholders for understanding the risk, assumptions, etc.

Learn more: brainly.com/question/17429689

Many believe that U.S. tax policy should provide a level playing field for traditional retail businesses, mail order companies, and online merchants. What form of ebusiness challenge is this statement referring to?
A. Adhering to taxation rules.
B. Ensuring consumer protection.
C. Identifying limited market segments.
D. Managing consumer relationships.

Answers

Answer:

A. Adhering to taxation rules.

Explanation:

This is because, when there is no level playing field for different segments of the business in terms of U.S tax policy, there will surely be challenges in "Adhering to taxation rules."

Given that the statement might imply that there are different rules applicable to different sectors of business, this will make it difficult for the different firms or players involved to follow the taxation rules.

Hence, stating that many believe that U.S. tax policy should provide a level playing field for traditional retail businesses, mail order companies, and online merchants, indicated that the e-business challenge is "Adhering to taxation rules."

write an essay about yourself based on the dimensions of ones personality​

Answers

I don’t think that we can answer this question, since it’s based on yourself.

Module 1 and 2 Coding Guided Notes Fill in your answers to each response as you read through the lesson pages in the coding course. Lesson 1.01: 1. Instructions for computers to solve a problem is known as _________. Computer ________ is how humans and machines talk to each other. 2. Learning to code or write a _________ allows for a solution to a problem.

Answers

Answer:

Code; code; program.

Explanation:

1. Instructions for computers to solve a problem is known as code. Computer code is how humans and machines talk to each other. Some examples of programming language used to write a code in instructing a computer for the execution of a task are python, Java, Javascript, ruby, c++, c# etc.

2. Learning to code or write a program allows for a solution to a problem.

Answer: 1st: code 2ed:code 3rd:program

Explanation: hope this help's :)

The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and _________ which involves trying all possible keys.

Answers

Answer:

Brute force

Explanation:

The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and brute force which involves trying all possible keys.

In brute force attacks there is the issue of using different keys and this is because the attacker is trying to guess the passwords used in the system in order to have it compromised.

Answer:

D.  

triple Data Encryption Standard (DES)

Explanation:

                                       Sincerely : Baby weeb

In the following code fragment, how many times is the count() method called as a function of the variable n? Use big-O notation, and explain briefly. for (int i = 0; i < 3; i++) { for (int j = 0; j < n; j++) { for (int k = 0; k < j; k++) { count(); } }

Answers

Answer:

The loop counts the count() function length of n-1 times with respect to n.

Explanation:

The first and outer loop counts for two times as the variable declared in the condition counts before the iteration is made. The same goes for the other for statements in the source code.

The n represents the number length of a range of numbers or iterables (like an array).

Write a sed command that will display all lines of the birthday file that do not contain the string March. What was the sed command?

Answers

Answer:

sed '/march/{d;}' birthdays.txt > result .txt

Explanation:

sed syntax is basically:

sed '/expression/{command;command;...;}' inputfile > outputfile

First, for the expression part, we use /march/ to match all lines containing that string. Then for the command part, we only use {d} command to delete every matching line found.The third part contains the input file to process, I have named it birthdays.txt, but it could have been any other file needed.Finally "> result .txt" makes the script output to be saved into a file named result.txt
Other Questions
name the segment in the scaled copy that corresponds to segment AD What can a character's use of persuasion reveal to a reader? answer plese plese plese plese If f(x) = 5x - 12, find f(x) when x= - 12Plz answer If you take a number, multiply it by 3, then add 2, you could represent that phrase with the function:y=3x + 2. How could you describe this function with words: y=(x+2)/7?* The diagram below shows two different forces acting on a cyclist riding a bicycle the total mass of the cyclist and the bicycle is 100.0 kg based on information what is the acceleration of the cyclist? PLEASE HELP!!!!! 1.) Line a passes through points (-2, 1) and (2, 9). Write an equation in slope intercept form that is parallel to line a. 40POINTS Help asap pleaseWhich of the following quotes does NOT use a metaphor?I have a dream that my four little children will one day live in a nation where they will not be judged by the color of their skin but by the content of their character.Four score and seven years ago our fathers brought forth on this continent, a new nation, conceived in Liberty, and dedicated to the proposition that all men are created equal.I have a dream that one day even the state of Mississippi, a state sweltering with the heat of injustice, sweltering with the heat of oppression, will be transformed into an oasis of freedom and justice.I have a dream that one day on the red hills of Georgia the sons of former slaves and the sons of former slave-owners will be able to sit down together at the table of brotherhood I need help with this A jogger runs north 6 km, 5 km east, and 4 km north again. Time is 1.9 hr. What is average velocity? please help on both of them:) Donnegan Company reported operating expenses of $325,000 for 2020. The following data were extracted from the companys financial records: 12/31/19 12/31/20 Prepaid Expenses $ 60,000 $69,000 Accrued Expenses 210,000 255,000 Accounts Payable 300,000 350,000 On a statement of cash flows for 2020, using the direct method, cash payments for operating expenses should be:___________. What's the slope of this line? Enter the answer as a fraction in simplest term in the box. Which of the following describes a long-term impact of the spread ofEuropean diseases throughout American Indian populations?A. Expanding political power for American Indians outside of NorthAmericaB. Rising levels of support for Western medicine among AmericanIndiansC. Increasing reliance on agriculture in American Indian societiesD. Escalating conflicts between displaced groups of AmericanIndians Thomas earns extra money babysitting. He charges 45.50 for 5 hours and 72.80 for 8 hours. How much will thomas charge for 3 hours. Yo___una crema solar Us or usYo__ en el aguaEntr or entr Which source would best enable students to read the feelings and thoughts of Mahatma Gandhi?personal letters written by Gandhia biography about Gandhinewspaper articles about Gandhia critique of letters written by Gandhi Help ASAP please! Which action led to end of the Old Regime and began the move todemocratic government?Select one:election of representatives to the Legislative Assemblyadoption of the Declaration of the Rights of Mandisbanding of the Revolutionary Tribunalcreation of the Directory Roger Bannister: The Barrier BreakerIntroduction How do you overcome obstacles that seem impossible? Sir Roger Bannister, the first man to break the four-minute-mile record, knew what it was like to break barriers.Learning a Passion Roger Bannister was born in Harrow, England, in 1929. Since his parents couldn't afford to send him to college, he worked to win scholarships to study medicine at Oxford. Bannister had two loves: studying medicine and running track. He worked hard to do well at both. Because of his studies, Bannister had less time for track practice than other athletes. Most athletes trained at least six days a week. Bannister trained only two to three times a week. In the 1952 Olympic Games, Bannister ran the 1500m race but finished fourth. Many said this was due to his lack of training. Bannister decided it was time to get serious. He focused on doing what everyone in the world thought was impossible. He wanted to break the four-minute-mile barrier.Setting a Goal No one in history had ever run a mile in less than four minutes, although several had tried. For decades, physicians believed that running a mile too fast would cause heart failure. Bannister knew he could set a new world record by working hard. Bannister believed that pushing himself beyond the pain would make him a winner. That is just what Bannister did on May 6, 1954, at Iffley Road Track in Oxford. On a cold, wet track, Roger Bannister broke the four-minute-mile barrier with a time of 3:59.4. Two other runners helped him set a fast pace. Then Bannister relied on his training to run the first three laps of the track in 3:01. During the final lap of the race against the clock, Bannister knew he could finish the race in less than 59 seconds. He broke away from the other runners and flew down the last two curves of the track at record speed. As he crossed the finish line, he collapsed into the arms of his friend Reverend Nicholas Stacey. Bannister was out of breath and out of energy, but he knew he had broken the world record. Bannister accomplished a great moment in history that day. After breaking the four-minute-mile barrier, Bannister competed in a few more races. He ran his personal record of 3:43.8 in the 1500m in the European Championship. That was Bannister's last race. In August of 1954, he retired at the age of 25 to focus on what he considered his true contribution to societyhis research in the field of neurology, the study of the nerves and the nervous system.Making a Difference In 1975, two decades after his feat, Roger Bannister was knighted by the Sports Council of England. He had done what no man thought was possible. However, Bannister knew his athletic glory was fleeting. He felt that his work as a neurologist was the real accomplishment of his life. For over 40 years, he worked in neurology, helping patients who suffered serious neurological disorders. To honor his work and dedication as a neurologist, St. Mary's Hospital in London named a lecture hall after Dr. Bannister. In the lecture hall, the famous stopwatch used to time Bannister's mile is on display. In July of 2012, Bannister was honored to be elected as one of the Olympic torchbearers. He carried the flame into the Oxford track stadium that was named for him. Of his neurology career and his track achievements, as the greatest runner ever, Bannister claims that working hard is the secret to his success.11Why does the author use chronological order to organize the passage? A. to place the events in Bannister's life in the order in which they happened B. to present Bannister's challenge of breaking a record and his solution for it C. to compare Bannister's achievements in running with his achievements in medicine D. to show how the events in Bannister's life affected his career in neurology which of the following file formats cannot be imported using Get & Transform?