Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.

Answers

Answer 1

Answer:

Vulnerability of.

Explanation:

In this scenario, your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a vulnerability of the network software.

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.


Related Questions

Which of the following is NOT a popular computer programming
language?
C++
Xero
C#
Java

Answers

Answer is Xero. All the other Languages are Popular and Widely Used.
Thank You!

The computer programming  language i.e. not popular is Xero.

The following are the popular computer programming  language:

C++C#Java

The computer programming  language is the language that is applying for writing the programs.

Therefore we can conclude that the computer programming  language i.e. not popular is Xero.

Learn more about the computer here: brainly.com/question/24504878

Create a Boolean function odd_number_digits(n) that returns True when a positive integer has an odd number of digits. (You may assume that I will not use a number greater than 1,000,000.) Then, use it to make a
function sum_odd_digits(n) that sums all the numbers from 0 to n that have an odd number of digits.

Answers

Answer:

Following are the code to this question:

import java.util.*;//import package for user input

public class Main//defining class main

{

   public static boolean odd_number_digits(int n)//defining boolean method odd_number_digits

   {

       if(n>0 && n%2!=0)//defining if block that check value is positive and odd number

       {

       return true;//return value true

       }

       else//defining else block

       {

           return false;//return false value

       }

   }

   public static void  sum_odd_digits(int n)//defining a method sum_odd_digits

   {

       int sum=0,i;//defining integer variable

       for(i=0;i<=n;i++)//defining for loop

       {

           if(i%2!=0)//defining if block for odd number

           {

               sum=sum+i;//add odd number

           }

       }

      System.out.print(sum);//use print method to print sum value

   }

public static void main(String[] args) //defining main method

   {

       Scanner ox=new Scanner(System.in);//creating Scanner object

       int n= ox.nextInt();//defining integer variable for input value

       System.out.print(odd_number_digits(n)+ "\n");//use print method to call method

       System.out.println("Sum of odd numbers: ");//print message

       sum_odd_digits(n);//calling method

   }

}

Output:

please find the attachment.

Explanation:

In the above code, two methods "odd_number_digits and sum_odd_digits" are defined in which the first method return type is boolean because it will true or false value, and the second method returns the sum of odd numbers.

In the "odd_number_digits" method,  an integer variable passes as an argument and inside the method, if block is used that check value is a positive and odd number then it will return a true value.

In the "sum_odd_digits" method, it accepts an integer parameter "n", and define integer variable "sum" inside the method, which uses the for loop, inside the loop if block is used that counts odd numbers and adds its in sum and print its value.

Assignment 1 silly sentences

Answers

Answer:

Sally sells sea shells by the sea shore

Explanation:

How do you begin typing in a table cell?

A. Click within a cell and begin typing.

B. Highlight the table and begin typing.

C. Click on the Convert to Text button in the Layout ribbon.

D. Right-click and select Text Direction.

Answers

Its Option A - Click Within a Cell and begin typing.
Thank you!

To begin typing in a table cell, click within a cell and begin typing. The correct option is A.

What is a table cell?

A table cell is a subset of a chart table that is used to store information or data. Cells are organized both horizontally and vertically.

Each cell contains information about the combination of row and column headings with which it is collinear.

Text, numbers, and a variety of other elements can be included in table cells. Tables were originally used only to display numbers, but they are now useful for a wide variety of tasks.

To begin typing text into a cell, simply select a cell and start typing. To select text that is already inside a cell, place the insertion point within the cell.

In either mode, you can use the arrow keys to navigate around the table, making it simple to enter text into any cell.

Thus, the correct option is A.

For more details regarding a table cell, visit:

https://brainly.com/question/8059827

#SPJ5

Complete the statement below with the correct term.

A single-mode
uses a single ray of light, called a mode, to transmit data.

Answers

Answer:

Its Fiber

Explanation:

Trust me

Answer:

Data transfer through the core using a single light ray (the ray is also called a mode).

The core diameter is around 10 microns.

At distances up to 3 km, single mode delivers data rates up to 10 Gbps.

Cable lengths can extend a great distance. Or FIBER

Explanation:

hope this helps

why is makyra a loser??​

Answers

Because she doesn’t have any friends :-(

Answer:

She dumbbbbbbbbbbbbbbbbbbbbbb

Explanation: Her mom watched too much spongebob while pregnant

A furniture rentingstore rents severaltypes of furnituretocustomers.It charges a minimum fee for the first month. The store charges an additional fee every monthin excess of the first month. There is amaximum charge forany givenyear. Write a program that calculates and prints the chargefor a furniturerental.

Answers

Incomplete question. Attached is an image of the full question.

Explanation:

The best program to use is MS Excel. By using the Summation formula MS excel we can derive the difference in sales for the two years.

Which symbol is at the beginning and end of a multiline comment block?

Answers

The beginning of a block comment or a multi-line comment is marked by the symbol /* and the symbol */ marks its end.

C# The video game machine at your local arcade output coupons according to how well you play the game. You can redeem 10 coupons for a candy bar or 3 coupons for a gumball. You prefer candy bars to gumballs. Write a program that defines a variable initially assigned to the number of coupons you win. Next, the program should output how many candy bars and gumballs you can get if you spend all of your coupons on candy bars first, and any remaining coupons on gumballs.

Answers

Answer:

#include<iostream>

using namespace std;

/* main is a function without a parameters which returns an int value*/

int main( )

{

/* declare int data type for numeric values initialize candyBar and gumBall */

int coupons, cabdyBr=10,gumall=3;

int candyBarAmount,gumBallAmount,remainder;

/* cout is used to show the message to user cin to read user input from keyboard and sets the value to coupon */

cout<<"Enter the number of coupons"\t";

cin>>coupons;

/* First check coupons with cabdyBar */

if (coupons >= candyBar)

{

candyBarAmount=coupons/candyBar;

remainder=coupons-(candyBarAmount*10);

}

else

{

candyBarAmount=0;

}

/* check remaining value with gumBall */

if (remainder<<candyBar && remainder>=gumBall)

{

gumBallAmount=remainder/gumball;

}

else

{

gumBallAmount=0;

}

/* show thw required output to the user */

cout<<"The number of Candy bars is "<< candyBarAmount <<endl;

cout<<"The number of gumballs is "<<gumballAmount <<endl;

/* The program ends and return 0 as the functions value */

return 0;

}

OUTPUT

Enter the number of coupons: 23

The number of candy bars = 2

The number of gumballs = 1

For what purpose are high-level programming languages used for

1. Give control over the hardware to execute tasks quickly

2. Provide code that controls the computers hardware

3. Translate low-level programming languages into machine code

4. Write programs for general applications

Answers

Answer:

To speed up the compiler during run time

Explanation:

The primary reason for networking standards is to: Group of answer choices simplify cost accounting for networks ensure that hardware and software produced by different vendors can work together make it more difficult to develop hardware and software that link different networks ensure that all network components of a particular network can be provided by only one vendor lock customers into buying network components from one vendor

Answers

Answer:

ensure that hardware and software produced by different vendors can work together.

Explanation:

Networking standards can be defined as a set of rules and requirements for data communication which are necessary for the inter-operation of network devices (hardware) and software application processes.

Hence, the primary reason for networking standards is to ensure that hardware and software produced by different vendors can work together. This ultimately implies that, networking standards makes it possible for various vendors and manufacturers to develop or produce networks that avail users the ability and opportunity to share informations and communicate with one another easily.

Some examples of organizations responsible for creating networking standards are;

1. International Telecommunications Union— Telecommunications (ITU-T).

2. International Organization for Standardization (ISO).

3. American National Standards Institute (ANSI).

Additionally, the generally accepted standards for networking are; HTML, HTTP, IMAP, POP, SNMP, SMTP, TCP etc.

ASP PLZ Study the diagram of the geologic time scale.
Which method is most likely used to identify what happened before the start of the Paleozoic era?

1) Scientists study fossils from the Jurassic period.
2) Scientists observe index fossil records of the Mesozoic era.
3) Scientists examine fossil evidence during the Precambrian time.
4) Scientists explore the emergence of mammals and humans in the Cenozoic era.

Answers

The answer is definitely number 2

Answer:

C. Scientists examine fossil evidence during the Precambrian time.

Explanation:

Discuss the different types of user-friendly interfaces and the types of users who typically use each.

Answers

Answer:

1. Natural Language Interface- Telephone users

2. Menu Driven Interface- Automated Teller machine users.

3. Graphic User Interface- Computer users

4. Form-based interface- Website visitors

5. Command-line interface- Advanced users of computers

Explanation:

User interface refers to the hardware and software features in a computer system which makes it easier for the operators to relate with the system. Some of them include;

1. Natural Language Interface- This software feature allows the user to send oral instructions to the computer system.  Telephone users experience this when they give oral commands to their phones.

2. Menu Driven Interface- Contains buttons and a touch screen feature that allows users to enter commands in a menu. Automated teller machines used by bank customers are menu-driven interfaces.

3. Graphic User Interphase- Involves the use of the cursor to draw images using graphic icons. Graphic designers can use this to create images.

4. Form-based Interface- Basically contains fields with boxes and menus that would need to be completed. For example, job seekers have to complete fields and boxes before they submit a job application form online.

5. Command-line interface- Is characterized by basic commands which are to be entered by the user to the computer. Advanced users of computes use this feature.

Match each task with the features necessary to complete the task

Answers

Is there supposed to be an image?

>>> from hog import *
>>> test_dice = make_test_dice(4, 6, 1)
>>> test_dice()______
>>> test_dice() # Second call
______
>>> test_dice() # Third call______
>>> test_dice() # Fourth call

Answers

Answer:

This Python code is an implementation of an anonymous function like a lambda function in other function.

Explanation:

The function 'make_test_dice' with the arguments 4, 6 and 1, returns a lambda function to the test_dice variable.

The test_dice is called with parenthesis to run the lambda function. This implementation is used to hide a parameter in a calculation or process.

_________ attacks are becoming less common in modern operating systems.
a. Denial of service
b. SYN flood
c. Buffer overflow
d. None of the above

Answers

Answer:

c. Buffer overflow

Explanation:

In Computer programming, buffer can be defined as an area of memory set aside specially and specifically for holding data or informations.

A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is known as buffer overflow. This ultimately implies that, buffer overflow is the process of exceeding the storage capacity of a memory buffer with data, beyond the amount it is designed to hold and therefore overwrites any adjacent memory locations.

Buffer overflow attacks are becoming less common in modern operating systems because the modern operating system usually leaves a space between buffers and randomize the layout of memory through call mapping, as well as through the use of runtime protection.

Write a program to compute answers to some basic geometry formulas. The program prompts the user to input a length (in centimeters) specified as a floating point value. The program then echoes the input and computes areas of squares and circles and the volume of a cube. For the squares, you will assume that the input length value is the length of a side. For the circles, this same value becomes the diameter. Use the meter value input to calculate the results in square (or cubic) meters and then print the answers in square (or cubic) meters.

Answers

Answer:

import math

l = float(input("Enter length in cm: "))

l = l / 100;

print("Entered length is " + str(l) + " meters")

area_square = l * l

print("Area of square is " + str(area_square))

area_circle =  math.pi * l/2 * l/2

print("Area of circle is " + str(area_circle))

volume_cube =  l * l * l

print("Volume of cube is " + str(volume_cube))

Explanation:

*The code is in Python

Ask the user to enter the length in cm

Convert the length to meters and print it

Calculate the area of the square and print it (Since length is equal to a side, the area is length * length)

Calculate the area of the circle and print it (Since length is equal to the diameter, you need to divide it by two to get the radius. The area is pi * length/2 * length/2)

Calculate the volume of the cube and print it (Since length is equal to a side, the volume is length * length * length)

Help meeeee - Improved Pet App


Try out the improved version of the pet app that gives the user information about pet stores close by, which uses new sources of input. Determine the information that the app gets from each source of input.


User


Phone Sensors


Internet








Answers

Answer:

Did you do it? Can you give me the answers please‍♀️

Explanation:

Pleaseeeeeeeeeeeeeeeeeeeeeeeeeeeee

What benefits does the Domain Name System (DNS) provide? Check all that apply.
Network Address Translation (NAT)
Ease of address memorization
Assigning Internet Protocol (IP) addresses
Easy mapping to a new Internet Protocol (IP) address

Answers

Answer:

Option C (Assigning Internet Protocol (IP) addresses) is the correct choice.

Explanation:

DNS is a centralized process for resolving as well as continuing to give IP addresses for something like a specified domain name, a method that allows you to search a site via your web browsers whenever you tab or switch on any web server (Internet Explorer, chrome, respectively.).This helps everyone to still have throughput mostly on the network although one of the databases becomes offline for maintenance.

All other options are not relevant to the situation in question. It is the right answer to all of the above.

Answer:the TCP

Explanation:

How is a Creative Commons license different from a regular copyright? As a reminder, in the warm-up we saw the this scenario: ----------------------------------------------------------------------------------------------------------------------- Imagine you were using some of our pixelation tools to create an image and you posted it online for your friends to see - but, a week later you find out someone took that image and put it on a T-shirt that they’re selling for $10 each. -------------------------------------------------------------------------------------------------------------------- Now that we understand Copyright, what would need to change in order for the scenario from the warm-up to be okay?

Answers

Explanation:

You need to change the whole thing and do it differently.. And register it.

The thing that'll need to be changed in order for the scenario from the warm-up to be okay is to create a creative common license which will  give room for people to be able to use my work and sell items that have my work on them.

In this case, the creative commons license enables one to share copyrighted work easily. It should be noted that intense protections are put on a work when the work is copyrighted.

With the creative common, a person can allow others use their work as long as the person abide to rules.

In conclusion, creative common allows one have control of one's work.

Read related link on:

https://brainly.com/question/

Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that are applicable.

require the network administrator or computer support technician to manage the system from a client workstation that has the right tools installed on it
work on networks that include using Windows operating systems as well as Mac OS, NetWare, or UNIX
are designed for very large networks and have strong multitasking capabilities
provide a graphical user interface that makes it easier for network administrators to learn the system
use wizards and setup devices as the user operating system, making it easier to set up network features

Answers

Answer:

The answers are -

work on networks that include using Windows operating systems as well as Mac OS, NetWare, or UNIX

provide a graphical user interface that makes it easier for network administrators to learn the system

use wizards and setup devices as the user operating system, making it easier to set up network features

Explanation:

Windows Server operating systems are a popular choice for a network because they work on networks that include using Windows operating systems as well as Mac OS, NetWare, or UNIX, provide a graphical user interface that makes it easier for network administrators to learn the system. The correct options are B and D.

What is operating system?

An operating system (OS) is the program that controls all other application programs in a computer after being installed into the system first by a boot program.

Through a specified application program interface, the application programs seek services from the operating system (API).

The main job of an operating system (OS) is to control files and directories.

The management of files on a computer is the responsibility of the operating system. File creation, opening, shutting, and deletion all fall under this category.

Because they run on networks that use Windows operating systems as well as Mac OS, NetWare, or UNIX, Windows Server operating systems are a common choice for a network.

They also offer a graphical user interface that makes it easier for users to navigate

Thus, the correct options are B and D.

For more details regarding operating system, visit:

https://brainly.com/question/6689423

#SPJ2

Name 3 examples of operating system software that are not Windows based.

Answers

Ubuntu, Linux, and Mint

which of the following terms best describes the product development process?

Answers

Answer:

D - Scientific investigation aims to design and implement an experiment to learn new information, whereas technological development aims to design a product to solve a problem.

what is the color of red?

Answers

Answer:

red

Explanation:

orange and red

Answer: Red

Explanation: The reason why it's red is because of how we see colors through our eyes.

what is ovoviviparous? ​

Answers

Answer:

o·vo·vi·vip·a·rous

Explanation:

(of an animal) producing young by means of eggs which are hatched within the body of the parent, as in some snakes.

Which of the following best defines Monte Carlo simulation?a. It is a tool for building statistical models that characterize relationships among a dependent variable and one or more independent variables.b. It is a collection of techniques that seek to group or segment a collection of objects into subsets.c. It is the process of selecting values of decision variables that minimize or maximize some quantity of interest.d. It is the process of generating random values for uncertain inputs in a model and computing the output variables of interest.

Answers

Answer:

d. It is the process of generating random values for uncertain inputs in a model and computing the output variables of interest.

Explanation:

Monte Carlo simulation is the process of generating random values for uncertain inputs in a model and computing the output variables of interest. It is a type of computational algorithm which is used to predict the probability of various outcomes based on repeated random samples or variables. It is used for better decisions making by providing information about the impact of a risk and for forecasting models.

Tomi is testing all of the links on her web page by clicking on each one in a browser. What type of testing is this considered?
Accessibility testing
Broken link testing
Mobile testing
Readability testing

Answers

Answer:

Broken Link testing.

Explanation:

Took the test and did research.

Answer:

Broken link testing

Explanation:

Broken link testing is when you test all of your hyperlinks in a browser window. You can do this by clicking each hyperlink to see if it works. This will ensure the best possible user experience.

Chunking is a good strategy for completing large assignments because it makes the work
O less boring.
more thorough.
less difficult
O more manageable.

Answers

I think it would be the fourth answer choice.

Answer:

D. more manageable

Explanation:

it wouldn't make the work less boring, wont make work less difficult and and it wont help u get more through quicker

What is considered to be the core of the Unix operating system ?

Answers

Answer:

My lips

Explanation:

Just kidding what is that?

Read the following code:

x = currentAge
print(x + 20)

What value will this code calculate?

Select one:
a. Age in 20 years
b. Age 20 years ago
c. Age at 20 years old
d. Age in the year 2020

Answers

Answer:

The answer is "A) Age in 20 years"

Explanation:

Assuming currentAge is declared and is an integer, you are adding 20 to your current age which means it will print your age in 20 years.

Its Option A - Age in 20 Years.
Thank You!
Other Questions
h(x) = x2 + 1 k(x) = x 2 (h k)(3) = In which region did indigenous people live in a forest-rich environment and develop complex systems of government VousiainstGrade 7 Baseline Writing PromptWriting PromptThere are numerous places for tourists to explore at home and abroad. Alaskaand Africa are two popular destinations for vacations.Write an essay in which you take a position stating if Alaska or Africa would bebetter for an adventurous tourist to visit. Remember to use textual evidencefrom all three passages you read to support your claim.Manage your time carefully so that you can. read the passages plan your essay write your essay revise and edit your essayBe sure to. include a claim address counterclaims use evidence from multiple sources and avoid overly relying on one sourceYour response should be in the form of a multi-paragraph essay.HTML EditoreB7uA- A - I E17 x' x, Eve C. Q VDT TT 12ptParagraph The economic system of communist countries is most closely related to which of the following Priya starts with $50 in her bank account. She then deposits $20 each week for 12 weeks.How many weeks does it take her to have $250 in her bank account?O 15 weeksO 4.6 weeksO 10 weeks O 5.4 weeks Brainliest WILL BE MARKED I NEED HELP MATH DON'T GET IT Looking at these two quotes from Of Plymouth Plantation, what can the reader infer about the Pilgrims who came over on the Mayflower? But it pleased God before they came half seas over, to smit this young man with a grievous disease, of which he died in a desperate manner, and so was himself the first that was thrown overboard (3). Being thus arrived in a good harbor, and brought safe to land, they fell upon their knees and blessed the God of Heaven who had brought them over the vast and furious ocean, and delivered them from all the perils and miseries thereof, again to set their feet on the firm and stable earth, their proper element (5). Question 3 options: The pilgrims were atheists. The pilgrims were glad to get to shore. The pilgrims laughed at the first man to die on the ship. The pilgrims viewed God as an all-powerful being who could direct the course of the lives of men. Please help!!! What continent is at 80 degrees south and 0 degrees longitude? what mountains are responsible for no snow in bangladesh? examples of alliteration in boewulf WHOEVER GETS IT RIGHT GETS BRAINLIEST AND 15 POINTSwhy did people stop living as nomadic hunter-gatherersA. the Neolithic Revolution takes placeB. People begin hunting and gathering foodC. Societies develop advanced potteryD. Rivers Around The world begin to floodI KNOW ITS NOT C. E varies directly with G. When G is 6, E is 10. Find the value of G when E is 18. A recycling center must find a way to separate all of the aluminum cans from those made of nickel or iron. What would be a reliable, efficient way to separate them? Item 12Item 12 During October, a firm had the following transactions involving revenue and expenses. Paid $1,275 for rent for October Provided services for $2,900 in cash Paid $280 for the October telephone service Provided services for $2,050 on credit Paid salaries of $1,750 to employees Paid $380 for the monthly office cleaning service Calculate the net income or net loss for the period? The film Armageddon is what type of allusion?A. HistoricalB. Popular cultureC. ReligiousD. Mythological Miss bird can make 8 sculptures in 6 months. If she prepared 12 sculptures, how much time would she take 60 and 108 The GCF IS Your friend, Jamie, rolled a number cube and got the number 5. On his next turn, he says he wont be able to roll another 5 because he is only expected to roll a 5 once every six rolls. Is your friend correct? Explain your answer. What are the values of 7s in 6,778 Help me out yo! I will mark u brainlist pls help me out!!