Select the correct answer.
Kelly is trying to access her company fashion website through the wireless network. Even after repeated attempts, she is unable to access the
website. What must have probably happened?
ОА.
ОВ.
The network is under a war driving attack.
The network is under an eavesdropping attack.
The network is under a denial of service attack.
Ос.
OD
The network is under a frame injection attack.
The network is under a domain name cracking attack.
ОЕ.
Reset
Next
1 Edmentum. All rights reserved.

Answers

Answer 1
The network is under a denial of service attack

Related Questions

Subtraction + Decision and Loop
This is a twist on the previous exercise that will help you review loops and decision structures. You will again ask the user to enter two numbers. However, you will ALWAYS subtract the smaller number from the larger number to ensure that you never get a negative number for an answer. You do this by checking the numbers and switching them if they are not in the right order (larger then smaller). All of this checking, switching, subtracting, and output of the answer should occur in a function.
((( THIS WAS THE PREVIOUS EXERCISE
Function Basics - Arguments and Parameters
This is another easy exercise to test your knowledge of the fundamentals. In main(), ask the user to enter two integers. Pass those two integers to a function that will subtract one number from another. This function must also output the answer to the user.
Output:
Enter two integers (separated by a space) and this program will subtract them: [user enters: 5 7]
5 - 7 = -2
Notes and Hints:
1) From now on, you must use a function prototype for all programs that use functions. Don't expect me to ask for it in each exercise. )))
Finally, ask the user if they would like to run the program again. By now, you should know exactly what type of loop to use.
Output:
Enter two integers (separated by a space) and this program will subtract the smaller from the larger: [user enters: 7 5]
7 - 5 = 2
Do you want to run this program again? [user enters: y]
Enter two integers (separated by a space) and this program will subtract the smaller from the larger: [user enters: 5 7]
7 - 5 = 2
Do you want to run this program again? [user enters: n]
Notes and Hints:
1) As always, make sure you accept an upper or lower case 'Y'

Answers

Answer:

In Python:

def subsmall(num1,num2):

   if num1 > num2:

       return num1 - num2

   else:

       return num2 - num1

   

repeat = True

while(repeat):

   num = input("Enter two integers: ")

   nums = num.split(" ")

   print(subsmall(int(nums[0]),int(nums[1])))

   runagain = input("Run program again? ").lower()

   if  runagain == "y":

       repeat=True

   else:

       repeat = False

Explanation:

The function begins here

def subsmall(num1,num2):

This subtracts num2 from num1 if num2 is smaller

   if num1 > num2:

       return num1 - num2

If otherwise, subtract num1 from num2

   else:

       return num2 - num1

The main begins here

This initialiazes a boolean variable to true    

repeat = True

This loop is repeated until the boolean variable is false

while(repeat):

Prompt to enter two integers

   num = input("Enter two integers: ")

Split the string by space

   nums = num.split(" ")

This passes the two integers to the function and also prints the differences

   print(subsmall(int(nums[0]),int(nums[1])))

Prompt to run the program again

   runagain = input("Run program again? ").lower()

If input is Y or y, the loop repeats

   if  runagain == "y":

       repeat=True

The program ends if otherwise

   else:

       repeat = False

What is the data type of the following expression?
5/1

a) bool

b) str

c) float

d) int

Answers

Answer:

What do u mean by 5/1... And Sry for disturbing

D Integer

Since 5/1 = 5 that’s no float. Maybe if it was 5/1.0 then it would be 5.0 which is a float. So int is the answer.

there is a structure called employee that holds information like employee code, name, date of joining. Write a program to create an array of the structure and enter some data into it. Then ask the user to enter current date. Display the names of those employees whose service is 15 or more than 15 years according to the given current date.

Answers

Answer:

The program in C is as follows:

#include<stdio.h>

#include<conio.h>

struct employee{

char empname[50]; int empcode, day,mon,yr;

}employees[30];

int main(){

int total;

printf("Numbers of Employees : "); scanf("%d",&total);

for(int kt=0;kt<total;kt++){

printf("Employee Code : "); scanf("%d",&employees[kt].empcode);

printf("Name: "); scanf("%s",employees[kt].empname);

printf("Date of Joining [dd mm yyyy]: "); scanf("%d%d%d",&employees[kt].day,&employees[kt].mon,&employees[kt].yr); }

int year;

printf("\nCurrent Date [Year only]: "); scanf("%d", &year);

printf("Code\t\t\t Name\t\t\t Date of Joining\n");

for(int kt=0;kt<total;kt++)

if((year - employees[kt].yr) >= 15)

printf("%d\t\t\t %s\t\t\t %d/%d/%d\n",employees[kt].empcode,employees[kt].empname, employees[kt].day,employees[kt].mon,employees[kt].yr);

}

Explanation:

See attachment for explanation where comments were used to explain some lines

what is the structure of an HTML document. pls answer I don't want any links pls explain too  ​

Answers

Answer:

What is a HTML document?

It's a text document saved with the extension . html or . htm that contains texts and some tags written between "< >" which give the instructions needed to configure the web page. These tags are fixed and definite and will be currently explained in the tutorials when applied and needed.

What is HTML structure?

An HTML Document is mainly divided into two parts: HEAD: This contains the information about the HTML document. For Example, Title of the page, version of HTML, Meta Data etc. BODY: This contains everything you want to display on the Web Page.

What is the basic structure of HTML template?

An HTML document has two* main parts: head. The head element contains title and meta data of a web document.

How is an HTML document structured?

An HTML 4 document is composed of three parts: a line containing HTML version information, a declarative header section (delimited by the HEAD element), a body, which contains the document's actual content.

Explanation :

HELLOOOO ARMY! HOPE U HAVE A WONDERFUL DAY! MAY NAMJESUS BLESS U !

Stream life goes on and dynamite we are about o reach 1B!

And trend these hashtags:

#Westankings

#scammys

AND FINALLY , SARANGAE BOROHAEEE!!!

Explanation:

An HTML Document is mainly divided into two parts: HEAD: This contains the information about the HTML document. For Example, Title of the page, version of HTML, Meta Data etc. BODY: This contains everything you want to display on the Web Page.

function _one(array)
Create a JavaScript function that meets the following requirements:




Please give your function a descriptive name
o ( _one is not acceptable, and is only displayed here for illustration purposes)
Receives an array of integers as an argument
The function removes all duplicates (if they exist) from the array and returns it to the caller.
Assume the input array parameter will have at least one element in it.
Examples :
_one([33])
➔ [33]
_one([33, 33, 1, 4])
➔ [1, 4]
_one([33, 33, 1, 4, 1]) ➔ [4]​

Answers

Answer:

function removeRepeaters(list){

   var goodList = [], badList = {}, used = {}, n;

   // ensure that the argument is indeed an array

   if(!Array.isArray(list)){

        throw "removeRepeaters: Expecting one argument of type Array";

   }

   // loop through the array and take note of any duplicates

   for(n in list) used[list[n]] == true ? badList[list[n]] = true : used[list[n]] = true;

   // now loop through again, and assemble a list of non-duplicates

   for(n in list) if(badList[list[n]] == undefined) goodList[] = list[n];

   return goodList;

}

Explanation:

I assume you're familiar with trinary operators, but just in case, that's what's happening in this first for loop:

for(n in list) used[list[n]] == true ? badList[list[n]] = true : used[list[n]] = true;

this is the same as saying:

for(n in list){

   if(used[list[n]] == true){

       badList[list[n]] = true;

   } else {

       used[list[n]] = true;

   }

}

This loop flags all of the values in the list that are duplicated.  Note that both "badList" and "used" are declared as objects instead of arrays.  This allows us to compare keys in them with an == operator, even if they're not defined, making it a convenient way to flag things.

Note that I haven't tested it, so I may have overlooked something.  I suggest testing it before handing it in.

what are the main technologies that have contributed to the growth and commercialization of the internet .​

Answers

Answer:

Explanation: The main forces that led to the commercialization of the internet are its demand and the importance of the Internet.

TCP and IP technologies allowed for the connection of many networks to form on large network. This tech used packets and provided error-recovery mechanisms. Hence many small networks were combined to form the internet.

There are several technology of the Internet and the World Wide Web. The hand of projects in computer networking, mostly funded by the federal government.

The projects made communications protocols that shows the format of network messages, prototype networks, and application programs such as browsers.

The advent of computer devices and telephone network was the underlying physical infrastructure upon which the Internet was built. The commercialization and exponential growth of the internet started in the early 1990s.

It was due to high meetup of technologies, including the development of personal computers with graphical operating systems, widespread availability of internet connection services, the removal of the restriction of commercial use on NSFnet, etc.

Conclusively, These happenings combined to give the commercial push for an easy way to share and access information.

Learn more from

https://brainly.com/question/22600646

Create a class called Jack that extends Leo. This class must have the following behaviors/methods. You must use the inheritance to reuse the methods from the parent classes. Solution without using the inheritance will get zero points. re-writting the code that already exists will get zero credit. A call to the methods in the parent classes must be donemethod description
method1 display "Jack 1 Leo 1 "
method2 displays "Don 2 Jack 2"
method3 displays "Jack 3 Leo 3 Don 2 "
toString displays" Jack 3 Leo 1"

Answers

Answer:

public class Leo{

public String method1(){

return "Jack 1 Leo 1";

}

public String method2(){

return "Don 2 Jack 2";

}

public String method3(){

return "Jack 3 Leo 3 Don 2";

}

public String toString(){

return "Jack 3 Leo 1"

}

}

public class Jack extends Leo{

}

Explanation:

Leo is the parent class and jack inherits all of its attributes from Leo

So when you call the following code in the main method:

Jack j = new Jack();

System.out.println(j.method1);

it should print Jack 1 Leo 1

This is because the program first checks if method 1 exists in the Jack class

Because it doesn't exist it then goes to the parent class which is Leo.

And in the Leo class method1 displays "Jack 1 Leo 1 "

So it prints that

Information Technology




Answers

Answer:

whats the question

Explanation:

Answer:   The study or use of systems. Especially computers and telecommunications for storing, retrieving, and sending information.

Explanation: I don't know what you're asking buddy. If you're asking for the definition then there you go. Next time add the question :)

Kyla, a business analyst uses test scripts while testing an application before it is released to the client. Why do business analysts use test scripts?
A.
to perform acceptance testing
B.
to code functions correctly
C.
to write a test plan
D.
to create a test environment
E.
to review and update test cases

Answers

Answer:

D. to create a test environment

Explanation:

After releasing it will be "production"

The function below takes two parameters: a string parameter: csv_string and an integer index. This string parameter will hold a comma-separated collection of integers: ‘111, 22,3333,4’. Complete the function to return the indexth value (counting from zero) from the comma-separated values as an integer. For example, your code should return 3333 (not ‘3333 *) if the example string is provided with an index value of 2. Hints you should consider using the split() method and the int() function. print.py 1 – def get_nth_int_from_CSV(CSV_string, index): Show transcribed image text The function below takes two parameters: a string parameter: csv_string and an integer index. This string parameter will hold a comma-separated collection of integers: ‘111, 22,3333,4’. Complete the function to return the indexth value (counting from zero) from the comma-separated values as an integer. For example, your code should return 3333 (not ‘3333 *) if the example string is provided with an index value of 2. Hints you should consider using the split() method and the int() function. print.py 1 – def get_nth_int_from_CSV(CSV_string, index):

Answers

Answer:

The complete function is as follows:

def get_nth_int_from_CSV(CSV_string, index):

   splitstring = CSV_string.split(",")

   print(int(splitstring[index]))

Explanation:

This defines the function

def get_nth_int_from_CSV(CSV_string, index):

This splits the string by comma (,)

   splitstring = CSV_string.split(",")

This gets the string at the index position, converts it to an integer and print the converted integer

   print(int(splitstring[index]))

how many pieces can be connected on to a to an SPS​

Answers

Answer:

i dont know

Explanation:

Which type of software is for sale directly to consumers in stores and online?
A. demo software
B. OEM software
C. public software
D. retail software

Answers

Answer: its b my guy

Explanation:

Which wizard is a tool provided by Access that is used to scan the table's structure for duplicate?

O Query Design Wizard
O Table Design Wizard
O Table Analyzer Wizard
O Performance Analyzer Wizard

Answers

Answer:

The tool provided by access that’s used to scan the table’s structure for duplicate is “Table Analyzer Wizard”.

____ occurs when weaker companies are eliminated and the strong companies survive

Answers

Answer:

sounds like a monopoly but is there a word bank?

Explanation:

"the exclusive possession or control of the supply of or trade in a commodity or service."-Oxford dictionary

Which term best describes these lines?

count = 0

loop through list

if “basketball” is found

add one to count

output count

Python 3 code
selection program
pseudocode
sequential program

Answers

The term best describing these lines is called pseudocode. Essentially a “text-based” detail (algorithmic) design tool.

Assume that the final grade for a course is determined based on this scale - A: 900 points, B: 800-899 points, C: 700-799 points, D: 600-699 points, F: 599 or fewer points. Write a function named get_letter_grade() that takes the number of points the student has earned as a parameter. It should return a string containing (only) the letter grade the student will receive.

Answers

Answer:

In Python:

def get_letter_grade(points):

   if points>=900:

       grade ="A"

   elif points>=800 and points < 900:

       grade ="B"

   elif points>=700 and points < 800:

       grade ="C"

   elif points>=600 and points < 700:

       grade ="D"

   else:

       grade = "F"

   return grade

Explanation:

This defines the function

def get_letter_grade(points):

The following if-else if conditions check the score to determine the appropriate grade

   if points>=900:

       grade ="A"

   elif points>=800 and points < 900:

       grade ="B"

   elif points>=700 and points < 800:

       grade ="C"

   elif points>=600 and points < 700:

       grade ="D"

   else:

       grade = "F"

This returns the grade

   return grade

Consider we have n pointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we swizzle all pointers automatically, we can perform the swizzling in half the time it would take to swizzle each separately. If the probability that a pointer in main memory will be followed at least once is p, for what values of p is it more efficient to swizzle automatically than on demand?

Answers

Answer:Considerwehavenpointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we swizzle all pointers automatically, we can perform the swizzling in half the time it would take to swizzle each separately. If the probability that a pointer in main memory will be followed at least once is p, for what values of p is it more efficient to swizzle automatically than on demand?

Explanation:

The Zoom feature allows you to either increase or decrease the size of your document on the screen,
Please select the best answer from the choices provided
True or false

Answers

The answer will be (True) hope this helps!


Have a wonderful day!

PLEASE QUICK IM TIMED.
Write a program that assigns the value 14 to a variable. Then print out the type of the variable. What will the output of the program be?

Answers

This is for Python

Code:

variable = 14

print(type(variable))

Output:

<class 'int'>

You should always keep a backup of data stored in the cloud because the cloud provider does not automatically do this True or false???

Answers

Answer:

False

Explanation:

what is Windows software​

Answers

Answer:

window software is a platform made by windows that is written in JavaScript and visual basic ,c

Explanation:

window software is a platform made by windows that is written in JavaScript and visual basic ,c .

Microsoft Windows, commonly referred to as Windows, is a group of several proprietary graphical operating system families, all of which are developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry

please help me on this coding assignment i need to finish it today :)
Assume that a, b, and c are variables of type int. Consider the following three conditions.

I.
(a == b) && (a == c) && (b == c)
II.
(a == b) || (a == c) || (b == c)
III.
((a - b) * (a – c) * (b – c)) == 0
Which of the conditions above evaluates to true given that at least two among the variables a, b, and c are equal?

II and III
I only
I and II
III only

Answers

Answer:

II and III

Explanation:

(i) would only evaluate to true if all variables are equal.

(ii) evaluates to true if one or more of the clauses is true.

(iii) if two variables are equal, at least one factor will evaluate to 0, making the result of the multiplication zero and thus the expression true.

Should you let your computer scan email attachments before opening them? Why?

Answers

Jjsjskskiakskskakksjakakoa

no you shouldn't

Explanation:

you should just block them and report them

Amelia is home alone, and her tablet will not turn on. How can she approach solving this problem?

Throw the tablet away because it's junk.
Try plugging the tablet in to see if it needs to charge.
Call her Dad and ask him to come home early.
Watch a movie instead.

Answers

Answer:

plug it in. sjjssjjsnsjsjsjsjs

Answer:

Try plugging the tablet in to see if it needs to charge.

Explanation: it’s the most logical approach that won’t cause any unnecessary promblems. If it doesn’t turn on then she can try something else.

Which entry by the user will cause the program to halt with an error statement?
#Get a guess from the user and update the number of guesses.
guess = input("Guess an integer from 1 to 10:")
guess = int(guess)

A two
B 100
C 3
D -1

Answers

Answer:

A

Explanation:

convert 128 GB into KB​

Answers

Answer:

1,073,741,274  KB

Explanation:

Use an unit convertor or an calculator.

please answer in python language​

Answers

print("Choose an option: ")
print(" [1] $1,000,000")
print(" [2] 0.01 x2/day")
answer = int(input("> "))

if answer == 1:
print("Here's your $1,000,000")
elif answer == 2:
initial = .1 # initial investment of a penny
final = ( initial * 2**30 ) - initial
print('A penny will be $' + format(final, '.2f'), 'in 30 days.')
else:
print(" - invalid option.. exiting")
exit(0)

The set of three integer values for the lengths of the sides of a right triangle is called a Pythagorean triple. These three sides must satisfy the relationship that the sum of the two sides is equal to the square of the hypotenuse. Find all integer Pythagorean triples for side1, side2, and the hypotenuse, all no larger than 500. Use a triple-nested for loop that tries all possibilities. This program is an example of brute force computing. You will learn in more advanced computer science courses that there are many interesting problems for which there is no algorithmic approach other than using sheer brute force. This program does not need any input from the user. Write at least one bool function that takes the 3 sides of the triangle and returns true or false based on if it is a right triangle or not.

Answers

Answer:

In Python:

def  Pythagorean_triple(hyp,side1,side2):

   if hyp**2 == side1**2 + side2*2:

       return True

   else:

       return False

               

print("Hypotenuse\tSide 1\t Side 2\t Return Value")

for i in range(1,501):

   for j in range(1,501):

       for k in range(1,501):

           print(str(i)+"\t"+str(j)+"\t"+str(k)+"\t"+str(Pythagorean_triple(i,j,k)))

Explanation:

This defines the function

def  Pythagorean_triple(hyp,side1,side2):

This checks for pythagorean triple

   if hyp**2 == side1**2 + side2*2:

Returns True, if true

       return True

   else:

Returns False, if otherwise

       return False

               

The main method begins

This prints the header

print("Hypotenuse\tSide 1\t Side 2\t Return Value")

The following is a triple-nested loop [Each of the loop is from 1 to 500]

for i in range(1,501): -->The hypotenuse

   for j in range(1,501): -->Side 1

       for k in range(1,501):-->Side 2

This calls the function and prints the required output i.e. the sides of the triangle and True or False

           print(str(i)+"\t"+str(j)+"\t"+str(k)+"\t"+str(Pythagorean_triple(i,j,k)))

Use the provided MS-Excel template to note entries for each .pcap file in Wireshark that are of interest, as well as your assessment of potential vulnerabilities. Such vulnerabilities might be due to plaintext data exchange between two machines, which might be exploitable by session hijacking, man-in-the-middle attacks, exploitation of commands/user accounts/passwords, or capture and replay of the data packets later to control devices or access remote connections.

Answers

Answer:You should note entries for each PCAP file in Wireshark that are of interest as from ENCM 369 at ... file in Wireshark that are of interest, as well as your assessment of potential vulnerabilities. Such vulnerabilities might be due to plaintext data exchange between two machines, which might be exploitable by session hijacking, ...

Explanation:

An electronic tool that allows information to be input processed and output? A, operating system B.motherboard C.cpu D.computer

Answers

Answer:

This would be considered a CPU in that case.

Explanation:

A CPU does basic arithmetic, logic, controlling, input AND the output. It would be stated in the program's instructions.

Other Questions
WILL MARK BRAINLIEST After selling 15 lemonades,Jessica made $5. Afterselling 42 lemonades, shemade $18.50.Graph the equation using each form (standard form, point-slope form, and slope-intercept form) Which statements are true about the fully simplified product of (b minus 2 c)(negative 3 b + c)? Select two options. The simplified product has 2 terms. The simplified product has 4 terms. The simplified product has a degree of 2. The simplified product has a degree of 4. The simplified product, in standard form, has exactly 2 negative terms. 1. Data yang paling sering muncul disebut ... * A.Mean B.Median C.Modus D.Grafik 2. Nilai tengah dari data disebut ... * A.Mean B.Median C.Modus D.Grafik 3. Waktu yang dibutuhkan 10 siswa untuk berlari mengelilingi lapangan dalam satuan menit adalah 4, 6, 5, 7, 8, 4, 5, 8, 6, 6. Modus data tersebut adalah.... * A.5 B.6 C.7 D.8 4. SAYA MENGERJAKAN UJIAN DENGAN JUJUR. Modus huruf pada kalimat di atas adalah . * A.E B.A C.D D.J Which of the following represents a concave lens?A. -diB. +diC. -fD. +f *PLEASE HELP*The equations of lines K,P,and M are given below K: x+2y=6 P: 6x + 3y=12 M: -x+ 2y=10 which statement is true*ANSWERS ARE IN THE PICTURE* Janet Foster bought a computer and printer at Computerland. The printer had a $880 list price with a $100 trade discount and 2/10, n/30 terms. The computer had a $4,000 list price with a 25% trade discount but no cash discount. On the computer, Computerland offered Janet the choice of (1) paying $155 per month for 17 months with the 18th payment paying the remainder of the balance or (2) paying 7% interest for 18 months in equal payments.a. Assume Janet could borrow the money for the printer at 7% to take advantage of the cash discount. How much would Janet save? (Use 360 days a year. Round your answer to the nearest cent.) On January 1, 2021, the Montgomery Company agreed to purchase a building by making six payments. The first three are to be $37,000 each, and will be paid on December 31, 2021, 2022, and 2023. The last three are to be $52,000 each and will be paid on December 31, 2024, 2025, and 2026. Montgomery borrowed other money at a 11% annual rate. (FV of $1, PV of $1, FVA of $1, PVA of $1, FVAD of $1 and PVAD of $1) (Use appropriate factor(s) from the tables provided.) Required: 1. At what amount should Montgomery record the note payable and corresponding cost of the building on January 1, 2021 In 3-4 sentences, describe two influences from Dr. Goddard's childhood that motivated him to study rocket science. 3455/72answer pls..... What is the theme of fahrenheit 451? Please write a theme paragraph. PLease help I'll give you brainliest! 1) Why did some people think it strange that the French people accepted Napoleon as their new Emperor? some help would be appreciated thankssssss meaning of epidemic virus pandemic A soda machine representative convinces you to lease a machine for $250/month. You discover that you are selling $1,000 in soda per month at a margin of 25%. Are you making money on the machine 4x - 9y = -233x - 7y = -17 Show your work plz. PLEASE HELP WILL MARK BRAINLEST!!What are some inadvertent effects of technology? HELP!!! How has Jonas's community taken the idea of sameness to the next level? In the decade following World War II, the federal government put in place programs to help people do which of the following? (3 points) become homeownersemploy new immigrantsmove to inner-city neighborhoodsstart businesses in foreign countries Tell me in at least 5 sentences what the story is about.what is the song meaning aboutRemember the TimeMichael Jackson