The TCP/IP (Transmission Control Protocol/Internet Protocol) first gained traction in a "file transfer" case that was the basis for email among the researchers on ARPANET.
ARPANET, a network developed by the U.S. Department of Defense's Advanced Research Projects Agency (ARPA), researchers needed a way to share files and exchange information between different computers.
This led to the development of the File Transfer Protocol (FTP) utilized the TCP/IP protocols as the underlying foundation.
The implementation of TCP/IP and FTP allowed researchers on ARPANET to transfer files across the network, which eventually led to the creation of email.
Email initially started as a simple mechanism to leave messages for other users on shared computers.
Over time it evolved into a more sophisticated system leveraging TCP/IP for reliable data transmission and routing messages between different networked computers.
The "file transfer" case on ARPANET facilitated by TCP/IP laid the groundwork for the development of email among researchers.
For similar questions on TCP/IP
https://brainly.com/question/17387945
#SPJ11
20. Why do you think some organizations were slow to adopt a building-block approach to network design?
The building-block approach to network design involves breaking down a complex network into smaller, modular components or building blocks that can be combined to create the overall network design.
While this approach has many benefits such as scalability, flexibility, and ease of management, some organizations were slow to adopt it for the following reasons:
Resistance to change: Some organizations may be resistant to changing their existing network design practices, even if it means adopting a more efficient and effective approach. This resistance to change can be due to factors such as a lack of awareness about the benefits of the building-block approach or a fear of disruption during the transition.
Lack of technical expertise: The building-block approach requires a certain level of technical expertise to implement and manage the modular components. Some organizations may not have the necessary technical expertise in-house or may be hesitant to invest in training and development for their IT staff.
Cost considerations: The building-block approach may require a higher initial investment in infrastructure and hardware, as the network is designed using modular components. Some organizations may be hesitant to make this investment, especially if they have limited budgets or are looking to minimize expenses.
Legacy systems: Some organizations may have legacy systems or applications that are not compatible with the building-block approach. In such cases, it may be more challenging to adopt the modular approach or require significant modifications to existing systems.
Lack of standardization: The building-block approach requires standardization of network components and configuration. Some organizations may lack a standardized approach to network design, making it difficult to adopt a modular approach.
Overall, the building-block approach to network design has many benefits, but its adoption may require significant changes in organizational culture, technical expertise, investment in infrastructure and hardware, and standardization of network components. These factors may have contributed to some organizations being slow to adopt this approach.
Learn more about network here:
https://brainly.com/question/1167985
#SPJ11:
Explain why modern computers consist of multiple abstract levels and describe the main functions of each level
Modern computers must be quick, effective, and safe, which is why the system was introduced with several abstract layers. Abstract classes can always be used in multilevel inheritance.
Are two abstract methods allowed in a class?A class can only extend one abstract class in Java, but it can implement numerous interfaces (fully abstract classes). Java has a purpose for having this rule.
Can we use many abstract methods?The abstract keyword is used to make a class abstract. It may have 0 or more non-abstract and abstract methods. We must implement the abstract class's methods and extend it. It is not instantiable.
To know more about Abstract classes visit :-
https://brainly.com/question/13072603
#SPJ4
A quantum computer solves problems considered _____ for classic computers.
a.too easy
b.inefficient
c.too frivolous
d.impossible
Impossible, A quantum computer can solve problems that are impossible for classic computers.
What is quantum computer?
Quantum computers are devices that store data and carry out calculations using the principles of quantum physics. This can be very helpful for some tasks because they might perform them much better than our best supercomputers.
What is classical computer?
A computer that can be modeled by a deterministic Turing machine, one that is neither a quantum computer nor has access to any other kind of (as of yet undiscovered) mechanism for going beyond the boundaries of known computer science.
To know more about computer, check out:
https://brainly.com/question/24540334
#SPJ1
Replace the nulls values of the column salary with the mean salary.
When data is combined across lengthy time periods from various sources to address real-world issues, missing values are frequently present, and accurate machine learning modeling necessitates careful treatment of missing data.
What is Column salary?
One tactic is to impute the missing data. A wide range of algorithms, including simple interpolation (mean, median, mode), matrix factorization techniques like SVD, statistical models like Kalman filters, and deep learning techniques.
Machine learning models can learn from partial data with the aid of approaches like replacement or imputation for missing values. Mean, median, and mode are the three basic missing value imputation strategies.
The median is the middle number in a set of numbers sorted by size, the mode is the most prevalent numerical value for, and the mean is the average of all the values in a set.
Thus, When data is combined across lengthy time periods from various sources to address real-world issues, missing values are frequently present, and accurate machine learning modeling necessitates careful treatment of missing data.
Learn more about Data, refer to the link:
https://brainly.com/question/10980404
#SPJ4
Which parameter can be used with the ping command to send a constant stream of packets when using a Windows device?
a. -f
b. -p
c. /all
d. -g
e. -t
The correct response is (e) i.e. -t. When using a Windows device, the ping command can be used with the -t argument to deliver a continuous stream of packets.
The Packet InterNet Groper is the full name of PING. It is software used to evaluate the network communication between two devices, either as a network management system or as a utility. The main TCP/IP command used to assess connectivity, reachability, and name resolution is ping. This command shows Help information when used without any parameters. This command can be used to check the computer's IP address as well as its name. The reaction time of your connection, or how quickly your device receives a response after you send out a request, is known as latency.
Learn more about PING here:
https://brainly.com/question/29974328
#SPJ4
Which unknown factor affects prices in the financial markets?
Income taxes
Media speculation
Government policy
Trade regulations
Answer:
There are four major factors that cause both long-term trends and short-term fluctuations. These factors are government, international transactions, speculation and expectation and supply and demand.
Explanation:
Which of the following is not a main method for sending information from one computer to
another?
Electricity
Light
Molecules
Radio
Molecules are not the main method for sending information from one computer to another. Thus, option C is correct.
There are the multiple method of sending information that using the radio waves most commonly used now a days. A Wireless method of sending information using radio waves.
A wireless router has receives the signal as well as decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection. and sending information through radio waves involve two devices .One is receiver device and other is sending device.
Therefore, Molecules are not the main method for sending information from one computer to another. Thus, option C is correct.
Learn more about radio on:
https://brainly.com/question/29787337
#SPJ1
(Interest Calculator) The simple interest on a loan is calculated by the formula interest = principal * rate * days / 365;
The preceding formula assumes that rate is the annual interest rate, and therefore includes the division by 365 (days). Develop a program that will input principal, rate and days for several loans, and will calculate and display the simple interest for each loan, using the preceding formula. Here is a sample input/output dialog:
Enter loan principal (-1 to end): 1000.00 Enter interest rate: .1
Enter term of the loan in days: 365
The interest charge is $100.00
Enter loan principal (-1 to end): 1000.00 Enter interest rate: .08375
Enter term of the loan in days: 224
The interest charge is $51.40
Enter loan principal (-1 to end): -1
The program calculates and displays the simple interest in Python for several loans by taking input of principal, rate, and days, and using the formula interest = principal * rate * days / 365.
What is Python?
Python is a high-level, interpreted programming language that is widely used for various purposes such as web development, data analysis, machine learning, and artificial intelligence.
Here's the Python code to implement the interest calculator:
while True:
principal = float(input("Enter loan principal (-1 to end): "))
if principal == -1:
break
rate = float(input("Enter interest rate: "))
days = int(input("Enter term of the loan in days: "))
interest = principal * rate * days / 365
print("The interest charge is ${:.2f}".format(interest))
1) The program uses a while loop to repeatedly prompt the user for input until they enter -1 to end the program.
2) Inside the loop, the program uses input() to get the principal, interest rate, and loan term in days from the user, and stores them in variables.
3) The program then calculates the simple interest using the formula given in the problem statement: interest = principal * rate * days / 365.
4) Finally, the program uses print() to display the calculated interest to the user.
Sample output:
Enter loan principal (-1 to end): 1000.00
Enter interest rate: .1
Enter term of the loan in days: 365
The interest charge is $100.00
Enter loan principal (-1 to end): 1000.00
Enter interest rate: .08375
Enter term of the loan in days: 224
The interest charge is $51.40
Enter loan principal (-1 to end): -1
To know more about loans visit:
https://brainly.com/question/9471571
#SPJ1
Select all that apply.
select each step that needs to be completed to locate data.
use the find command.
click on the top of the appropriate column
use the sort command.
enter the text and click on the find or search button.
To locate data using these terms, follow these steps:
First, use the Find command, typically found in the Edit or Search menu, or by pressing Ctrl+F (Cmd+F on a Mac). Enter the text you are searching for and click on the Find or Search button. If you want to sort data, click on the top of the appropriate column to select it. Next, use the Sort command, usually located in the Data or Sort & Filter menu, to arrange the data in the desired order (ascending or descending).By completing these steps, you will efficiently locate and organize the data in your spreadsheet or document.
Learn more about sort data https://brainly.com/question/23824782
#SPJ11
Write a program that reads a list of scores separated by a space in one line and then assigns grades based on the following scheme:
The grade is A if score is >= best - 10.
The grade is B if score is >= best - 20. The grade is C if score is >= best - 30. The grade is D if score is >= best - 40. The grade is F otherwise.
Sample Run Enter scores: 40 55 70 58
Student 0 score is 40 and grade is C Student 1 score is 55 and grade is B Student 2 score is 70 and grade is A Student 3 score is 58 and grade is B
A Python program that reads a list of scores, assigns grades based on the given scheme, and prints the results. The `f` before the string allows us to embed expressions (like the variables `i`, `score`, and `grade`) within curly braces `{}`.
We start by reading the scores as a string from the user, using the `input()` function. We then split the string into a list of scores using the `split()` method, which splits the string at whitespace characters (spaces, tabs, etc.) by default. We convert each score to an integer using a list comprehension.
This program uses a function `assign_grade` to determine the grade based on the score and the best score. The main function reads the scores as input, converts them to integers, and finds the best score. It then iterates through the scores and uses the `assign_grade` function to find the grade for each student, and finally prints the results.
To know more about program visit:
https://brainly.com/question/11023419
#SPJ11
Fill in the Blank
Complete the code.
from random import randint
# Generate and save a random number.
correct = randint(1,10)
# Initialize the variable to count the number of guesses.
attempts = 0
# Create a loop that continues until the user guesses the number.
keepGoing = True
_______________ keepGoing:
# Get a guess from the user and update the number of guesses.
guess = input("Guess an integer from 1 to 10: ")
guess = int(guess)
attempts = attempts + 1
# Compare the guess to the correct answer.
if guess == correct:
# Tell the user the guess was correct.
print("You were correct!")
keepGoing = False
else:
if guess < correct:
print("Guess higher.")
else:
print("Guess lower.")
while
Explanation:
I just did this question
Answer: while
Explanation:
from random import randint
# Generate and save a random number.
correct = randint(1,10)
# Initialize the variable to count the number of guesses.
attempts = 0
# Create a loop that continues until the user guesses the number.
keepGoing = True
while keepGoing:
# Get a guess from the user and update the number of guesses.
guess = input("Guess an integer from 1 to 10: ")
guess = int(guess)
attempts = attempts + 1
# Compare the guess to the correct answer.
if guess == correct:
# Tell the user the guess was correct.
print("You were correct!")
keepGoing = False
else:
print("You were wrong.")
# Continue the loop until the user is correct.
# Tell the user how many guesses were required.
print("You guessed the number in",attempts,"attempts.")
You modified the program to give the user a hint by changing the "else" part of the if block.
if guess == correct:
# Tell the user the guess was correct.
print("You were correct!")
keepGoing = False
else:
if guess < correct:
print("Guess higher.")
else:
print("Guess lower.")
1. assume a smaller organization has a plan to implement a security program with three full-time staff and two or three groups of part-time roles from other parts of the business. what tittles and roles do you recommend for the three full-time staff? what groups would commonly supply the part-time staff? 2. assume that you are asked to recommend the professional credentials for certain roles in infosec at a larger organization. what is your recommendation for the credential to be held by the ciso? how about for a infosec manager? what would be your recommended certifications for the senior technical staff? for the last question, pick three technical roles and note the job title and recommended credential for each.
For the three full-time staff in the security program of a smaller organization, I would recommend the following titles and roles:
a) Chief Information Security Officer (CISO): The CISO is responsible for overseeing the organization's overall security program, setting the security strategy, managing risks, and ensuring compliance with regulations. They should have a strong background in information security and risk management.
b) Security Analyst/Engineer: This role focuses on monitoring and analyzing security events, conducting vulnerability assessments, managing security tools, and responding to incidents. They should have knowledge of security technologies, network protocols, and incident response procedures.
c) Security Administrator: This role involves managing and configuring security systems, maintaining access controls, and monitoring user accounts. They should have expertise in managing security technologies such as firewalls, intrusion detection systems, and access management systems.
For the professional credentials in infosec roles at a larger organization:
a) CISO: Certified Information Systems Security Professional (CISSP) is a widely recognized certification for CISOs, demonstrating their knowledge and expertise in various domains of information security.
b) InfoSec Manager: Certified Information Security Manager (CISM) is a suitable certification for an InfoSec Manager. It validates their skills in managing information security programs, governance, and risk management.
c) Senior Technical Staff: For senior technical roles, the following certifications can be recommended based on specific areas of expertise:
Network Security Engineer: Certified Network Defense Architect (CNDA) or Certified Network Security Professional (CNSP).
Application Security Engineer: Certified Application Security Engineer (CASE) or Certified Secure Software Lifecycle Professional (CSSLP).
Incident Response Analyst: Certified Incident Handler (GCIH) or Certified Computer Security Incident Handler (CSIH).
These certifications provide specialized knowledge and skills required for these technical roles and enhance their credibility in the respective areas of expertise.
Learn more about program here
https://brainly.com/question/23275071
#SPJ11
a protection domain is a collection of access rights, each of which is a. a pair b. a pair c. a triplet d. a triplet
Each accessibility right in a safeguarding domain is composed of two access rights.
The definition of domain:The term "domain," which is specific here to internet, can apply to both the structure of the internet and the organization of a company's network resources. A domain is often a field of knowledge or a governing region.
Briefing:To create systems, create administrative and security rules, and specify resources and access procedures for its users' access rights, a protection domain is necessary. In each domain, many operation and object types are defined. The method for calculating an object's operation is through access rights. The ordered pair is represented as "object-name,rights-set," where "rights-set" refers to all legally permissible subsets of both the operations carried out on the object. So, this is the best choice.
To know more about Domain visit:
https://brainly.com/question/1154517
#SPJ4
The complete question is-
A protection domain is a collection of access rights, each of which is ___
(a). a pair <object-name, list-of users>
(b). a pair <object-name, rights-set>
(c). a triplet <object-name, user rights-set>
(d). a triplet <object-name, process_id, rights-set>
How to translate a word file with goole translator.
Answer:
Use the translation websiteClick "Browse your computer". A file selection dialog will pop up. Select the file. Select the translation languagePress 'translate'!Note: The document translation option will only show on medium and large screens
At the arcade, what did mike do to remind bryan of Alex?
Answer:
uhhhh he kept mentioning him i dunno
Explanation:
What is a computer? What is computing? Define this in your own words and then check your understanding with a dictionary. Have you ever thought about how many computers are in your home? Have a look here and then brainstorm a list of items that could be considered a 'computer.' Next, group the items in the list. Think about how and why you are grouping the items. Select one type of computer group that you feel you could not live without and why. Share your list with groupings and the one group you would not live without and your rationale. PLEASE HELP
Answer:
A computer is a machine that accepts data as input, processes that data using programs, and outputs the processed data as information. Many computers can store and retrieve information using hard drives. Computers can be connected together to form networks, allowing connected computers to communicate with each other.
Computing is any activity that uses computers to manage, process, and communicate information
yes i have thought of it before.
central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.
we can not live without motherboard or any of these .It is like a human without bones even one part missing would be dangerous.
Explanation:
What would the following view contain for values? Create view CustomerOrders as Select CustID, Count(*) as TotOrders, Sum(ordertotal) as Value From customer inner join sale on customer.customer_id = sale.customer_id; A listing of all customers in the customer table. A listing of the customer ID as well as the total orders. A listing of the customer ID as well as the total number of orders and the total amount spent by the customer. An error message.
The given view, named "CustomerOrders", is created using the SQL query provided. This view would contain a listing of the customer ID (CustID), the total number of orders (TotOrders), and the total amount spent by the customer (Value).
Here is a step-by-step explanation of the query:
1. "Create view CustomerOrders": This statement creates a new view called CustomerOrders.
2. "Select CustID, Count(*) as TotOrders, Sum(order total) as Value": This part of the query selects the CustID, the total number of orders for each customer (using Count(*)), and the total amount spent by the customer (using Sum(order total)).
3. "From customer inner join sale on customer.customer_id = sale.customer_id;": This part of the query joins the "customer" and "sale" tables using an INNER JOIN. The join condition is based on the matching of customer_id values in both tables.
The result of this query will not produce an error message, as the syntax is correct. Instead, it generates a view that shows a listing of customer IDs along with the total number of orders and the total amount spent by each customer. This view is helpful for analyzing customer behaviour and identifying valuable customers.
Learn more about syntax here:
https://brainly.com/question/11364251
#SPJ11
Suppose you have the following numbers and need them to be written in the two other numbering
systems. Before you could translate them, you would need to identify what numbering system is currently
used. Which numbering systems do the following numbers represent? (4 points)
a) 2C
b) 109
Answer:
Explanation:
a) hexadecimal
because hexadecimal numbers use 0-9 and letters A-F
b) decimal
109 is just a regular number and the standard numbering system that humans use is decimal
Which of the following are advantages of coding manually? Check all of the boxes that apply.
You can see what rendered code looks like as you type.
You can view source code to figure out HTML structure and behavior.
You can learn how HTML works.
You do not need a lot of HTML knowledge to create complex web pages.
Answer: Answer B
Explanation: My point of view this answer is correct because when we write any code then we have observed the lines of code to check whether they meet the conditions or not
In the Administration Console, where would you navigate to view inbound messages delayed because of Greylisting?
To view inbound messages delayed because of Greylisting in the Administration Console, you would navigate to the mail server's message tracking logs.
In the Administration Console, to view inbound messages delayed because of Greylisting, you would follow these steps:
1. Log in to the Administrative Console.
2. Navigate to the "Inbound Mail" or "Message Tracking" section, depending on your console's layout.
3. Look for a filter or search option related to "Greylisting" or "Delayed Messages."
4. Apply the filter or perform the search to view the list of inbound messages delayed because of Greylisting.
Please note that the exact navigation steps might vary depending on the specific email administration platform you are using.
To learn more about inbound messages visit : https://brainly.com/question/29976314
#SPJ11
Does somebody know how to this. This is what I got so far
import java.io.*;
import java.util.Scanner;
public class Lab33bst
{
public static void main (String args[]) throws IOException
{
Scanner input = new Scanner(System.in);
System.out.print("Enter the degree of the polynomial --> ");
int degree = input.nextInt();
System.out.println();
PolyNode p = null;
PolyNode temp = null;
PolyNode front = null;
System.out.print("Enter the coefficent x^" + degree + " if no term exist, enter 0 --> ");
int coefficent = input.nextInt();
front = new PolyNode(coefficent,degree,null);
temp = front;
int tempDegree = degree;
//System.out.println(front.getCoeff() + " " + front.getDegree());
for (int k = 1; k <= degree; k++)
{
tempDegree--;
System.out.print("Enter the coefficent x^" + tempDegree + " if no term exist, enter 0 --> ");
coefficent = input.nextInt();
p = new PolyNode(coefficent,tempDegree,null);
temp.setNext(p);
temp = p;
}
System.out.println();
p = front;
while (p != null)
{
System.out.println(p.getCoeff() + "^" + p.getDegree() + "+" );
p = p.getNext();
}
System.out.println();
}
}
class PolyNode
{
private int coeff; // coefficient of each term
private int degree; // degree of each term
private PolyNode next; // link to the next term node
public PolyNode (int c, int d, PolyNode initNext)
{
coeff = c;
degree = d;
next = initNext;
}
public int getCoeff()
{
return coeff;
}
public int getDegree()
{
return degree;
}
public PolyNode getNext()
{
return next;
}
public void setCoeff (int newCoeff)
{
coeff = newCoeff;
}
public void setDegree (int newDegree)
{
degree = newDegree;
}
public void setNext (PolyNode newNext)
{
next = newNext;
}
}
This is the instructions for the lab. Somebody please help. I need to complete this or I'm going fail the class please help me.
Write a program that will evaluate polynomial functions of the following type:
Y = a1Xn + a2Xn-1 + a3Xn-2 + . . . an-1X2 + anX1 + a0X0 where X, the coefficients ai, and n are to be given.
This program has to be written, such that each term of the polynomial is stored in a linked list node.
You are expected to create nodes for each polynomial term and store the term information. These nodes need to be linked to each previously created node. The result is that the linked list will access in a LIFO sequence. When you display the polynomial, it will be displayed in reverse order from the keyboard entry sequence.
Make the display follow mathematical conventions and do not display terms with zero coefficients, nor powers of 1 or 0. For example the polynomial Y = 1X^0 + 0X^1 + 0X^2 + 1X^3 is not concerned with normal mathematical appearance, don’t display it like that. It is shown again as it should appear. Y = 1 + X^3
Normal polynomials should work with real number coefficients. For the sake of this program, assume that you are strictly dealing with integers and that the result of the polynomial is an integer as well. You will be provided with a special PolyNode class. The PolyNode class is very similar to the ListNode class that you learned about in chapter 33 and in class. The ListNode class is more general and works with object data members. Such a class is very practical for many different situations. For this assignment, early in your linked list learning, a class has been created strictly for working with a linked list that will store the coefficient and the degree of each term in the polynomial.
class PolyNode
{
private int coeff; // coefficient of each term
private int degree; // degree of each term
private PolyNode next; // link to the next term node
public PolyNode (int c, int d, PolyNode initNext)
{
coeff = c;
degree = d;
next = initNext;
}
public int getCoeff()
{
return coeff;
}
public int getDegree()
{
return degree;
}
public PolyNode getNext()
{
return next;
}
public void setCoeff (int newCoeff)
{
coeff = newCoeff;
}
public void setDegree (int newDegree)
{
degree = newDegree;
}
public void setNext (PolyNode newNext)
{
next = newNext;
}
}
You are expected to add various methods that are not provided in the student version. The sample execution will indicate which methods you need to write. Everything could be finished in the main method of the program, but hopefully you realize by now that such an approach is rather poor program design.
I have a solution for you but Brainly doesn't let me paste code in here.
(it's a fill in the blank)
____ provide the means for other professions to perform their jobs more efficiently and effectively.
Please provide the means for other professions to perform their jobs more efficiently and effectively.
Answer:
programmers
Explanation:
das what it js
in debugging mode, which function key is will execute a library procedure, then stop on the next instruction after the procedure?
When in debugging mode, pressing the F10 function key will run a library operation before stopping at the following instruction.
What do you mean by debugging?Debugging is the method of identifying and resolving faults or bugs in any software's source code. When a program does not work as intended, computer programmers review the code to identify any errors that may have occurred.
Why is debugging necessary?Definition: Debugging is the act of locating and fixing problems in software code that could lead to unexpected behavior or crashes. These errors are sometimes referred to as "bugs." Debugging is employed to identify and fix faults or flaws in software or systems so that they don't operate incorrectly.
To know more about debugging visit:
https://brainly.com/question/23527660
#SPJ4
what is task in swf? a program which is responsible for only getting decision. a program which deletes the process represents invocation of logical steps in applications. a program which interact with amazon swf to get the tasks, process them and return their results.
Answer:
A task is a logical unit of work that is carried out by a component of your workflow.
Explanation:
On start up, which of these windows is not displayed ?
2.
(a) The Blank Form window
(b) The Class window
(c) The Project window
(d) The Properties windov
Answer:
(d) The Properties window
Answer:
The Project Explorer window .
Explanation:
displays a list of forms and modules that make up your application. Generally, this is positioned under the tool bar on the right side of the screen. It acts a s a quick reference to the forms, classes and modules in a project.
What storyboarding technique uses a combination of two techniques, and which techniques does it combine?
O A. hierarchical; wheel and linear
O B. linear; webbed and hierarchical
O C. webbed; linear and hierarchical
© D. wheel; webbed and linear
Answer:
d
Explanation:
Answer:
They're right, it's c: webbed; linear and hierarchical
Explanation:
Edmentum, I got it right.
What is one example of a pan lan man and a wan
Answer:
A LAN (local area network) is a group of computers and network devices connected together, usually within the same building. ... A WAN (wide area network), in comparison to a MAN, is not restricted to a geographical location, although it might be confined within the bounds of a state or country.
Explanation:
i hope this helps
What do you understand by the following malicious programs (i) computer virus (ii) worm (iii) trojan horse (iv) sweeper (v) malware (vi) spyware.
Answer:
Computer virus- A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system. For instance, you could receive an email with a malicious attachment, open the file unknowingly, and then the computer virus runs on your computer.
Worm virus- A computer worm virus is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
Trojan horse virus- A Trojan Horse (Trojan) virus is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.
Sweeper virus- Sweeper virus is a fake anti-spyware program known to be an updated version of the rogue anti-spyware program Virus Doctor. Virus Sweeper is a program that when it is installed starts to perform actions such as scanning your computer without your permission.
Malware- Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.
Spyware- Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind of malware that secretly gathers information about a person or organization and relays this data to other parties.
Which of the following is an example of Boolean data?a) 12b) "Hello"c) TRUEd) 12 + 3
Answer:
C. True
Explanation:
a boolean is an expression that evaluated either true or false.
Why is my phone not notifying me when i get text messages?.