answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
1 year ago
13

A(n) ____ attack is when a system is compromised and used to attack other systems. a. indirect b. direct c. object d. subject

Computers and Technology
1 answer:
Leviafan [203]1 year ago
4 0

Answer:

a. indirect

Explanation:            

When a system is attacked by a hacker and this infected system is used to attack other systems then it is called indirect attack.  This type of attack is often initiated by a 3rd party computer. It is difficult to find from where this kind of attacks is originated.

Direct attack is when a system is attacked directly by an attacker by installing malicious software or often by getting unauthorized physical access to a computer. So option b is not true.

So the correct option is a. indirect.

You might be interested in
Ajay wants to read a brief overview about early settlers in the United States. Which type of online text source should he most l
Tanzania [10]
Well, integrity is a must if you are reading anything. So it would be any website that has either a .edu or a .gov at the end of a URL. 

I never suggest Wikipedia for brief, since 100's of people will edit one topic at a time, the answer to what he is looking for is buried in 18 pages about one settler in the United States!
5 0
2 years ago
Read 2 more answers
6.4 Predicting Prices of Used Cars. The file ToyotaCorolla.csv contains data on used cars (Toyota Corolla) on sale during late s
Brums [2.3K]

Answer:

Compare the predictions in terms of the predictors that were used, the magnitude of the difference between the two predictions, and the advantages and disadvantages of the two methods.

Our predictions for the two models were very simmilar. A difference of $32.78 (less than 1% of the total price of the car) is statistically insignificant in this case. Our binned model returned a whole number while the full model returned a more “accurate” price, but ultimately it is a wash. Both models had comparable accuracy, but the full regression seemed to be better trained. If we wanted to use the binned model I would suggest creating smaller bin ranges to prevent underfitting the model. However, when considering the the overall accuracy range and the car sale market both models would be

Explanation:

8 0
2 years ago
Catherine wants to search online for fruit juices. She is fine with aerated or fresh fruit juices. Which Boolean operator will e
ZanzabumX [31]
<h2>Answer:</h2>

<u>She will use the </u><u>OR Boolean operator</u>

<h2>Explanation:</h2>

Boolean Operators are used to connect and define the relationship between your search terms. Doing searching in any electronic databases like Google search engine, we use Boolean operators to either narrow or broaden our searches. The three Boolean operators are AND, OR and NOT. Among these operators OR is used to add the items. Since Catherine is searching for aerated or fresh fruit juices so she needs both the results therefore she must use OR operator.


8 0
2 years ago
Read 2 more answers
Write code that determines the number of full days represented by the number of hours stored in the variable hours and stores th
taurus [48]

Answer:

hours = 50

full_days = int(hours / 24)

print("The number of full days in " + str(hours) + " hours is " + str(full_days))

Explanation:

Initialize the hours

Since there are 24 hours in a full day, divide the hours by 24. Note that you need to typecast it to the int, because the result is a decimal value by default

Print the values as requested

4 0
2 years ago
Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show
Kipish [7]

Answer:

code = 010100000001101000101

Explanation:

Steps:

The inequality yields 2^{k} - 1 > = M+K, where M = 16. Therefore,

The second step will be to arrange the data bits and check the bits. This will be as follows:

Bit position              number              Check bits            Data Bits

21                                   10101

20                                  10100

The bits are checked up to bit position 1

Thus, the code is 010100000001101000101

3 0
2 years ago
Read 2 more answers
Other questions:
  • A two-dimensional array can have elements of ________ data type(s).
    7·1 answer
  • Which social network made the mistake of alienating its early adopters by deleting suspicious accounts?​?
    5·1 answer
  • A class car and its subclass bmw each have a method run(), which was written by the developer as part of the class definition. i
    10·1 answer
  • A small company is moving towards sharing printers to reduce the number of printers used within the company. The technician has
    14·1 answer
  • Convert the following binary number to octal (111000)2​
    12·1 answer
  • For drivers under 21, the penalties for driving with an illegal BAL include _____.
    5·2 answers
  • 7. Test Average and Grade Write a program that asks the user to enter five test scores. The program should display a letter grad
    15·1 answer
  • The following checksum formula is widely used by banks and credit card companies to validate legal account numbers: d0 + f(d1) +
    13·1 answer
  • Five friends plan to try a startup. However, they have a limited budget and limited computer infrastructure. How can they avail
    11·1 answer
  • Jim is writing a program to calculate the wages of workers in a teddy bear factory.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!