answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
2 years ago
10

The attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the v

ictim may be tricked into sending messages to and from itself is a(n) _______________ attack. A. Teardrop B. Land C. myDoom D. echo-chargen
Computers and Technology
1 answer:
Sergeeva-Olga [200]2 years ago
7 0

Answer:

TEARDROP

Explanation:

Teardrop is a form of attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the victim may be tricked into sending messages to and from itself .

Teardrop attack also involves sending fragmented packets to a target machine in which the victim is been tricked into sending messages to and from itself. One of the fields in an IP header is the “fragment offset” field, indicating the starting position of the data contained in a fragmented packet relative to the data in the original packet.

You might be interested in
Dillard’s wants to learn about its consumers' attitudes toward online purchases. There are numerous studies that are available a
Kamila [148]

Answer:

Indirect/secondary source; direct/original source.

Explanation:

Data is a vital piece of information. It is generated from various physical or abstract activities. There are different sources of data. They are direct source, indirect source, static source, dynamic source etc.

The direct source is also called the original source data because information gotten from it is directly retrieved from a target audience or observed samples. Indirect or secondary source data is gotten from an already existing databases, which may or may not have been used for analysis.

Static source data hardly changes or updates while dynamic sources updates constantly.

4 0
2 years ago
A colleague sent you an awesome article about using proper ergonomics while sitting at the computer. You don't have time to read
lys-0071 [83]

Answer: Select the article attachment and save it to your computer.

Explanation:

5 0
2 years ago
Explain why E-mail A is inappropriate for the workplace and revise it to be appropriate.
cluponka [151]

Answer:

its not there mate

Explanation:

4 0
2 years ago
Read 2 more answers
Some numbers are formed with closed paths. the digits 0, 4, 6 and 9 each have 1 closed path and 8 has 2. None of the other numbe
postnew [5]

Answer:

def cal(n):

s=0

while n>0:

r=n%10

if(r==0 or r==4 or r==6 or r==9):

s=s+1

elif r==8:

s=s+2

n=n//10

print(s)

n=int(input("enter number:"))  

print(n)

cal(n)

Explanation:

  • Create a function to calculate count of closed path .
  • Create a variable to store count of closed path .
  • While number is positive , extract last digit of n .
  • Reduce number by truncating last digit .
  • Make a function call to compute count of path.
5 0
2 years ago
The Online Shopping system facilitates the customer to view the products, inquire about the product details, and product availab
jeyben [28]

Answer:

see explaination

Explanation:

We will consider the five Actors in the prearranged Online shopping software system:

Customer:

The scheme allows the customer to do below mention actions:

View goods and inquire about the niceties of products and their ease of use.

To create version to be able to purchase invention from the structure.

Browse crop through search category or shortest search alternative.

Place order for the necessary crop.

Make sum for the order(s) positioned.

Payment System:

Payment system allows client to pay using subsequent two methods:

Credit card.

PayPal.

Seller:

System allow seller to perform underneath actions:

Place the foodstuffs for selling under apposite product category.

Create account to happen to a member.

Administrator:

Following actions are perform by Admin:

Manage the goods posted in the system.

Modify existing manufactured goods categories or add novel categories for foodstuffs.

Site Manager:

System privileges Site director with the following role in the system:

View information on:

Orders Placed by customer

Products added by seller

Accounts created by users

check attachment

3 0
2 years ago
Other questions:
  • What type of hardware enables users to interact with a computer? Check all that apply. the CPU the hard disk drive the keyboard
    9·2 answers
  • Graphical elements that precede each item in a list are known as​ __________.
    8·1 answer
  • The OSHA Workplace Poster 3165 is optional for workplaces.<br> A) True<br> B) False
    13·2 answers
  • Which selections are possible for controlling the start time of audio playback? Check all that apply. Automatic Rewind when done
    10·1 answer
  • The elements of an integer-valued array can be initialized so that a[i] == i in a recursive fashion as follows: An array of size
    10·1 answer
  • Graduating from college can boost your income 60% compared to high school graduates. An average high school graduate without a c
    8·1 answer
  • In the lab, you discovered that the server you scanned (10.20.1.2) was vulnerable to the WannaCry ransomeware attack. What ports
    15·1 answer
  • Which of the following best describes the protocols used on the Internet?
    12·1 answer
  • Laura is the first person in her SDLC team to detect and predict security vulnerabilities in the software. In which phase is Lau
    11·1 answer
  • I have a variable and set it equal to 5. 1 then send it as an argument to a function that adds 5 to the variable passed in. Outs
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!