what is cyber security ???​

Answers

Answer 1

Answer:

Cyber security is the practice if defending computers,servers,mobile devices,electronic systems, networks, and data from malicious attacks


Related Questions

Whenever the amount of work of an algorithm is expressed as a polynomial, we focus on one term as dominant.
a) true
b) false

Answers

Answer:

True

Explanation:

hop it's helpful for you ☺️

What are the different types database of end users? Discuss the main activi-ties of each

Answers

Answer:

following types of databases available in the market −

Centralised database.

Distributed database.

Personal database.

End-user database.

Commercial database.

NoSQL database.

Operational database.

Relational database.

Cloud database.

Object-oriented database.

Graph database

Answer:

1. Casual End Users

These are the users who occasionally access the database but they require different information each time. They use a sophisticated database query language basically to specify their request and are typically middle or level managers or other occasional browsers. These users learn very few facilities that they may use repeatedly from the multiple facilities provided by DBMS to access it.

2. Naive or parametric end users

These are the users who basically make up a sizeable portion of database end users. The main job function revolves basically around constantly querying and updating the database for this we basically use a standard type of query known as canned transaction that have been programmed and tested. These users need to learn very little about the facilities provided by the DBMS they basically have to understand the users’ interfaces of the standard transaction designed and implemented for their use. The following tasks are basically performed by Naive end users:

The person who is working in the bank will basically tell us the account balance and post-withdrawal and deposits.

Reservation clerks for airlines, railway, hotels, and car rental companies basically check availability for a given request and make the reservation.

Clerks who are working at receiving end for shipping companies enter the package identifies via barcodes and descriptive information through buttons to update a central database of received and in transit packages.

3. Sophisticated end users

These users basically include engineers, scientist, business analytics and others who thoroughly familiarize themselves with the facilities of the DBMS in order to implement their application to meet their complex requirement. These users try to learn most of the DBMS facilities in order to achieve their complex requirements.

4. Standalone users

These are those users whose job is basically to maintain personal databases by using a ready-made program package that provides easy to use menu-based or graphics-based interfaces, An example is the user of a tax package that basically stores a variety of personal financial data of tax purposes. These users become very proficient in using a specific software package.

The while loop and the do loop are equivalent in their expressive power; in other words, you can rewrite a while loop using a do loop, and vice versa.
a. True
b. False

Answers

I think False...

I hope this helps

IPO cycle eexample three examples

Answers

ATM machine.
micro oven.
washing machine.
making tea.
calculator.

in theory a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away. In a real-world situation what is the more likely range involved?

Answers

A directional antenna or beam that used as an antenna that radiates or receives additional power from the unwanted source into certain directions that enhances performance and reduces interference.

Receiver satellite TVs commonly employ parabolic antennas.It better pulls signals in one way in which it detects a weaker or more distant signal than an omnidirectional antenna counterpart.The difference is that they do it by reducing their ability to draw signals from other directions.The coverage area is smaller yet extends farther out. This could reach up to 8 miles under optimum conditions.

Learn more:

brainly.com/question/23886562

The text between < html > and < /html > defines the _____.

a) active Web-page area
b) active code on a page
c) active text on a page
d) active image on a page

Answers

Answer:

active text on a page

Explanation:

Suppose that someone suggests the following way to confirm that the two of you are both in possession of the same secret key. You create a random bit string the length of the key, XOR it with the key, and send the result over the channel. Your partner XORs the incoming block with the key (which should be the same as your key) and sends it back. You check and if what you receive is your original random string, you have verified that your partner has the same secret key, yet neither of you has ever transmitted the key. Is there a flaw in this scheme?

Answers

Answer:

yes, there is a small flaw. You can reconstruct your partner's key even if it is different from yours.

Explanation:

Suppose you have key a and your partner has key b, you want to check if a == b, but if it is not, your partner doesn't want to reveal his key otherwise he could have just sent it.

So you create a random bit string r. and send a⊕r to him. He sends you back a⊕r⊕b. If a==b the a⊕b would cancel each other out, and you would be left with r.

However, if you calculate a⊕r⊕b⊕r⊕a, you would always get b! In other words, you XOR the received value with r and XOR it with your a. Then you get b, whatever it is.

What is the meaning of DHCP

Answers

Answer:

A Dynamic Host Configuration Protocol

Explanation:

hich of the following lists contains the five essential elements of a computer?
1. inputs, returns, programs, processes, and storage
-
2. language, software, hardware, code, and development
-
3. inputs, outputs, programs, processes, and storage
-
4. binary, code, inputs, processes, and storage

Answers

Answer:

I think 3(input, outputs, program, processes and storage)!!!!!

the computer _______ and_________ the data you input

please help ​

Answers

Answer: Data and stores

The primary purpose of the SNORT application is to function as an ACL, i.e. it controls authorization (or access) to a resource.
O True
O False

Answers

SNORT is the powerful IDS and IDS (IPS) program that enables real-time traffic data and analytical packet logging. It delivers a sophisticated IDS system to detect potential malicious activities. It employs a common language that integrates animality, protocol, and signatures analysis methodologies.It is used to monitor traffic in and out of a network utilized. It monitors travel in real-time and sends users alerts to detects potentially malicious packets or dangers on the IP networks.It analyses and searches for the content and matches protocols.

That's why the answer is "False".

Learn more:

brainly.com/question/14288353

System documentation is never up to date.

True or false?

Answers

Explanation:

System documentation is never up to date is false

If the formula in cell D49 is copied to cells E49:F49, what sequence of values would be generated in Cells D49:F49?
Conference Room Location Staff ID
D East 19106
C North 19122
A South 19107
E South 19104
B South 19147
=$D$44

Answers

Excel moves or copies a cell with formulas and their results, cell formats, and comments. When moving or copying a cell.

If there are certain cells, rows, or columns that do not appear on a worksheet, you can copy all cells.Otherwise, the visible cells. In adding to viewable cells, Excel copies cached or filtering cells per default.

            [tex]\bold{C \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ C \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ C}[/tex]

The formulation in cell D49 is a stable formula that does not vary by cell type. Alt + F4 is the shortcut to fasten a form. Therefore, the formula given in D49 would achieve the same output when copied to another cell.

Learn more:

brainly.com/question/17021828

How has colored television impacted society in a positive way?

Answers

please click on star

Explanation:

Color television was sold to viewers as a way to experience everything from sports and nature to musical theater in a more legible, realistic, captivating, and sensational way.

what separates the components of a domain name

Answers

Explanation:

period

In a domain name, the 'thing' that separates its components is a period.

I’m a grade 12 computer student with no knowledge of Java. All I know is hello world. I have final exam in 2 months is there any chance I can learn Java in 2 months, Atleast that I’ll pass my exams and if yes can anyone guide me, where to start from and the next steps.

Answers

Answer:

But iam 9th class student.

What does it mean to demonstrate big picture thinking

Answers

Answer:

To know how to demonstrate something, you have to know what it means first.  Big Picture Thinking is the ability to come up with ideas, solutions and opportunities. Big thinkers see possibilities and jump on opportunities.

Explanation:

So, in order to demonstrate something like this, you'd fins or create an idea and get right into it. For example, if you see an opportunity to help an elderly woman across the street, a big thinker would go and do that.

Which statement about sample size is true?
A. As the sample size within a study increases, statistical power decrea
B. As the sample size within a study decreases, statistical power decrea
C. As the sample size within a study decreases, statistical power increa
D. As the sample size within a study decreases, statistical power remain
Please select the best answer from the choices provided
A
0 0 0 0

Answers

I’d say b I’m not sure tho

Write a program that computes an integer's checksum. To compute the checksum, break the integer into its constituent digits and, working from right to left, doubling every second digit. If the product results in a number with two digits, treat those two digits independently. Then, sum all the digits for the final checksum.

Answers

Following are the C++ program to the given question:

#include <iostream>//header file

using namespace std;

int findCheckSum(int n)//defining a method findCheckSum that takes integer parameter

{

bool c = false;//defining bool variable

int S= 0,d;//defining integer variable

while(n)//defining while loop that seprates digits

{

d = n%10; // get the digit.

n=n/10; // remove the last digit.

if(c)//use if to check the even position value

{  

d=d*2;//multiplying d with 2  

while(d)//use if to check digit value

{

S=S+(d%10);//adding value

d=d/10;// remove the last digit.

}

}  

else//defining else block  

{  

S=S+d;// checking the odd position

}

c= c^true;//holding bool value

}

return S;//return S

}

int main() //defining main method

{

cout << findCheckSum(1984);//calling method  

}

Output:

22

Program Explanation:

Including header file.Defining a method, "findCheckSum" that takes an integer parameter "n".Inside the method, a bool variable "c" and two integer variable "S, d" is declared that defines a while loop.Inside the loop, a conditional statement is defined that separates digits and adds them into the "S" variable, and returns its values.Outside the method, the main method is declared that calls the "findCheckSum" method, and print its value.

Learn more:

brainly.com/question/14788459

What is MVC architecture in relation to developing in web applications? How
can we make use of this concept in web application development? Explain with
an example

Answers

Answer:

11÷3=5÷5=-316+6×53×4+996=357534

The major computer operations include what?

Answers

Answer:

They include input, processing, output, storage and controlling.

A computer is a computing system that takes inputs, processes, storage and gives an output. These are some of the basic computer or major computer operations.  

These processes include various types of processes and dedicated systems. Other main operations include sequencing and looing, programming business statistics, etc.

Thus the option B is correct.

Learn more about the major computer operations include.

brainly.com/question/18045931.

Memory Uninstalling a program

A) Removes the program from memory

B) Removes the program from a disk

C) Removes the program from the monitor

D) Permanently removes a program that is no longer
wanted

Answers

Answer:

D

Explanation:

but you can re install it

why entity relationship model is used for data manipulation??

Answers

Answer:

An entity relationship diagram gives a snapshot of how these entities relate to each other. You could call it the blueprint that underpins your business architecture, offering a visual representation of the relationships between different sets of data (entities)

Hope u got it

If you have any question just ask me

If you think this is the best answer please mark me as brainliest

Statistics are often calculated with varying amounts of data stored in a file. Write a program that takes any number of non-negative integers as input, and outputs the average, min and max. Prompt user for the input file name, open the file, read and process the numbers in the file.

Answers

Following are the program explanation, program, and output to the given question:

Program Explanation:

Import package.Defining a class Main.Defining the main method.Defining a string variable "str" and define a Scanner class object to input the"str" value.After input, the string value of a Scanner class object is created that takes the "str"  value in the parameter.In the next step, the "ArrayList" class object is declared that uses a while loop to add value to the list.In the condition statement an if block is defined that check ArrayList value equal to 0, and print the message.In the else block, a float variable "sum" and three integer variable "ctr, min, and max " is declared that check its value and prints its value with the message.

Program:

import java.io.*;//import package

import java.util.*;//import package    

public class Statistics //defining a class Statistics

{

  public static void main (String[] asx)//defining main method  

  {

       String str;//defining a string variable str

       Scanner sob= new Scanner(System.in);//defining Scanner class object to input value

       System.out.println("Enter value: ");//print message

       str= sob.nextLine();//input value

       Scanner s = new Scanner(str);//using Scanner class to take value str in parameter

       List<Integer> val = new ArrayList<Integer>();//defining an ArrayList class

       while(s.hasNextInt())//defining a while loop in add value

       {

           val.add(s.nextInt());//using add method to add value

       }

       if(val.size() == 0)//defining if block that check ArrayList value equal to 0

           System.out.println("The File is empty");//print message

       else//else block

       {

           float sum = 0;//defining float variable

           int ctr = 0, max = Integer.MIN_VALUE, min = Integer.MAX_VALUE;//defining integer variable that hold value

           for(Integer a:val)//defining a for loop that check ArrayList

           {

               ctr = ctr + 1;//adding value in ctr variable

               sum = sum + a;//adding value sum variable

           if(min > a)//use if to check min value greater than a

               min = a;//holding value in min

           if(max < a)//use if to check max value less than a

               max = a;//holding value in max

           }

               System.out.print("Average = ");//print message

               System.out.println(sum/ctr);//print average value

               System.out.print("Minimum value = ");//print message

               System.out.println(min);//print min value

               System.out.print("Maximum value = ");//print message

               System.out.println(max);//print max value

       }

  }

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/15410214

Basic function call get_pattern() returns 5 characters. Call get_pattern() twice in a print() statement to return and print 10 characters. Example output: ***** *****
def get_pattern():
return '*****'
print('*****')
print('*****')
get_pattern()
get_attern()
Testing pattern returned was printed twice.
Your output
*****
*****
Testing with different character. Output differs. See highlights below.
Your output
*****
*****
Expected output
#####
#####

Answers

Answer:

get_pattern()

get_pattern()

print(get_pattern())

print(get_pattern())

Explanation:

The program is given in Python; this means that it must be completed in Python.

The code segment that completes the program is:

print(get_pattern())

print(get_pattern())

From the complete question, the given code segment is:

def get_pattern():

    return '*****'

The above function will only return 5 characters i.e. 5 *'s, but it will never print the characters.

For the characters to be printed, a print statement must be introduced when calling the function get_pattern()

So, the print statement will be:

print(get_pattern())

The question requires 10 characters; so, the print statement must be called twice.

Hence, the code segment that completes the program is:

print(get_pattern())

print(get_pattern())

Read more about Python programs at:

https://brainly.com/question/22841107

In a typical day, what types of Computer-Mediated Communication do you use?

Answers

Answer:

Well, the types of Computer-Mediated communication I use are email, network communication and distance learning.

Explanation:

On a typical day, the types of Computer-Mediated Communication that will use our Instant messages, computer, audio, and video conferencing.

What are Computer-Mediated Communications?

The time and geographic limitations of in-person contact are removed through computer-mediated communication (CMC), in which people use computers and networks to communicate with one another across enormous distances and multiple time zones.

Computer-mediated communication (CMC) emphasizes how important it is for parties to communicate with one another through mediated channels of communication. Instead of focusing on the quantity, content, frequency, or timing of the message exchange, CMC places more emphasis on how new messages relate to older ones.

Therefore, the methods of computer-mediated communication that are used on a daily basis include audio, video, and instant messaging.

To learn more about Computer-Mediated Communications, refer to the link:

https://brainly.com/question/1918317

#SPJ2

Discuss the term internal control​

Answers

Answer:

Internal controls are procedural measures an organization adopts to protect its assets and property. Broadly defined, these measures include physical security barriers, access restriction, locks and surveillance equipment. They are more often regarded as procedures and policies that protect accounting data.

PLEASE MARK ME BRAINLIEST

19. Fatigue can help improve your reaction time.
False
O True

Answers

Fatigue can help improve your reaction time is false.

Fatigue generally impairs reaction time rather than improving it.

When a person is fatigued, their cognitive and physical abilities can be negatively affected, including their reaction time.

Fatigue can lead to slower reflexes, decreased attention, and impaired decision-making, which can all contribute to longer reaction times.

It is important to get sufficient rest and manage fatigue to ensure optimal performance and safety, especially in activities that require quick reflexes and rapid responses.

To learn more on Fatigue click:

https://brainly.com/question/32503112

#SPJ6

What is computer hacking?

Answers

Answer:

Computer hacking:-

Computer hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system.

Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals.

How is a WAN different from a LAN?
O LANs and WANs together make up 2. network.
O LANs require WANs or servers.
O A WAN is made up of LANS
O A LAN is made up of WANS

Answers

A WAn ( Wide Area Network ) is made up of LANS ( Local Area Network)

Other Questions
How do I write five times the quantity of a number and 3 is 50 Which inequality is true? Write the merits and demerits of Mendeleev periodic table in points and explain each of them in short The endpoints of ST are -15 and 25. Find the coordinate of the midpoint M population is maintained by being cancelled out by Why does the author consistently refer to theking as "semi-barbaric"?O to fool the reader into thinking that the king is a kindleaderO to excuse the king's actions in the amphitheaterO to illustrate that the king is hiding a savage nature behindhis civilized frontO to justify killing people based on a game of chance What is the vapor pressure of a solution of sucrose (C12H22011) prepared bydissolving 40.0 g of sucrose in 400.0 g of water at 100C? The vapor pressure ofpure water at 100C is 760 Torr. Assume 3 sf.a) 760 Torrb) 10.00 Torrc) 756 Torrd) 2.00 Torr 6.What are two characteristics of each of Earths four major systems? Question 4 (5 points). Uniform Distribution. The amount of time it takes a runner to finish a 6 mile race is uniformly distributed over the interval 50 to 70 minutes. What is the probability that the running time exceeds 65 minutes if it is known that the running time exceeds 55 minutes GIVING BRAINLISTSolve 10 one fifth = ___. one fiftieth 5 25 50 3. He is riding a horse. (Future continuous) 4. He helps his father in his work. (Simple past Suppose the following selected condensed data are taken from a recent balance sheet of Bob Evans Farms (in millions of dollars). Cash $ 29.0 Accounts receivable 19.0 Inventory 26.0 Other current assets 36.0 Total current assets $110.0 Total current liabilities $200.0 What was a goal of the explorer Juan Pardo?to conquer Peru, Central America, and southeast Americato improve relations between explorers and American IndiansO to build missions in Florida to convert American IndiansO to establish French settlements in South Carolina and Florida BRAINLIEST AWAITS!respond to each correctly and you will gain 15 points! What is the slope of the line between (3,-4) and (-2, 1)?O 102.O-2O-1 What is the rule off the following sequence?1; 4; 9; 16; 25; ... 4 facts about relative dating? how far will a rubber ball fall in 10 seconds what would be the final velocity of this and what would be the average velocity 1+2+5834-5454524643122 If the composition of two functions is:1/x3 What would be the domain restriction? Describe how you found that answer.