hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or

Answers

Answer 1

Answer: Botnets

Explanation: A zombie network is a "network or collection of compromised computers or hosts that are connected to the Internet".

A botnet is also known as "a network of private computers infected with malicious software and controlled as a group without the owners' knowledge.

Can you see the similarity?

Hope this helps and have a wonderful day! :)


Related Questions

What is the purpose of the CC option in an email?
A.
Create a carbon copy of the message.
B.
Save the message as a template for future use.
C.
Send a copy of the message to one or more people.
D.
Forward a message to multiple recipients.
( Edmentum MSE )

Answers

Answer:

c

Explanation:

send a copy of the messege

(02.01 LC)
Which type of punctuation follows the print function?
O Apostrophe
O Colon
O Parentheses
O Semicolon

Answers

Answer:

Parenthesis

Explanation:

IN programming language such as C, java print function is written within the parenthesis and then it is followed by semicolon

Ex: printf("XYZ");

Answer:

C, parentheses

Explanation:

Because I did not test and studied.

PLZ HELP FAST
The third party which is authorized to make a final decision in a dispute is called the ______.
a.
Mediator
b.
Arbiter
c.
Supervisor
d.
Manager


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

This is called an Arbiter!

Explanation:

A somehow similar task belongs to the mediator, that is to help in solving of the conflict, but the mediator does not have the power of making a final decision. The Arbiter however takes the final decision and all the parties are expected to accept this decision.

Write a C program to do the following tasks:

a) Read the grades of students in the class from the keyboard (assume the grades are

integer in the range 0 to 100).

b) Find the average of the grades that are less than 50. If there are no grades less than 50, then display the message "No grades < 50".

c) Find the average of the grades that are greater than or equal 50. If there are no

grades greater than or equal to 50, then display the message "No grades >= 50".


The program should terminate if the input grade is negative. (Hint: Use sentinel-controlled repetition structure). Note that average of the grades might not be an integer and design your program considering that

Answers

Answer:

#include<stdio.h>

void main()

int marks;

printf("Enter your marks ");

scanf("%d",&marks);

if(marks<0 || marks>100)

printf("Wrong Entry");

else if(marks<50)

printf("Grade F");

else if(marks>=50 && marks<60)

printf("Grade D");

else if(marks>=60 && marks<70)

printf("Grade C");

else if(marks>=70 && marks<80)

printf("Grade B");}

else if(marks>=80 && marks<90)

printf("Grade A");

else:

printf("Grade A+");

#may need to replace spaces with tab

Explanation:

it works ( I hope, if it doesn’t tell me what the error is)

What are some more websites that are like Brainly?

Answers

Quizlet works just as well but definitely not better than brainly.

Hope you get everything you need

Complete the sentence.
A
is a device that connects one network with another

Answers

I think that it is a router

“Here’s my idea: I want to build a tic-tac-toe game. The user creates an account if they don’t already have one and are taken to the main game board. From there the player will play against the computer in either easy, intermediate, or advanced mode, so I will need to write the code for the computer player. When the game is over their lifetime win total is updated. I will also keep track of how long the game took.”

Answers

Answer:

tic tac

Explanation:

tic tac and hamburger always

What is one way interpreted programming languages differ from compiled programming languages? (3 points)


Interpreted languages produce translated machine code that can be saved and run later, while compiled languages cannot be saved.

Interpreted languages translate all lines of code together and execute them all at once, while compiled languages translate one line of code at a time and then execute that line before moving on.

Programs written with interpreted languages are ready to be run, but programs written with compiled languages require interpreter software to be run.

Programs written with interpreted languages require the original source code, but programs written with compiled languages can be shared with others while keeping the source code private

Answers

Interpreted programming languages distinguish themselves from compiled programming languages in that they translate and execute code continuously.

Why is this so ?

Interpreted progra ming languages distinguish themselves from compiled programming languages in that they translate and execute code continuously while the program runs.

Whereas compiled languages transform code into machine code that computers can execute directly.

In contrast to compiled languages, interpreted languages lack a distinct executable file and interpret the language itself during runtime. Interpreted programming offers increased flexibility and reduced debugging complexity, while compiled programs create more efficient code with improved speed.

Learn more about compiled programming languages at:

https://brainly.com/question/30498060

#SPJ1

We initialize the parameters to all zero values and run the linear perceptron algorithm through these points in a particular order until convergence. The number of mistakes made on each point are shown in the table below. (These points correspond to the data point in the plot above)

Answers

The main aim of running the parameters in the linear perceptron algorithm is to be able to develop a machine learning algorithm for binary classification tasks.

What is a linear perceptron algorithm?

This refers to the linear classification algorithm that is used in machine learning.

This is done in order to learn a decision boundary that divides different classes using a hyperplane.

Hence, we can see that your question is incomplete because the parameters are not included, hence a general overview was given to give you a better understanding of the concept.

Read more about machine learning here:

https://brainly.com/question/25523571

#SPJ1

Suppose you would like to copy the formula in cell b6 to c6 while keeping the same cell references (i. E. C4/c3). Which macabacus shortcuts should you use?.

Answers

Paste Duplicate macabacus shortcuts we should use.

What is macabacus?

Macabacus is a software company that specializes in financial modeling applications. Macabacus is a software company that specializes in financial modeling tools for Excel. The Fast Fill Right/Down tools in Macabacus are similar to the native Fill Right/Down functions in Excel, but far more versatile. Macabacus will automatically determine how far right/down to fill based on the presence of data surrounding the active cell if you use Fast Fill.

Paste copied cells without keeping original formulae, unless relative cell references inside the copied range refer to cells inside the copied range, in which case the copied range's original formulaic relativity is preserved within the pasted cells. This is a more natural alternative to Paste Exact.

To learn more about macabacus
https://brainly.com/question/28070009

#SPJ4

Which of the following are valid variable names? Select 2 options.
A. Cost$4
B. 4thNumber
C. Fourth_number
D. Num4
E. $4cost
Please answer asap

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct options to this question are C and D:

Fourth_numberNum4

Because these are the correct and valid variable names.

Other options are not correct because these variables names either start with a number or contains special character such as $ sign.

The invalid variables are A, B, and E while the valid variable declare are options C and D.

How does the DNS solve the problem of translating domain names like example.com into IP addresses?

How does DNS help the Internet scale?

Answers

Answer:

DNS translates domain names and hostnames into IP addresses through a basic lookup function.  When a user requests a domain name (as in the case of a browser lookup) the computer queries the local DNS server to find the matching IP address.  If the local DNS server does not contain the information in it's local database, it contacts the next higher DNS system or the root domain DNS servers (i.e. microsoft.com - if the local system does not know it, it will query the well-known DNS server for the .com domain - which will know where to get the information).  

DNS helps the users by not requiring them to remember the IP address of every system them want to connect with.  microsoft.com is much easier to remember than 40.82.167.220.  

DNS also helps the internet scale through the use of load balancing.  Multiple systems can comprise a single web site with the web pages stored on many different machines with multiple IP addresses.  When a user requests the microsoft.com website IP, they are given the primary IP of the load balancer sitting in front of the multiple computers.  The load balancer will then distribute the traffic to any of the systems that are hosting the web page that are not busy.  To the end user it look like they are connecting to a single machine - when in fact they are connecting to one of potentially hundreds of web servers with the same content.  As traffic grows on the internet more servers are necessary to handle the additional traffic.  DNS helps ensure the end user will connect to the proper web server regardless of the number of web server copies spun up in response to the additional traffic.  This allows the capacity to scale as necessary without interruption to the web site.  

Explanation:

DNS translates domain names into IP addresses so that the browsers can be able to load internet.

Through a lookup function, DNS solve the problem of translating domain names like example.com into IP addresses. It should be noted that when a user requests a domain name, the local DNS server will then find the matching IP address.

If the information isn't contained in the local database, then the information will be requested from the next higher DNS system. Through the Domain Name System (DNS), the human readable domain are translated to machine readable IP addresses.

Lastly, Domain Name System also helps in scaling the internet through the use of load balancing. The load balancer helps in the distribution of the traffic to the system hosting the web page.

Read more on:

https://brainly.com/question/23944954

Choose all correct statements given the following quadratic


function.

Answers

The given quadratic function is y = ax^2 + bx + c. The statements regarding the quadratic function will be explained below.

The quadratic function has a parabolic shape: This statement is correct. A quadratic function, represented by the equation y = ax^2 + bx + c, always forms a parabola when graphed.

The coefficient "a" determines the direction of the parabola: This statement is correct. The coefficient "a" affects the concavity of the parabola. If "a" is positive, the parabola opens upward, and if "a" is negative, the parabola opens downward.

The vertex of the parabola is located at the point (-b/2a, f(-b/2a)): This statement is correct. The vertex of a quadratic function is given by the coordinates (-b/2a, f(-b/2a)), where "f" represents the function.

The quadratic function has two x-intercepts: This statement may or may not be correct. The number of x-intercepts depends on the discriminant, which is given by b^2 - 4ac. If the discriminant is positive, the quadratic function has two distinct x-intercepts. If the discriminant is zero, there is one x-intercept (the parabola touches the x-axis at one point). If the discriminant is negative, there are no real x-intercepts (the parabola does not intersect the x-axis).

The quadratic function is always increasing: This statement is not correct. The quadratic function can be increasing or decreasing depending on the value of "a." If "a" is positive, the function is increasing, and if "a" is negative, the function is decreasing.

In summary, the correct statements regarding the given quadratic function are: it has a parabolic shape, the coefficient "a" determines the direction of the parabola, the vertex is located at (-b/2a, f(-b/2a)), and the number of x-intercepts depends on the discriminant. However, the statement that the quadratic function is always increasing is not correct, as it can be either increasing or decreasing depending on the value of "a."

learn more about quadratic function here:

https://brainly.com/question/18958913

#SPJ11

Chipotle does plant based chorizo taste like chorizo.

Answers

Answer:

facts

Explanation:

what are tasks performed by pascaline?​

Answers

Answer:

The Pascaline is a direct adding machine (it has no crank), so the value of a number is added to the accumulator as it is being dialed in. By moving a display bar, the operator can see either the number stored in the calculator or the complement of its value.

Explanation:

Your school is hosting a diving contest, and they need a programmer to work on the scoreboard! Your job is to calculate each diver's total after the three judges hold up their individual scores. Write the function calculate_score which takes a tuple of three numbers from 0 to 10 and calculates the sum. A perfect dive is worth 30 points, a belly flop is worth 0. For example: calculate_score((10, 10, 10)) # => 30 calculate_score((9, 9, 6)) # => 24

Answers

Answer:

def calculate_score(setss):

    num1, num2, num3= setss

    if num1 >= 0 and num1 <=10 and num2>= 0 and num2<=10 and num3>= 0 and num3<=10:

         print(num1+ num2+num3)

    else:

         print("Out of range")

Explanation:

I've added the full source code as an attachment, where I used comments as explanation

8) Which of the following passive optimization technique relies on the past co-movement between securities A. Full replication B. Quadratic optimization C. Stratified sampling

Answers

Among the following passive optimization techniques, Stratified sampling relies on the past co-movement between securities. Stratified  Sampling :Stratified sampling is a technique.

 The objective of this technique is to reduce the estimation error, to increase the representativeness of the sample and to obtain greater precision in the estimation of the parameters of interest .Stratified sampling is a passive optimization technique that relies on the past co-movement between securities.

In this technique, the potfolio is divided into strata of related securities, and the weight of each stratum is determined based on its past co-movement with the other strata. Thus, it attempts to replicate the performance of the benchmark by selecting a representative sample of the securities that make up the benchmark, and then weighting them accordingly to reflect their contribution to the benchmark's performance.

To know more about optimization visit:

https://brainly.com/question/33631047

#SPJ11

What result would the search expression (insects AND bugs) –spiders give you in the Go.ogle search engine?
A. information about bugs and spiders
B. information about insects, bugs, and spiders
C. information about spiders
D. information about insects and bugs, without including spiders

Answers

Explanation:

information about insects, bugs, and spiders

Adding Page Numbers in the Footer
Seren needs to add page numbers in the footer to her worksheet. Order the steps from first to last.

Go to the View tab and select
Click Page Number in the Design Click Add Footer at the bottom of
Save and Print Preview
Page Layout View
tab
the worksheet

Answers

Answer: 1) Go to view tab and select Page Layout view. 2)click add footer at the bottom of the worksheet 3) click page number in the design tab 4)save and print preview

Explanation: I just answered the question

Answer:

Yeah its right I tride it edge 2022

Explanation:

Need Help
Redundant Paths
Describe two different paths that a message could take from Person A to Person D.

Need HelpRedundant PathsDescribe two different paths that a message could take from Person A to Person

Answers

Answer:

The possible paths that a message can take from Person A to Person D are;

1) From Person A through Person B, then from Person B to Person D

2) From Person A through Person E, then from Person E through Person C and from Person E to Person D

Explanation:

In information technology networking, network redundancy is the process of message communication through the use of a network communication infrastructure, that includes extra or multiple network communication pathways and devices such that the inter-connectivity of the network is ensured in the event of a device failure.

The possible paths that a message can take from Person A to Person D are:

1. Part 1- From Person A through Person B, then from Person B to Person D

2. Part 2- From Person A through Person E, then from Person E through Person C and from Person E to Person D

For better understanding let's explain this redundant path in this context means

The good description of redundancy is that it is the act of designing a network that can use multiple paths between switches to make sure that there is no single point of failure.From our answer above we can see that there are different path one can take to get to Person D. This shows that redundancy is in place and when an issue occur, there different ways to tackle it or get through to itRedundant path often referred to as Network redundancy is a copied (creating alternatives) infrastructure where more copies or instances of network devices and connections are installed to ensure an alternate path on the advent of failure.

From the above we can therefore say that the answer The possible paths that a message can take from Person A to Person D are:

1. Part 1- From Person A through Person B, then from Person B to Person D

2. Part 2- From Person A through Person E, then from Person E through Person C and from Person E to Person D, is correct

Learn more about redundant path from:

https://brainly.com/question/17880618

kayah has created a website that explains what her business does. what type of computer program is needed to access/view kayah's website?​

Answers

Answer:

web browser

Explanation:

A web browser is a program that allows users to view and explore

information on the World Wide Web.

Answer:

Web browser bbg XD

Explanation:

inserting merge fields in the letter
steps required
plz ​

Answers

Answer:

Click or tap where you want the merge field.

Choose the down-arrow under Insert Merge Field, and select a field.

Insert Merge Field menu of available fields

If you don’t see your field name in the list, choose Insert Merge Field.

Choose Database Fields to see the list of fields that are in your data source.

Choose Insert.

Answer:

Once you have a data source connected to your document, adding merge fields is a way to personalize a document with information from the data source. The merge fields come from the column headings in the data source.

WindowsmacOS

Here’s an example of how the Address Block and Greeting Line collections of merge fields might pull data from an Excel spreadsheet into a form letter.

Data pulled into mail merge fields

The Address Block and Greeting Line fields are collections of merge fields.

Note: If the merge field commands appears dimmed, click Select Recipients and choose the kind of mailing list you’re using. If you don’t have a mailing list yet, click Type New List to create your list in Word.

Explanation:

Hope it's answer you plz mark as Brainlist

Activity
You were part of a fundraising team where you tried to raise money by selling t-shirts. Create a table using a spreadsheet program to record how many t-shirts each team member sold. The table can be similar to the following:

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about creating a table using a spreadsheet program to record how many t-shirt each team member sold.

The spreadsheet file is attached.    

Answer:

I used a spreadsheet program to create a table with two columns. In the first column, I entered the names of the members; in the second, I entered the number of stores each person has contacted.

I used the SUM function to calculate the total number of stores contacted, as =SUM(B2:B6).

I used the MAX function to find the maximum number of stores contacted, as =MAX(B2:B6).

I used the MIN function to find the minimum number of stores contacted, as =MIN(B2:B6).

Explanation:

Choose the best answer from the options below to complete the following sentence.

Storage is different from RAM because for storage, information is _________, even if power is turned off.

preserved

temporary

deleted

unsaved

Answers

Answer:

its A. the answer to your question is preserved. :)

Answer:

A

Explanation:

HELP HELP BRAINLIEST A student learns that a classmate is being cyberbullied. He wonders if it is a serious situation and how it is affecting his classmate.

What areas of his classmate’s life may be impacted by cyberbullying? Check all that apply.

physical health
recent memories
school performance
emotional health
athletic ability

Answers

Answer:

physical health

school performance

emotional health

Which range function creates the following list of numbers?

21 25 29 33 37 41

Group of answer choices

range(21, 44, 4)

range(21, 41)

range(21, 41, 4)

range(21, 44)

Answers

Note that the range function that creates the following list of numbers is:  range(21, 44, 4) (Option A)

What is the rationale for the above response?

The rationale for the above response is that the range function generates a sequence of numbers from a starting value to an ending value with a specific step size.

The list of numbers, "21 25 29 33 37 41", starts from 21 and increments by 4 until it reaches 44. Therefore, range(21, 44, 4) would generate this sequence of numbers.

The first argument is the starting value, the second argument is the ending value, and the third argument is the step size, which in this case is 4.

Learn more about  range function:

https://brainly.com/question/29145252

#SPJ1

what type of attack displays false information masquerading as legitimate data?

Answers

The type of attack that displays false information masquerading as legitimate data is known as a "spoofing attack."

Spoofing attacks involve the creation of falsified data or the manipulation of existing data to appear as if it originates from a trusted source or entity. The attackers aim to deceive the recipient into believing that the information they receive is legitimate, which can lead to various negative consequences.

Here are a few common types of spoofing attacks:

Email Spoofing: In email spoofing, the attacker alters the email header information to make it seem like the email originated from a different source. By impersonating a trusted sender, such as a bank, a reputable organization, or someone known to the recipient, the attacker may trick the recipient into disclosing sensitive information or performing actions that they otherwise wouldn't.

IP Spoofing: IP spoofing involves manipulating the source IP address in network packets to make it appear as if they come from a different location or a trusted source. This technique can be used to bypass authentication mechanisms, launch denial-of-service (DoS) attacks, or hide the attacker's identity.

Website Spoofing: Website spoofing refers to creating a fraudulent website that closely resembles a legitimate website to deceive users. Attackers may use similar domain names, logos, and layouts to trick visitors into entering their sensitive information, such as login credentials, credit card details, or personal data.

Caller ID Spoofing: Caller ID spoofing involves manipulating the Caller ID information displayed on the recipient's phone to falsely represent the identity of the caller. This technique is commonly used in phishing scams or to carry out social engineering attacks, where the attacker pretends to be someone else to gain the trust of the victim.

Spoofing attacks exploit the trust placed in certain entities or sources to manipulate or deceive individuals or systems. Organizations and individuals should be vigilant and employ security measures such as email authentication protocols (e.g., SPF, DKIM, DMARC), network traffic monitoring, secure website browsing habits, and caller verification techniques to mitigate the risks associated with spoofing attacks.

It's important to note that the countermeasures against spoofing attacks may vary depending on the specific type of attack and the technology involved. Staying informed about the latest security practices and technologies is crucial to protect against these deceptive attacks.

Learn more about the spoofing attack:

https://brainly.com/question/23021587

#SPJ11

Which statements are true regarding mainframe computers? Mainframes are fast-performing computers that have large storage capacities. They are the fastest and largest computers built, and they can perform more than 1 trillion calculations per second. The processing and storage units of mainframe computers are central hubs, with users accessing them through either unintelligent terminals or intelligent terminals. A unintelligent terminal does not process or store data. It only has input and output devices connected to it. They have low-level capacity and are made of semiconductors fabricated on silicon chips. In addition to these terminals, people sometimes use personal computers to access a mainframe computer. The stored program in the digital computer system uses a microprocessor, a programmable read-only memory, and a random access memory to operate.​

Answers

The statements that is  true regarding mainframe computers is that:

Mainframes are fast-performing computers that have large storage capacities. 

Is mainframe computers are very large computers?

A mainframe computer is known to be large. Mainframe computers are known to be quite faster and have a lot of storage capacity when compared to traditional server computers.

Note that A mainframe computer is seen as a server that can be able to contain thousands of client computers linked to it. Mainframes are said to be used by large companies that needs high-volume transaction processing and storage.

Hence, The statements that is  true regarding mainframe computers is that:

Mainframes are fast-performing computers that have large storage capacities. 

Learn more about  mainframe computers  from

https://brainly.com/question/14480599

#SPJ1

In Python, how would you print the first 4 characters of "Help me pass!"

Answers

Answer:

sample_str = "Help me pass!"

first_chars = sample_str[0:4]

print('First four character: ', first_chars)

Explanation:

sample_str = "Help me pass!"

first_chars = sample_str[0:4]

H has index 0, e has index 1, l has index 2, p has index 3. the space has an index as well, etc.

You can tell that parseInt() is a(n) ____ method because you use it with the class name and not with an object.

Answers

Parse Int() is a(n) static method because you use it with the class name and not with an object.

Is parseInt a static method?

The term or computer language (Java - parse Int() Method) is known to be a method that is often used to get back the primitive data type of a particular String.

Conclusively, the  parse Xxx() is known to be a static method and one can use it to make or have one or more argument.

Learn more about object from

https://brainly.com/question/24445340

Other Questions
Which is not a result of the invention shown?AIdeas about the Reformation did not spread throughout EuropeBStimulated literacy about many subjectsIncreased the number of volumes producedDThe Bible was made in various languages300e Carly solved a quadratic equation by completing the square, but her work has errors. Identify the first error in Carly's work. Technician a says ilsac develops and identifies standards for gasoline-fueled engine oils. technician b says that api rates the engine oil service on many engine oils. who is correct? What is the y-intercept of the line? Please please pretty please answer this :) Math problem pls help me What is the area of this figure? Select from the drop-down menu to correctly complete the statement. The area of the figure is Choose... cm. What is the height of the Temple of Athena Nike? If a domestic firm makes the mistake of believing that foreign consumers want exactly the same products that are sold in the united states, then that firm is most likely ignoring the importance of? 4 Many commercial fish(catch) off the coast.in active voice Does the method of deficit financing by issuing commonstocksis accepted by Islamic framework?explain Just in Time is the same thing as:a. All of theseb. None of thesec.Leand. Theory of Constraintse. Six Sigmaf. Kaizen a 9-foot roll of waxed paper costs $2.16. What is the price per inch? A researcher wants to observe preschoolers at a local public playground to evaluate levels of cooperation. The researcher will not interact with the children or record information in such a manner that the identity of the subjects can be readily ascertained. Which of the following statements is true?This research would be eligible for exemption because the researcher is not interacting with the children and the playground is a public setting. Each of the species concepts (morphospecies, biological, and phylogenetic) have strengths and weaknesses. Compare and contrast all three, and evaluate them for their relative usefulness. eory.According to cell theory, which of the following aremade of cells? Check all that apply.O flowersrocksbloodwaterbacteriasugarskinRETRY Autotransformers are especially practical if the difference between the primary and secondary voltages is _____. Housing prices in a small town are normally distributed with a mean of $152,000 and a standard deviation of $8,000. Use the empirical rule to complete the following statement. Approximately 68% of housing prices are between a low price of $Ex: 5000 and a high price of $ This equation is balanced. C + S8 -4CS2TrueFalse Please tell me at least 10 ways how to not worry all the time, please