Explanation:
Human computer interaction is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.
Answer:
It is the way humans interact with computers; interfaces, special effects, icons, and buttons, it does not end there. HCI can also be looked at as a study to see what [person] will do with the computer.
You are the IT security administrator for a small corporate network. The HR director is concerned that an employee is doing something sneaky on the company's employee portal and has authorized you to hijack his web session so you can investigate.
Your task is to hijack a web session as follows:
a. On IT-Laptop, use Ettercap to sniff traffic between the employee's computer in Office1 and the gateway.
b. Initiate a man-in-the-middle attack to capture the session ID for the employee portal logon.
c. On Office1, log in to the employee portal on rmksupplies using Chrome and the following credentials: Username: bjackson Password:
d. On Office2, navigate to rmksupplies and use the cookie editor plug-in in Chrome to inject the session ID cookie. Verify that you hijacked the session.
Answer: A, it's the most professional way or C but I'd choose A
define a python functions that draw a pinwheel using the pinwheel function that has input paramiters that allows you to change the number of branches and size
then make on that does not use the pinwheel function to draw it
Start with your draw_pinwheel() function
During each iteration of the loop decide which color to set the turtle to using the color() function
On even iterations, use color1
On odd iterations, use color2
Use an if/else statement to do the decision making
After deciding the color, surround a call to draw_triangle() with begin_fill() and end_fill() so that drawing the triangle creates a colored triangle.
If you have have forgotten, you can use an if/else to check for even/oddness in python as follows.
my_number = 3
if(my_number % 2 == 0): # the remainder of dividing by 2 is 0
print("The number is "+str(my_number))
print("The number is EVEN")
else: # the remainder must be 1
print("The number is "+str(my_number))
print("The number is ODD")
Good luck <3
Which would be considered a peripheral device?
A. a printer that can be connected from outside the computer to communicate with it
B. a CPU
C. RAM
D. an internal hardware part like a motherboard or hard drive
Answer:
D is the correct answer of this question
Select all statements that are true of cable internet connections.
A. They're dial-up connections.
B. They're broadband connections.
C. They're wireless connections.
D. They're shared bandwidth connections.
The statements that are true of cable internet connections are:
They're broadband connections. They're shared bandwidth connections.What is this connection about?In telecommunications, cable Internet access is known to be cable Internet and it is said to be a kind of broadband Internet access that make use of the same tools as a cable television.
Note that the statements that are true of cable internet connections are:
They're broadband connections. They're shared bandwidth connections.Learn more about internet from
https://brainly.com/question/2780939
#SPJ2
Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance to gather extensive information on the company. She finds out the model numbers of routers and other devices by reading discussions between system administrators in forums. She also has a list of all the IT staff and their phone numbers. She also has the services running on ports on some machines she ran a network scanner on.
Required:
a. What reasonable steps should the company have taken to prevent Jane from finding this information?
b. What steps should the company take to prevent or reduce the efficacy of port scans?
The reasonable steps should the company have taken to prevent Jane from finding this information is to do a Vulnerability scanning or a A penetration test.
How To defend Against Port Scanning try and use or Install a Firewall and the use of TCP Wrappers.What is Vulnerability scanning?This is a kind of passive reconnaissance techniques. This form of scanning is the process of auditing a said network. A vulnerability scanner is one that looks into the network or application to see issues but they do not attempt to exploit any vulnerabilities that is seen.
A penetration test (pen test) is known to be a form of ethical hacking that entails one to think like an attacker and find out ways to penetrate the target's security systems. This aim to:
Verify a threat exists.Bypass security controls.Actively test security controls.Exploit vulnerabilities.Learn more about penetration test from
https://brainly.com/question/26555003
what is a window with controls that you tell window what you want
Answer:
dialog box
I hope this helps you
:)
Define Auxiliary memory?
Answer:
An Auxiliary memory is referred to as the lowest-cost, highest-space, and slowest-approach storage in a computer system. It is where programs and information are preserved for long-term storage or when not in direct use. The most typical auxiliary memory devices used in computer systems are magnetic disks and tapes. :)
An Auxiliary reminiscence is referred to as the bottom-value, highest-area, and slowest-method storage in a laptop system. it's miles wherein programs and facts are preserved for long-time period storage or when now not in direct use. The most standard auxiliary reminiscence devices used in computer structures are magnetic disks and tapes.
Because law enforcement cannot be everywhere at once, what kind of intelligence should be focused on in order to avoid potential cyber
threats?
А. preventative
B. international
c. democratic
D. top-secret
If there are cyber threats and vulnerabilities to your system, what does that expose you to ?
Answer:
It introduces the possibility of hackers or attackers targeting your system.
I hope this answers your question!
the information of an management information system comes from?
A management information system is a computer system consisting of hardware and software that serves as the backbone of an organization's operations
Which factor affects reading speed the most?
a.
The desire to improve speed
c.
The motivation to practice
b.
The willing to try new techniques
d.
These are all equal factors
Please select the best answer from the choices provided
A
B
C
D
Mark this and return
Answer:
D. these are all equal factors
Explanation:
i took the test lads
How is the increased use of smartphones and tablets, with their smaller screen size, affecting user interface design practices
Answer:
A small screen limits the information that can be legibly displayed. While designing, text and images can quickly consume the limited screen space, causing a trade-off between content and user interactions. Given that smartphones are equipped with touch-based interfaces that allow intuitive and dynamic interactions, an increase in screen size offers a larger surface for interactions and a greater sense of controllability. Large screens also enable the utilization of various communication modalities.
Explanation:
I hope this helps!
Briefly explain the Infrastructure challenges, Technology transfer issues, and Product
and service challenges
Answer:
asymmetric information, market power, and externalities
Explanation:
drawing experiences in high school
In order to use a data type, a variable must be _____________________ and _____________________.
memorized and initialized
declared and initialized
assigned and memorized
noted and declared
Answer:
declared and initialized
Explanation:
:))
large and fast disks should be used for as doing so will ensure work is done as quickly as possible?
Answer: Well it depends, sometimes for a hard drive if you are using for an example, that would not really affect the performance on how big is it. But I think that it could impact the performance in a good way but maybe some people think that it's not so....
Explanation:
Well, that varies. For instance, depending on how big the hard disk is, performance may or may not be affected. However, I believe it could have a positive effect on performance, while perhaps others disagree.
What is the performance?A play, concert, or another type of entertainment is staged or presented as a performance. It can also be described as the process or action of doing or completing a deed, task, or function. A qualitative methodology is known as "performance research" uses
The subject and method of the experiencing body are placed in time, place, and history. Instead of abstract or reductive encounters, the performance paradigm calls for a more direct experience, primarily through facework. For instance, depending on how big the hard disk is, performance may or may not be affected. However, I believe it could have a positive effect on performance, while perhaps others disagree.
Therefore, Well, that varies. For instance, depending on how big the hard disk is, performance
Learn more about performance here:
https://brainly.com/question/15466511
#SPJ2
For what was the simulation game, America's Military, used?
An Internet Service Provider(ISP) has three different subscription
packages for its customers:
Package A: For $15 per month with 50 hours of access provided.
Additional hours are $2.00 per hour over 50 hours.
Assume usage is recorded in one-hour increments,
Package B: For $20 per month with 100 hours of access provided.
Additional hours are $1.50 per hour over 100 hours.
Package C: For $25 per month with 150 hours access is provided.
Additional hours are $1.00 per hour over 150 hours
Assume the Billing Cycle is 30 days.
The ISP has contracted us to write the application software for their
new Billing System.
We will do the project over the next two weeks:
WEEK 9 -- Write the Functions to do the tasks that we will be using
to develop the application in Week 10.
WEEK 10 -- Write an Interactive Console Application using the
Functions which you developed in Week 9.
===========================================================================
DESCRIPTION of PROBLEM SET for Week 9
===========================================================================
Write the Function Definitions for the following tasks needed by
the ISP Billing System.
getPackage
validPackage
getHours
validHours
calculatePkg_A
calculatePkg_B
calculatePkg_C
---------------------------------------------------------------------------
getPackage: get value (A, B, C) for selected package from the keyboard.
validPackage: ensure that the value entered is an (A,B,C).
getHours: get value (0 - 720) for hours of usage from the keyboard.
validHours: ensure that the value entered is between 0 and 720.
calculatePkg_A: calculates the monthly charges for internet usage
based on hours of usage when Package 'A' is selected.
Use the knowledge of computational language in C code to write a code that has three different subscription packages for its customers.
How to write code about sales?To make it simpler the code is described as:
#include <iostream>
#include <string>
using namespace std;
int main() {
string package;
float time;
float price;
cout << "Choose package: ";
cin >> package;
// Package validation
if ((package == "A") || (package == "B") || (package == "C")) {
cout << "The number of hours: ";
cin >> time;
// Time validation
if (time <= 744) {
// Package A
if (package == "A") {
if (time > 50) {
price = 15 + (time - 50) * 2;
} else {
price = 15;
}
// Package B
} else if (package == "B") {
if (time > 100) {
price = 20 + (time - 100) * 1.5;
} else {
price = 20;
}
// Package C
} else if (package == "C") {
if (time > 150) {
price = 25 + (time - 150) * 1;
} else {
price = 25;
}
cout << "Price: $" << price;
}
See more about C code at brainly.com/question/19705654
1. (+) Peter will be taken to the airport by his father tomorrow.
(-)………………………………………………………………….
(?)………………………………………………………………….
the figure shows cross-section of a ruler which is a rectangle of 2. 5 cm by 0.2 cm on which surmounted an isosceles trapezium (one in which the non- parallel sides area of equal length). the shorter of the parallel sides of the trapezium 0.7 cm long.if the greatest height of the ruler is 0. 4 cm and it is 33 cm long,calculate its surface area
Which of the following is a field whose value uniquely identifies each record in a
table?
Main key
Value key
Primary key
Element key
A field whose value uniquely identifies each record in a table is called: C. Primary key.
What is DBMS?DBMS is an acronym for database management system and it can be defined as a collection of software applications that enables computer users to create, store, modify, retrieve and manage data or information in a relational database.
This ultimately implies that, DBMS allow end users to efficiently store, retrieve and manage their data with an appropriate level of security.
In database management system (DBMS), a primary key is a field whose value uniquely identifies each record in a table or relational database.
Read more on primary key here: https://brainly.com/question/8131854
Cybercrime
Select 3 options.
is always intentional
O is always unintentional
O can be committed by an outsider
can be committed by an insider
O can be caused by negligence
help me please!?!
Answer:
O can be committed by an outsider
O can be committed by an insider
O can be caused by negligence
Explanation:
Cybercrime can be done by someone within the company and has access but it can also be done by someone outside through hacking. Sometime someone broke the law without knowing it because of negligence.
please help me with this. this my past homework and it's already stressing me out ehehe so it would make me happy if someone helped me :DD , please help me with atleast 5? thank you sm!
Answer:
14. editor
8. managers
12. news
5. nameplate
10. dummy
Write a java program to input a number from the user and tell if that number is a power of 2 or not.
Powers of 2 are 1, 2, 4, 8, 16, 32, 64, 128, 256 and so on.
Answer:
public static boolean isPowerOfTwo(int n) {
long exp = Math.round(Math.log(n) / Math.log(2));
return Math.pow(2, exp) == n;
}
Explanation:
The opposite of power-of-2 is the 2-log, which is calculated using any log divided by log(2).
I'm sure you can do the input part yourself!
reference of generation of computers?
Answer:
First Generation: Vacuum Tubes. Second Generation: Transistors. Third Generation: Integrated Circuits. Fourth Generation: Microprocessors. Fifth Generation: Artificial Intelligence
Which popular video game franchise has released games with the subtitles World At War and Black Ops?
Answer:
Call of duty i think has released those games
Answer:
IT WAS CALL OF DUTY
Explanation:
A website has recently seen a spike in activity due to a recent marketing campaign that has caused a decrease in performance. The operators want to improve performance to their website. What should they implement?
Answer:
THEY SHOULD ADD CHEESE!
Explanation:
cheese solves everything,
Write a console application that requests the user to enter the name of their Pet and the year their pet was born.Calculate the age of the pet and display the name and age of the pet.
The console application that requests the user to enter the name of their Pet and the year their pet was born and calculate its age is as follows:
from datetime import date
def nameAndAge(x, y):
today = date.today()
age = today.year - y.year - ((today.month, today.day) < (y.month, y.day))
return f"The name of your pet is {x} and the age is {age}"
# Driver code
print(nameAndAge("mike", date(1997, 2, 3)), "years")
Code explanationThe code is written in python.
we have to import date from datetime module.We declared a function named "nameAndAge". The arguments of the function are the users input which are the name and date of birth of the pet.We store todays date in the variable called "today".Then we calculate the age of the pet.The next line of code, we returned the name and the age of the pet base on the users input.Finally, we call the function with the print statement.learn more on python here: https://brainly.com/question/25285677
Python 4.5 code practice
Answer:
"Write a loop that inputs words until the user enters DONE. After each input, the program should number each entry and print in this format:"
"#1: you entered _____"
"When DONE is entered, the total number of words entered should be printed in this format:"
"A total of ___ words were entered"
count = 0
data = input('Please enter the next word: ')
while data != "DONE":
count = count + 1
print("#" + str(count) +": You entered the word " + data)
data = input("Please enter the next word: ")
print("A total of "+ str(count) + " words were entered.")
Explanation:
we are counting starting from 0 when the user inputs a word the code then counts the word and stores is as data and continues until the user inputs DONE
What are variables? Write the name of any two types of variables.
Answer:
A variable is an identifier which changes the values given to it when the program is being executed.
e.g. - var count : integer
var avg : real
Explanation:
what dose a compress pictures command do ?
Answer: I reduces the size
Explanation: cropped areas of pictures are saved by default, which adds to the file size. If your using PowerPoint then it can reduce the file size by compressing pictures, like lowering their resolution, and deleting cropped areas.