Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to

Answers

Answer 1

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, it would have been better if the writer includes experience with a computer virus so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

Answer 2

Answer:

b

Explanation:


Related Questions

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network

Answers

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network will have multiple wireless access points. You want to use WPA2 on the network. What should you do to configure the wireless network?

(Select two).

a. Use shared secret authentication

b. CONFIGURE DEVICES TO RUN IN THE INFRASTRUCTURE MODE

c. Configure devices to run in ad hoc mode

d. Use open authentication with MAC address filtering

e.  INSTALL A RADIUS SERVER AND USE 802.1X authentication.

 

Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on your internal network, including file, print, and DHCP services. Which options should you implement?

Answers

Options:

A Infrastructure mode

B Ad hoc mode

C a wireless access point

D static IP addresses

E APIPA

Answer:

A. Infrastructure mode

C. a wireless access point

Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).

pls help help me is good help me helping is very good

Answers

Answer:

-56 negative

Explanation:

Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output it produces. Which stage of the software development life cycle is Carlos ready for next? Coding Design Maintenance Testing

Answers

Answer:

Testing

Explanation:

From the question, we understand that Carlos just finished the coding of the app.

In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;

This stage is an integral part of the implementation process and according to the question, the coding has been completed;

The next phase or stage after the implementation phase is testing.

Hence, Carlos is getting ready to test the app.

Answer:

Testing                                   I took the test I definetly testing <3

what are the means of hardware security?​

Answers

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

Explanation:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

What are the advantages of Radio waves over micro waves?​

Answers

Answer:

radio frequencies can penetrate deeply into the material and thus heat thick products. They heat more slowly than microwaves and thus make it possible to treat more delicate products which require a slower heating.

Which of these are part of the CPU?
O peripheral
O HDMI cord
O core
O keyboard

Answers

Hiii I think the best option would be C. Core

please help me with this this is Computer chapter Advanced HTML of class 8th​

Answers

Answer:

ok let me try

It stands for

Hypertext Markup Language

Image result for html stands for

HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.

if your computer is gliching what do you do to stop it and some times it turnes off what do you do

Answers

Answer:

You can take it to the shop to fix it since it happens often ig

Explanation:

I Hope This Helps bro

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?a. Cell phone tetheringb. Satellite Internetc. Mobile hotspotd. Cell phone tethering

Answers

Answer:

c. Mobile hotspot

Explanation:

A mobile hotspot is a hotspot that is to be activated by turning on the WiFI hotspot. It is used to share the cellular data to the laptop, computer system and the mobile devices who do not have an internet connection

Since in the question, it is mentioned that the one traveler has an unlimited cellular data plan and a consistent strong signal

So the mobile hotspot should be used to provide internet service to the group.

array Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.

Answers

user_in = str ( input ("Please enter a phrase: " ))

def reverse_str (string):

e = 0

for e in range (len (string)):

x = -1

print string[x]

x += (len (string))

convert (0.255)¹⁰ into binary

Answers

0.01000001010001111011

Must click thanks and mark brainliest

Felicity wants to capture the attention of the regular subway commuters in her area through her print advertisement. She wants to use a stationary print medium that commuters can see from a distance. Which print medium should Felicity choose?
(Correct answer only)

A. magazine
B. newspaper
C. flier
D. billboard
E. brochure

Answers

Answer:

D. billboard

Explanation:

Commuters can most likely see billboards from a distance.

The print medium to be chosen by the felicity should be Billboard. Thus, option (D) is correct.

What is billboard?

Billboard is a HORDING and huge outdoor advertisement board That can be seen by many people. In order to be seen by the most automobiles and pedestrians, billboards are frequently erected in busy places like highways and urban areas.

Many of the company publish their brands and products on the billboard for spreading brand awareness and spreading the word of their company  to as many people can know about the product.

According to the above scenario, Felicity can capture the attention of the regular subway commuters in her area through billboard advertisement. From a distance, commuters can see the advertisement.

Therefore, it can be print medium to be chosen by the felicity should be Billboard. Hence, option (D) is correct.

Learn more about Billboard here:

https://brainly.com/question/8494411

#SPJ2

You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern?

a. motherboard
b. CPU
c. graphics card
d. sound card

Answers

Answer:

all options

a, b and c the most important

Explanation:

can we draw a formula triangle for velocity?​

Answers

Answer:

Yes we can actually draw a formula triangle for velocity

Explanation:

I can't explain why but if u wanna calculate the velocity of something using a diagram then you will draw a trapezium and in that trapezium there are two triangles and a rectangle so you will split it into two triangles and trapezium so I think we can actually draw a formula triangle for velocity

if you want to refine your google search by date, which option should you use?

Answers

Answer:

If you want to refine your Google search results by date, you should use Advanced search.

Explanation:

Answer:

Advanced Search.

Explanation:

Just go down to settings at the bottom of google and choose advanced search and fill in the boxes so your search comes up more specific.

All of the following are challenges presented by changing technology as it relates to the special events field EXCEPT: A. the ability to manage much of the coordination of an event from a smartphone B. the static nature of technology C. the need to continually master new software programs and applications D. the ease of facilitating events provided by technology

Answers

Answer:

The answer is "option C".

Explanation:

The change in technology can be characterized as that of an increase in the production feasible thru the innovations, new technologies, and dispersion procedures at a specified amount of production. This technology concerns the Excluding area of special events, even if it needs the new master software and applications continuously, and the wrong choices can be defined as follows:

In choice A, it is a part of event management that's why it is wrong. In choice B it is wrong because it is used in learning. In choice D, it is wrong because it is used to make progress.

All of the options given are challenges to technology except D. the ease of facilitating events provided by technology.

It should be noted that changing technology can be challenging. It can bring about the ability to manage much of the coordination of an event from a smartphone.

It also leads to the static nature of technology and the need to continually master new software programs and applications. The ease of facilitating events provided by technology isn't a challenge.

Learn more about technology on:

https://brainly.com/question/8184227

what are the disadvantageous of emails

Answers

Answer:

it could lead to overload of information.. wastage information.it can cause misunderstanding and disabilities between both person.

Need internet connection.without it can't use.

it can be hacked.and also lack the personal touch..

Answer:

they can cause misunderstandings and people read with diffrent

moods

Explanation:

15 points please help!!!!


David works at a company that provides financial solutions. He wants to create an interactive presentation for his company. Which interactive platforms can David use for this presentation?

David can use an interactive or a for his presentation.

Answers

Answer:

Powerpoint presentation

Explanation:

Powerpoint presentation is a part of Microsoft office that is established by Microsoft. PowerPoint. It is used to present the company visions, missions, key points in a short and in an attractive way by using the various designs, pictures, audio clips, etc

Here David wants to create an interactive presentation so he should use the powerpoint presentations so that he could present the company visions, objectives, etc

what do you mean by automation and diligence with respect to a computer??​

Answers

Answer:

Delegince computer without any motion resists

The attacker sent data that was able to manipulate the return address that is reserved to store expected data

Answers

Complete Question:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?

Answer:

A buffer overflow.

Explanation:

In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).

In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.

How do I make my mobile number appears switched off to a specific number not with truecaller app...(vivo user)​

Answers

Answer:

Hello, there is no way you can make your mobile number appear switched off to a particular number unless you really switch it off.

However, you can set your phone to "Call Forwarding" on your Android device. What it would do is that when the person calls your number, he gets the message that you are unreachable.

Explanation:

Here's how to set Call Forwarding on your android

Open your phone dialerGo to your Phone Settings Click on Call SettingsSelect Call Forwarding (in some Androids, you'll have to select 'Calling Accounts' first)Select 'Always Forward', 'When Busy', 'When Unanswered' or 'When Unreachable'After selecting your preferred option, you can set the forwarding numberEnable the settings or click 'Ok'

Website reputation is an important part of page quality (PQ) rating. Reputation can justify the Highest rating and the Lowest rating.

Answers

Answer:

The given statement is false.

Explanation:

A Website reputation seems to be a built-in feature or tool. It retains knowledge about users, through visiting pages. The committed resources for this site depending on either the website as well as the basic details about its design. The reputation including its Website has been used to strengthen the safety of phishing attacks or malicious content.

Therefore the solution given above is the right one.

Which of the following is not a networking equipment?

Answers

Answer:

[tex]\boxed{\sf (C) \ mouse}[/tex]

Explanation:

A networking equipment can share data along a computer network. A mouse is not a networking equipment.

What is the key function of a sales team?
A. to maintain customer-retailer interaction
B. to create appealing advertisements
C. to maintain fan–developer communication
D. to develop customer–fan relationships

Answers

Answer:

A. to maintain customer-retailer interaction

Explanation:

A sales team is a subdivision in a company that is dedicated to making sales for the company and they are responsible for meeting the growth goals of that company.

The key function of a sales team is to maintain a healthy customer-retailer relationship or interaction because it is from this good relationship that goods and services are sold.

The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working.

Which of the following is the MOST likely reason the mouse isn't working?

A. The USB mouse driver is too old for the current mouse.
B. The USB mouse is not a wireless mouse and needs to be plugged into the computer.
C. The USB mouse is malfunctioning.
D. The USB mouse receiver is not plugged into the computer.

Answers

Answer:the usb mouse receiver is not plugged into the computer

Explanation:

In the case above, one can say that the USB mouse receiver is not plugged into the computer.

What is a USB mouse?

A USB mouse is known to be a tool that is often attaches to a computers USB port.

In the case above, one can say that the USB mouse receiver is not plugged into the computer and as such it cannot perform the task it need to do.

Learn more about USB mouse from

https://brainly.com/question/10847782

#SPJ9

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as

Answers

Answer:

Reconnaissance

Explanation:

Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone

Answers

Blinking light is not one of the awansers

an interface are connection point with hardware devices are joined​

Answers

Answer:

Explanation:

Networking hardware is the correct answer

c) Explain GIGO briefly.​

Answers

Answer:

Is is also a computer science acronym that implies bad input will result in bad output. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

IT'S FORMULA IS GIGO: GARBAGE IN GARBAGE OUT...

HOPE IT'S HELPFUL FOR U!!

AND PLZ MARK ME AS BRAINLIEST IF U LIKE THIS ANSWER!!!!

Other Questions
The risk-free rate is 6% and the expected rate of return on the market portfolio is 13%. a. Calculate the required rate of return on a security with a beta of 1.25. A satellite of mass m circles a planet of mass M and radius R in an orbit at a height 2R above the surface of the planet. What minimum energy is required to change the orbit to one for which the height of the satellite is 3R above the surface of the planet Freedom of expression, including freedom of religion and freedom of peaceable assembly, is protected by which amendment to the Constitution? 1. the Third Amendment 2. the First Amendment 3. the Sixth Amendment 4. the Fourth Amendment A mass m = 0.6 kg is released from rest at the top edge of a hemispherical bowl with radius = 1.1 meters. The mass then slides without friction down the inner surface toward the bottom of the bowl. At a certain point of its path the mass achieves a speed v = 3.57 m/s. At this point, what angle \theta\: ( in degrees) does the mass make with the top of the bowl? When a projector is placed 10 meters from a screen as shown, it produces an image 3 meters high. If the tallest image that the projector can produce without distortion is 4.5 meters high, what's the maximum distance the projector can be placed form the screen Name the property of real numbers illustrated by the equation d. Application software are developed by software companies In material requirement planning calculations, gross requirements for finished products are taken from ________________________. Divide 500 in the ratio 4:5:1 Point T is on line segment SU. Given ST=13 and TU=5, determine the length SU. Cole Co. began constructing a building for its own use in January 20X3. During 20X3, Cole incurred interest of $50,000 on specific construction debt, and $20,000 on other borrowings. Interest computed on the weighted-average amount of accumulated expenditures for the building during 20X3 was $40,000. What amount of interest cost should Cole capitalize Please help! Urgent! Will mark Brainliest! Choose the correct option.Juan is ______ a vacation trip , he is visiting the great pyramid of giza.A. On B. In C. At pls help me ASAP !!!!!! Item 7Item 7 A farmer is called to help sandbag a levy that is about to flood his town. The farmer is stationed between two correctional-center inmates who are required to assist in the flood-control efforts. As a result of this experience, the farmer has developed a newfound respect for inmates. This example would be consistent with which perspective? Zen Corp, an Australian company, and Pluto Inc, an American company, entered into a one-time contract to build an elevated expressway in Florida. The contract was for a period of five years and both companies were equally liable under their agreement. This type of business enterprise is known as a _____. Given two consecutive even integers whose sum is 186, find the smaller of the two integers. How do mountains affect the climate in Central America and the Caribbean? a. The leeward side is wetter, while the windward side is dry. b. Mountains do not affect the climate in Central America. c. The windward side is wet, while the leeward side is dry.d. The windward side is cold, while the leeward side is hot. A polarized laser beam of intensity 285 W/m2 shines on an ideal polarizer. The angle between the polarization direction of the laser beam and the polarizing axis of the polarizer is 16.0 . What is the intensity of the light that emerges from the polarizer? Which of the following supports the idea that Hamlet is a problem play? Select all that apply.The plays characters are neither all good nor all bad.The play has a somber, sinister mood.Hamlet lacks a tragic flaw.It has a tragic ending.