which form of attack submits excessive amounts of data to a target to cause arbitrary code execution? question 21 options: buffer overflow fragmentation insertion interruption

Answers

Answer 1

Answer:

i believe the answer is Buffer Overflow.
I could be wrong but that seems like the most reasonable answer.

Explanation:


Related Questions

you manage a group of 20 windows workstations that are currently configured as a workgroup. you have been thinking about switching to an active directory configuration. which advantages would there be to switching to active directory? (select two.)

Answers

It addresses the businesses who create and provide maintenance for systems and software geared at libraries.

The numerous sorts of technology goods and services used by libraries are covered in-depth and objectively by Library Technology Guides. It addresses the businesses who create and provide maintenance for systems and software geared at libraries. The website provides comprehensive databases and document repositories to support libraries as they examine new systems and is a crucial tool for industry professionals to stay up to date with emerging trends.

The Active Directory (AD) database and services link users to the network resources they require to complete their tasks.

The database (or directory) holds crucial details about your environment, such as how many computers and users there are, as well as who has access to them. The database might, for instance, contain information on 100 user accounts, including each user's job title, contact information, and password. Additionally, it will note their permissions.

A large portion of the activities in your IT system is controlled by the services. They specifically verify that each user is who they say they are (authentication), typically by verifying the user ID and password they input, and only permit them to access the data they are authorized to use (authorization).

To know more about libraries click on the link:

https://brainly.com/question/475367

#SPJ4

What form of lookup is used when you have a small list of values and the values remain constant over time?.

Answers

Array form of lookup is used when you have a small list of values and the values remain constant over time.

What is meant by Array form?

A data structure called an array consists of a set of elements (values or variables), each of which is identifiable by an array index or key. Depending on the language, additional data types that describe aggregates of values, like lists and strings, may overlap (or be identified with) array types.

An array is a collection of memory locations, or "boxes," each of which has the same name and can store a single piece of data. An array's data must all be of the same data type. Consider a score table in a game where ten scores must be recorded.

An array is a grouping of identically typed elements that are stored in adjacent memory locations and may each be separately referred to using an index to a special identifier. There is no need to declare five distinct variables when declaring an array of five int values (each with its own identifier).

To learn more about Array form refer to:

https://brainly.com/question/21723680

#SPJ4

You would like to add some frequently used buttons to the quick access toolbar. How can you do this?.

Answers

Click Customize Quick Access Toolbar, then click More Commands.In the Choose command from list, click the File Tab.Select the command, then click Add.Click OK.

Quick Access is a directory present in the Windows 11 File Explorer application. The purpose of the Quick Access section is to provide you with a list of recently or frequently opened files and folders and to help you easily get back to work. When you enable the Quick Access feature, you also get easy access to important folders like Desktop, Downloads, Documents, etc.

A feature similar to Quick Access used to be in older versions of Windows, which is the 'Favorites' section. Quick Access was first introduced in Windows 10. By default, the Quick Access feature is disabled in the File Explorer app in Windows, though, enabling it is quite simple.

You can learn more about Quick Access here brainly.com/question/23902602

#SPJ4

suppose a process in host c has udp socket with port number 2315. suppose both host a and host b send udp segment to host c from source port numbers 1345 and 7876 respectively. what port number will host c receive the segment on? group of answer choices port 7876 port 2315 port 1345 port 4610

Answers

Yes, the same socket will receive both segments. The operating system will give the process the IP addresses for each received segment via the socket interface so it may figure out where each segment came from.

What is meant by an operating system?

An operating system (OS) is the program that controls all other application programs in a computer after being installed into the system first by a boot program.

An operating system is a piece of system software that controls computer resources, hardware, and common services for software programs.

A group of software applications that coordinates the activities of computer hardware and software is referred to as an operating system. It serves as a link at the point where humans and machines interact. Examples of Operating System are: Windows Linux BOSS etc.

Yes, the same socket will receive both segments. The operating system will give the process the IP addresses for each received segment via the socket interface so it may figure out where each segment came from.

To learn more about operating system refer to:

https://brainly.com/question/1763761

#SPJ4

what statement accurately reflects what occurs when a message is too large to transport on a network?what statement accurately reflects what occurs when a message is too large to transport on a network?

Answers

Network - The message is split up into smaller messages known as segments or datagrams (for TCP) (for UDP).

What is datagrams?
A packet-switched network's basic transfer unit is called a datagram. Datagrams typically consist of a header and a payload. Over a packet-switched network, datagrams offer a connectionless communication service. The network does not have to guarantee datagram delivery, timing, or sequence of arrival. Halvor Bothner-By, the CCITT rapporteur for packet switching, combined the words data and telegram to form the phrase datagram at the beginning of the 1970s. Despite the fact that the word is new, the idea was not. Paul Baran wrote about a hypothetical military network that had to withstand a nuclear strike in a report for the RAND Corporation in 1962.

To learn more about datagrams
https://brainly.com/question/22238625
#SPJ4

Placing parenthesis around a word, in a search, provides an exact match to that word
in the results.

True

False

Answers

Answer:

Explanation:

Placing parenthesis around a word, in a search, provides an exact match to that word in the results.

True

while performing a penetration test for a client, you issue the command telnet smtp1.acame 25 to see what information is returned. what is this called?

Answers

While performing a penetration test for a client, you issue the command telnet smtp1.acame 25 to see port scan information is returned.

What is penetration test?

A penetration test, also known as a pen test or ethical hacking, is a legally sanctioned simulated cyberattack on a computer system undertaken to examine the system's security; this is not to be confused with a vulnerability assessment. The test is carried out to discover vulnerabilities, such as the possibility of unauthorised parties gaining access to the system's features and data, as well as strengths, allowing a full risk assessment to be carried out. Typically, the process determines the target systems and a specific goal, then evaluates available information and employs various methods to achieve that goal. A penetration test target can be either white or black.

To learn more about penetration test
https://brainly.com/question/26555003

#SPJ4

while you are performing troubleshooting, a program is not responding and will not close when the exit button is clicked. how can you end the frozen program without losing your other work?

Answers

Press Alt + F4 can be clicked when you want to end the frozen program without losing your other work.

The way to solve troubleshooting that you can follow is Select Start > Settings > Update & Security > Troubleshoot, or select the Find troubleshooters shortcut at the end of this topic. Select the kind of troubleshooting you want to do, then select Run the troubleshooter. Permit the troubleshooter to run and then answer any questions on the screen.

If you're having trouble with a specific piece of computer hardware, such as your monitor or keyboard, an easy first step that you can follow is to check all related cables to ensure they're exactly connected.

Learn more about troubleshooting at https://brainly.com/question/28157496

#SPJ4

mobile devices, fitness trackers, and apps are now widely available to assist individuals with behavior change. what behavioral strategy do mobile devices mainly impact?

Answers

The behavioral strategy that the  mobile devices mainly impact is option d: self monitoring.

What is Behavioral strategy?

Behavioral strategy integrates cognitive psychology and social psychology into the theory and practice of strategic management. By putting strategic management on a solid foundation of reasonable presumptions about human cognition, emotion, and social interaction, it seeks to increase the empirical integrity and practical applicability of strategy theory.

Self-monitoring is a personality attribute that entails the capacity to keep track of and control one's appearance, feelings, and actions in response to social contexts and circumstances. It entails being conscious of your actions and how they affect your surroundings. 2

A technique called self-monitoring trains pupils to evaluate their own conduct and keep track of the outcomes. Self-monitoring does raise or decrease the frequency, intensity, or length of existing behavior, but it does not produce new abilities or knowledge. Teachers also spend less time observing pupils' conduct as a result.

Learn more about behavioral strategy from

https://brainly.com/question/8211003
#SPJ1

See full question below

Mobile devices, fitness trackers, and apps are now widely available to assist individuals with behavior change. What behavioral strategy do mobile devices mainly impact? 36 2.38 Multiple Choice w Chain-breaking references Stimulus control Cognitive restructuring Self-monitoring

which of the following are access controls over sunset graphic's conversion process? multiple select question. partner issuing material can't modify bill of material. system must provide authorization number. partner authorizing production can't modify inventory records. direct labor costs must be recorded promptly.

Answers

Due to the obvious increased Recordkeeping requirements, the conversion process is inherently more complicated than either the sales and collection or the purchase and payment processes.

What is the conversion process?Data conversion is the process of converting computer data from one file type to another while retaining the original file's content and structure. When the target file supports the same constructs and features as the source file, this process is possible. The conversion process looks for the first rule that matches the incoming data and then executes the associated action. The action's output can then be processed further by other rules, depending on its type-out value and whether other rules are triggered by that value. The term "conversion technology" refers to a wide range of technologies that are used to convert solid waste into useful products, chemicals, and fuels.

To learn more about 'Conversion process' refer to

https://brainly.com/question/14157301

#SPJ4

The sharing of physical hardware by many organizations in the​ cloud, termed​ pooling, is accomplished with​ __________.

Answers

Virtualization enables the sharing of physical hardware by multiple businesses on the cloud, known as pooling.

What is physical hardware?

Physical hardware refers to an implementation in a physical device, including a component, that does not contain instructions or data other than those permanently implanted in the device or component. Physical gear, like as discs, CPUs, and networks, is virtualized and configured to meet the demands of clients. Large Application Programming Interfaces (APIs) that disguise the intricacies of dealing with the hardware on which the application is executing abstract nearly totally away the physical hardware underpinning the OS platform in most circumstances.

To learn more about physical hardware
https://brainly.com/question/10937439

#SPJ4

contoso's application development team has been tasked with building a mobile app that can interact with users spoken and written language. which service should they choose?

Answers

The application development team at Contoso has been charged with creating a mobile app that can interact with users' spoken and written language. They should choose azure cognitive services.

What is mobile app?
A mobile application, sometimes known as an app, is a computer programme or software application that is meant to run on a mobile device such as a phone, tablet, or watch. Mobile applications are frequently distinguished from desktop programmes, which are intended to operate on desktop computers, and web applications, which are intended to run via mobile web browsers rather than directly on the mobile device. Apps were originally intended for productivity aids such as email, calendar, and contact databases, but public demand for apps resulted in rapid expansion into other areas such as mobile games, factory automation, GPS and location-based services, order-tracking, and ticket purchases, resulting in millions of apps now available. Many apps necessitate Internet access.

Azure Cognitive Services are APIs, SDKs, and services that enable developers to create intelligent apps without prior AI or data science training.

To learn more about mobile app
https://brainly.com/question/26264955
#SPJ4

professor bin is attempting to load bags into the trunk of her car and seeks to load as many bags as possible. the bags are of various sizes (and are infinitely flexible, while maintaining the same volume). she plans to use a greedy algorithm to solve this problem. (a) state the greedy algorithm for this problem (b) does this problem have the greedy-choice property? why or why not? (c) does this problem have the optimal substructure property? why or why not? (d) would there be a greedy solution if instead of optimizing the number of boxes, she instead seeks to fill the largest possible fraction of the space in the trunk? why or why not?

Answers

a) The greedy algorithm for this problem would be to load the largest bags first, followed by the next largest, and so on until all the bags are loaded.

b) This problem does not have the greedy-choice property because there may be a situation where loading the largest bag first does not result in the optimal solution.

c) This problem has the optimal substructure property because the optimal solution to the problem can be constructed from optimal solutions to subproblems.

d) There would be a greedy solution if she instead seeks to fill the largest possible fraction of the space in the trunk because the largest bag would always be loaded first, followed by the next largest, and so on.

What is greedy algorithm?

A greedy algorithm would be any algorithm which follows the problem-solving heuristic of making the locally optimal choice at every stage. A greedy strategy does not produce an optimal solution in many problems, but a greedy heuristic could indeed yield locally optimal solutions which approximate a global optimal solutions in a reasonable period of time.

To learn more about greedy algorithm

https://brainly.com/question/15058584

#SPJ4

alan believes that an attacker is collecting information about the electricity consumption of a sensitive cryptographic device and using that information to compromise encrypted data. what type of attack does he suspect is taking place?

Answers

The type of attack that Allan suspects is Side-channel Attack.

What do you mean by a Side-channel attack?

An attack made possible by data loss from a physical cryptosystem. Timing, power use, and electromagnetic and auditory emissions are characteristics that could be used in a side-channel attack.

What is a cryptosystem?

A group of cryptography methods known as a cryptosystem are required to implement a specific security service, such as confidentiality. Three algorithms are typically used in a cryptosystem: one for key generation, one for encryption, and one for decryption.

Alan suspects that a hacker is gathering data on a sensitive cryptographic device's electrical usage and utilising it to decrypt data that has been encrypted. So he suspects a Side-channel attack.

Hence, Alan believes that the undergone attack is a Side-channel attack.

To learn more about cryptography from the given link

https://brainly.com/question/88001

#SPJ4

a simple risc microprocessor has 5 pipeline stages. assume it is perfectly pipelined. how much speedup will it achieve compared to the nonpipelined processor?

Answers

The speedup will it achieve compared to the nonpipelined processor is 100 ps (picosecond).

A microprocessor is a computer processor where the data processing logic and control are included on a single integrated circuit or a small number of integrated circuits. The microprocessor contains the arithmetic, logic, and control circuitry required to perform the functions of a computer's central processing unit. The three main components of microprocessor CPU, Bus and memory. The microprocessor, well-known as the Central Processing Unit (CPU), can be defined the brain of all computers and many household and electronic devices.

You can learn more about A microprocessor at https://brainly.com/question/1305972

#SPJ4

Briggs is scrolling through his social media feed and sees a quote and gives it a "thumbs up." the quote does not mean what he thinks it does. what might be a future consequence of the permanence of his social media activity? invitations to several social events a failing grade in algebra ii targeted ads for a product related to the quote deleted account and all activity permanently deleted

Answers

Students and young adults who use social media frequently suffer from melancholy, low self-esteem, low confidence, appearance anxiety, body dissatisfaction, loneliness, and FOMO, or the fear of missing out.

What are the consequences of using social media?

Spending more time on social media can increase the risk of cyberbullying, social anxiety, depression, and exposure to inappropriate content. Social media may become addictive. When you play a game or do a chore, you try your best to do it well.

Students and young adults who use social media frequently suffer from melancholy, low self-esteem, low confidence, appearance anxiety, body dissatisfaction, loneliness, and FOMO, or the fear of missing out.

It is simple to develop an addiction, and studies have shown that students who use social media excessively may containing a various of issues, including poor sleep, eye fatigue, negative body image, depression, anxiety, cyberbullying, and more.

To learn more about social media refer to:

https://brainly.com/question/3653791

#SPJ4

the library where kara works is planning to add a maker space where members can share equipment and services to create crafts. kara randomly selected members from their database, then contacted them to ask what kinds of equipment and services they would be most likely to use. what type of observational study is this?

Answers

Kara randomly selected members from their database, then contacted them to ask a sample survey of equipment and services they would be most likely to use.

What is database?

A database is a structured collection of data that is stored and accessed electronically in computing. Small databases can be kept on a file system, whereas large databases are kept on computer clusters or in the cloud. Database design encompasses both formal techniques and practical considerations, such as data modelling, efficient data representation and storage, query languages, sensitive data security and privacy, and distributed computing issues such as concurrent access and fault tolerance.

Since data is collected from a random sample, so this is the type of observational study.

To learn more about database

https://brainly.com/question/26096799

#SPJ4

Complete Question

The library where Kara works is planning to add a maker space where members can share equipment and services to create crafts. Kara randomly selected members from their database, then contacted them to ask what kinds of equipment and services they would be most likely to use. What type of observational study is this? Choose 1 answer:

A) retrospective study

B) A prospective study

C) A sample survey

D) None of these.

in 2001, a worm exploited vulnerabilities in microsoft internet information services (iis) to infect over 250,000 systems in under nine hours. what was this worm called?

Answers

the worm was known as "code red"

a data mart is a(n): enterprise-wide data warehouse. smaller system built upon file processing technology. data warehouse that is limited in scope. generic on-line shopping site.

Answers

A data mart is a data warehouse that has a limited scope.

Data mart:

A data mart is a structure/access pattern used to retrieve client-facing data in data warehouse systems. While data warehouses have an enterprise-wide depth, data marts only have information for a specific department.

A limited-scope data warehouse whose data are obtained by choosing and summarising data from a data warehouse or via independent extract, transform, and load operations from source data systems. A data mart containing data retrieved from the operational environment that does not have the benefit of a data warehouse.

So, the right answer of the question is C.

To learn more about data mart
https://brainly.com/question/28166657

#SPJ4

The __________ search operator is used to search for two things at once and match both items.



AND


OR


ALSO

Answers

The AND search operator is used to search for two things at once and match both items.

What is search operator?
A character or a string of characters utilized in a search engine query to focus the search is known as a search operator (also known as a search parameter). Operators are characters and sequences of characters that express actions or cause actions to be done in computer science and mathematics. In search, boolean operators are frequently employed. For instance, the symbol AND indicates that the search results' Web pages must have both the word or phrase that comes preceding it and the word (or phrase) that comes after it. NOT denotes that the word or phrase that follows it shouldn't appear on pages in search results. Instead of pages that contain both or all of the terms in the query, the OR symbol specifies that the pages in the search engine results should include any terms on either side.

To learn more about search operator
https://brainly.com/question/28484453
#SPJ13

as an administrator, you need to create highly available storage spaces that connect to directly attached storage on the hosts. which powershell command would you use?

Answers

The PowerShell command could be used by enabling Cluster Storage Spaces Direct.

What is Storage Spaces Direct?

In your converged and hyperconverged IT infrastructure, you can share storage resources by using Storage Spaces Direct, a software-defined storage solution. It allows you to create a software-defined storage pool from the internal storage discs on a cluster of physical servers (2–16).

What is PowerShell used for?

PowerShell is frequently used as a scripting language to automate system management. In CI/CD setups, it is frequently used to create, test, and deploy solutions as well. On the PowerShell is based. Common Language Runtime for NET (CLR).

A cluster's highly available Storage Spaces that employ directly attached storage can be enabled using the Enable-Cluster Storage Spaces Direct cmdlet.

Therefore, as an administrator, you need to use the Enable-Cluster Storage Spaces Direct command.

To learn more about the Powershell from the given link

https://brainly.com/question/29221154

#SPJ4

A few risks that do NOT arise when we connect to the Internet are
O stolen PII or credit card data
O spam
O viruses
O farming

Answers

The correct answer would be farming
the answer is farming because that has nothing to do w the internet

polish cryptanalysts developed strategies to attack the rotor machine ciphers in the 1930s. cryptanalysts from other allied countries improved on these techniques at what location?

Answers

Cryptanalysts from other allied countries improved on these techniques at Blechley, UK.

What is cryptanalysis?

Cryptanalysis is the technique of studying information systems in order to comprehend their hidden characteristics. Cryptanalysis is a technique for breaking into cryptographic security systems and gaining access to the contents of encrypted messages, even when the cryptographic key is unknown. Cryptanalysis covers, in addition to mathematical analysis of cryptographic algorithms, the study of side-channel attacks, which do not target holes in the cryptographic algorithms themselves, but rather exploit weaknesses in their implementation. Cryptanalysis methods and techniques have evolved dramatically during the history of cryptography, adjusting to increasing cryptographic complexity, beginning with pen-and-paper methods and progressing to machines such as the British Bombes and Colossus computers at Bletchley Park during World War II.

To learn more about cryptanalysis
https://brainly.com/question/17489685

#SPJ4

_____ elements may not be equally distributed; however, they can still promote some form of equilibrium by placing numerous small items on one side of the page and just a few large objects on the other side.


Symmetrical


Emphasized


Contrasting


Asymmetrical
HURRY IM TIMED

Answers

Asymmetrical elements may not be equally distributed; however, they can still promote some form of equilibrium by placing numerous small items on one side of the page and just a few large objects on the other side. The correct option is D.

What is asymmetrical elements?

Asymmetrical balance occurs when different visual images are used on either side of a design and the image still appears balanced.

A design must have unequal visual weight on either side to be considered asymmetrical, but those unequal visuals must balance each other.

Although asymmetrical elements are not evenly distributed, they can still promote some form of equilibrium by placing many small objects on one side of the page and only a few large objects on the other.

Thus, the correct option is D.

For more details regarding asymmetrical balance, visit:

https://brainly.com/question/27961150

#SPJ1

what is the primary goal of change management? question 16 options: preventing security compromises allowing rollback of failed changes keeping users informed of changes maintaining documentation

Answers

The primary goal of change management is to successfully introduce new procedures, items, and company strategies while limiting adverse effects.

The systematic strategy and application of knowledge, resources, and instruments to deal with change is known as change management. It entails developing and implementing company policies, structures, processes, and technology to address changes in the business environment and the outside world.

Leading the "human side" of significant change within an organization entails more than project management and technical duties carried out to implement organization changes. The main objective of change management is to successfully introduce new procedures, items, and company strategies while limiting adverse effects.

Most major firms engage in continual change management efforts, yet this concept might be perplexing to those who aren't directly involved. Change management is a more reactive and erratic process than project management, which has a formal framework and adheres to a set schedule organization. Since change management activities frequently aim to be discrete, staff members might not even be aware that change management is happening.

To know more about change management click on the link:

https://brainly.com/question/11239217

#SPJ4

write a complete main method that does the following: 1. takes command line arguments (strings) and determines which string is the longest. 2. if there is not at least one command line argument, throw an illegalargumentexception with an appropriate message.

Answers

Writing a complete main method that does 1, takes command line arguments (strings) and determines which string is the longest. and 2, if there is not at least one command line argument, throw an illegal argument exception with an appropriate message

import java.util.Scanner;
public class Question1{
   public static Scanner scn=new Scanner(System.in);
   public static void main(String[] args){
       if(args.length < 2) {
           System.out.println("IllegalArgumentException:Not Enough
Arguments");
           System.exit(0);
       }
       String str1=args[0];
       String str2=args[1];
       int count1=0,count2=0;
       for(int i=0;i<str1.length();i++){
           if(Character.isDigit(str1.charAt(i))) count1++;
       }
       for(int i=0;i<str2.length();i++){
           if(Character.isDigit(str2.charAt(i))) count2++;
       }
       if(count1>count2){
           System.out.println("The first string has more digits.");
       }
       else if(count2>count1){
           System.out.println("The second string has more digits.");
       }
       else{
           System.out.println("Both strings have same number of digits.");
       }
   }
}

What is main method?
In Java, the main() methodserves as the program's entry point. Every Java programme has a minimum of one class and one main function. Typically, only one class needs to get a main method in an application made up of numerous classes. To put it another way, just one class in a complex programme needs to have a main() function to get things going. Complex programmes can have dozens of classes. As a result, your programme begins in the main() method of Java.

To learn more about main method
https://brainly.com/question/13112530
#SPJ4

what is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain?

Answers

A requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain is referred to as proof of work (PoS).

What is a blockchain?

A blockchain can be defined as a digital and dynamic financial system framework that is designed and developed for recording and maintaining transactions that are associated with or made through the use of a bitcoin, usually as a database.

What is proof of work (PoS)?

In Computer technology, proof of work (PoS) can be defined as a requirement that ensures that expensive computer calculation (mining) which are to be performed are well defined, so as to help end users create a new set of trustless transactions on a blockchain or distributed ledger.

In conclusion, proof of work (PoS) helps to enforce transparency and data integrity on a blockchain or distributed ledger.

Read more on blockchain here: brainly.com/question/25700270

#SPJ1

you are working as a file server administrator. you are backing up the files on the server when you observe numerous inappropriate photos and videos stored on the corporate share drive by the user jsmith. these files are clearly in violation of the company's aup. what should you do first

Answers

A few steps that a company can follow if its files are clearly in violation:

Identify the Source AND Extent of the Breach. Alert Your Breach Task Force and Address the Breach ASAP. Test Your Security Fix. Inform the Authorities and ALL Affected Customers. Prepare for Post-Breach Cleanup and Damage Control.

The first step to stop an attack from spreading within your network, the first step should be to take your network offline and if possible, isolate the affected servers. Change the credentials for all your critical accounts and servers.

You can learn more about the steps of the data breach at https://brainly.com/question/4760534

#SPJ4

what do organizations or individuals who provide information over the internet use to designate where resources such as servers and documents are located?

Answers

The internet use to designate where resources such as servers and documents are located?
URL - Is used to locate the document and server through the internet.
MAC - Address is the physical address of the machine it does not indicates the where the document is.
TCP - Transport Control Protocol is used to transfer the packet from source to destination.
CSS - Cascading Style Sheet is used to style the web page.

What is internet?
The Internet (or internet) is a system of worldwide connected computer networks that communicate with one another using the Internet protocol suite (TCP/IP). A wide range of electronic, wireless, or optical networking technologies are used to connect private, public, academic, business, or government networks with local to global reach. The World Wide Web (WWW), which is made up of interconnected hypertext documents and applications, as well as electronic mail, phone service, and file sharing, are just a few of the many information resources and services available on the Internet. The research commissioned by the US Department of Defense in the 1960s to enable computer time-sharing and the invention of packet switching are the roots of the Internet.

To learn more about internet
https://brainly.com/question/21100247
#SPJ4

you need to view detailed information for the hr directory in the root (/) directory. type ls -l / at the prompt to answer the following questions: what is the directory size? what is the modified date?

Answers

HR - The directory size is 4096 and the modified date is Nov 28.

What is HR?
The group of individuals who work for a given organisation, business sector, industry, or economy is referred to as its human resources. Human capital, or the knowledge and abilities that people possess, is a more specific idea. Manpower, labour, personnel, colleagues, or simply "people" are comparable concepts. An organization's human resources department (HR department) handles human resource management, supervising various employment-related tasks like ensuring that labour laws and employment standards are followed, conducting interviews, managing employee benefits, organising employee files with the necessary paperwork for future use, and managing some facets of recruitment (also known as talent development) as well as employee offboarding. They act as a liaison between a company's management and its workers.

To learn more about HR
https://brainly.com/question/25443563
#SPJ4

Other Questions
does lead melt in atoms or molecules a user complains that he cannot access a particular web site, although he is able to access other web sites. at which layer of the osi model should you begin troubleshooting the problem? during its exponential growth phase, a certain bacteria can grow from 5000 cells to 12000 cells in 10 hours. at this rate, how long will it take to grow 50000 cells A plaintiff alleges the defendant committed a tort by acting negligent which caused monetary damages to the plaintiff. Where would this case be heard?. The perimeter of a rectangle is 82 cm the length is 1 cm more than three times the width find the length and the width of the rectangle Why does Oepidus want to seek and avenge laius muderer I am going to have to send you a photo of the problem during the session because it is to large to crop here. Exercise 1: What's In2.Marks temperature goes 1.5C higher from the normal body temperature. What is Marks temperature now?A. 38.5CB. 37.5CC. 36.5CD. 36.5C your card gives you a bonus of 0.4%. what is your actual bonus if you charge $3,397.75 on your credit card? Please help thank you 24. The temperature in F on 20 days during the month of Junewas as follows:70 F, 76 F,74 F, 74 F,76 F,78 F,74 F,76 F,70 F, 70 F, 72 F,78 F, 76 F,74 F,74 F, 78 F, 80 F,80 F, 76 F78 F What is the mode of temperature for the month of June? 2. Mr. Cole took a walk with his wife. They walked 4.4 miles in 1.4 hours. What was their average speed inmiles per hour? What emotions is the writer feeling at the end of the war? What are their hopes and fears? a client asks the health care provider why his lower legs look purple. the health care provider will base the response on which pathophysiologic principle? Is there other electron configurations that has similar ionization energy as nitrogen? Problem: A school has a student to teacher ratio of25:5. If there are 155 teachers at the school, howmany students are there?Mike's AnswerCarlos's Answer25 .5 1551552555x = 3875x=77525x = 775x=31There are 31 students at the school.There are 775 students at the scheel.Who is correct? Mike or Carlos? Explain the error thatwas made. juan went out to eat dnner,and the meal cost $60.00.If juan recived a 18% discount,what was the total value of the discount what is the difference between implicit and explicit details about John F .Kennedy's Dream about going to the moon or putting someone on the moon? Riley rented folding chairs and tables for an event. She rented a total of 56 chairs and tables. She paid $2.25 per chair and $8.50 per table and paid a total of $176.00.Write a system of equations to model this situation.Enter your equations in the space provided. Enter only your equations.+-.Iyx rr fr) Every rational number is positive.A. TrueB. False