conhection timed out; no servers la bè Pea @arya:~$ DNS cache poisoning has happem Your workstation cannot contact the nameser The domain does not e:
Q: Write a program that will take this dictionary: gradePoints = {"A":4,"B":3,"C":2,"D":1,"F":0} and ...
A: The average of the academic is determined by dividing the total amount of quality points earned for ...
Q: Write a program in Matlab that can read 33 numbers Then it prints the numbers that are divisible by ...
A: MATLAB CODE: a=33; disp('Given number is divided by 5' + a); number = 1; while number<=a if mo...
Q: Design a signed n-bit multiplier.
A: Design a signed n-bit multiplier.
Q: arn about the benefits and drawbacks of batch and online data input approaches. A demonstration of s...
A: Intro Compare and contrast the benefits and drawbacks of batch versus online data input methods. The...
Q: Should organizations use software service providers for all their software needs? Why or why not? Wh...
A: answer is
Q: a. Encryption is used when it wished to prevent unauthorized users exploiting or tampering with the ...
A: two techniques used in encryption are-
Q: 2. In the following graph (Write code in C) F A E D H J I (i) Traverse using Depth First Search algo...
A: The Answer is
Q: As part of your introduction to engineering class's term project, make a PowerPoint presentation wit...
A: Given: If your introduction to engineering class includes a term project, create a PowerPoint presen...
Q: Assume a company's authentication system is Kerberos. What happens if the AS (authentication server...
A: Introduction: Kerberos is an authentication protocol that operates across a client/server network. I...
Q: e user to enter the marks of a student in a subject. If the marks entered are greater than 70 then p...
A: Below a C Program that asks the user to enter the marks of a student in a subject. If the marks ent...
Q: Draw the Enhanced Entity–Relationship (EER) model and the relational schema for the case study below...
A: Answer: There are total 6 Entities which are: Entities: branch, supervisor, staff, member, rent, vid...
Q: Find the equivalent Being a life is a sufficient condition for it to ma imnortant.
A: Lets see the solution.
Q: Write a description of the eight most important concepts in computer architecture.
A: EXPLANATION AND ANSWER: The Eight Great Ideas in Computer Architecture are as follows: Design for Mo...
Q: Create a device for the output.
A: Device for generating output: The term "output device" refers to a device that allows the user to se...
Q: (C PROGRAMMING ONLY) 4. Pyramid Schemes by CodeChum Admin They said pyramids were created by alien...
A: Program Approach:- 1. Include header file 2. Create the user-defined function whose name is void gen...
Q: How can I find out which thread models my operating system (Windows 7) uses (one-one, one-many, or m...
A: Introduction : There are four basic thread models : Single Thread Model at the user level: Model fo...
Q: Code a C program of input an x integer and display is divisible by 3 or not
A: #include <stdio.h> int main(){ int x = 0; printf("Enter an integer: "); scanf("%d", &...
Q: reate a sample distributed database in oracle where Applications in multiple sites will use the que...
A: A Distributed Database Management System (DDBMS) manages the distributed database and provides the d...
Q: Consider two advantages of employing linear search rather than binary search in your research
A: Introduction : Significant Distinction Binary Search should be used to sort the input data, not Line...
Q: Java Programming - Using a nested loop, create a program that produces the following output: d.) ...
A: First loop: i: 3-1 Nested loop- j: 3-i
Q: The full name of A. I is
A: In computer science, when we use the term A. I A stands for Artificial = Something that is not natur...
Q: List the eight most important design principles for user interfaces. How would you rank them in term...
A: Eight fundamental rules for user interface design, ranked in order of importance.
Q: How to write a function that imports a data from a text file and load it into 5 parallel arrays For...
A: How to write a function that imports a data from a text file and load it into 5 parallel arrays Answ...
Q: Describe a high-level programming language in your own words.
A: High-level programming language:- Many dialects of the importance level are intended for use by huma...
Q: Computer Science A) If the values of c and d are given and the function Euclid(c,d) below is execute...
A: Code of Euclid GCD is in next Step.
Q: 1. What are the different number system? Briefly discuss each.
A: The solution for the above given question is given below:
Q: Draw a single diagram that illustrates how the following concepts are related: • Data • Database • D...
A: Database, data, or information is organized in such a way that allows for quick access and retrieval...
Q: Why is it important to categorized Network based on their size?
A: We are going to understand why we have categorised Network based on their sizes like LAN,MAN,WAN etc...
Q: Which entities in 5G cellular can request a retransmission of received information? Explain the rati...
A: 5G cellular: The fifth generation of cell towers, or 5G, is predicted to be one of the most advanced...
Q: Choose from the list below the expression that corresponds to Bernoulli's Principle (Worksheet 3, Q2...
A: According to me Option C is correct. Kinetic energy+pressure energy=constant
Q: What are the difficulties that a simultaneous multithreading architecture must handle in an operatin...
A: Simultaneous multithreading (SMT) is a method that uses hardware multithreading to improve the overa...
Q: ) Let us assume that we have a program of 100,000 instructions. Each instruction is independent from...
A: Here, we are going to find out the number of CPU cycles needed to execute the program. In pipeline p...
Q: Using SQL, develop and execute the following queries:
A: 1. select sname,sid from student where gpa>2.5 AND gpa<=3.5; 2. select s.sname,c.cname from ...
Q: Draw & Describe WIMAX, 1G to 5G, Leo,Meo,Geo & draw 16.1,2,6.
A: WiMAX: It stands for Worldwide Interoperability for Microwave Access (WiMAX) based on IEEE 802.16 se...
Q: 1. What do the abbreviations CPU and RAM stand for? 2. Is the RAM a component of the CPU? If yes, wh...
A: Introduction: The Central Processing Unit is abbreviated as CPU. Random Access Memory (RAM) is a kin...
Q: Consider the system of linear equations = x. In the following, let A denote the coefficient matrix i...
A:
Q: Explain concurrency and then discuss four design and management considerations that arise as a resul...
A: Concurrency: Concurrency means execution of multiple processes at same time. The running processess ...
Q: ation may be inputted directly into the system, saving time by eliminating the need for an intermedi...
A: Lets see the solution.
Q: Explain how the facts, dimensions, and characteristics are used in the star schema to make it more e...
A: Star schema is the major schema among the data store schema and it is least difficult. This schema i...
Q: Distinguish between User-visible registers and Control and status registers in a omputer system; and...
A: Introduction: Distinguish between User-visible registers and Control and status registers in a omput...
Q: gnetic disk.
A: given - Create a definition for magnetic disk.
Q: Problem 2. Show that the code given by the table below is not uniquely decodable Symbol A Encoding 0...
A: The encoding can be defined as the process of changing data into a specific format with the help of ...
Q: Create a C++ program that will check if the string or group of text is a palindrome or not. For exa...
A: PROGRAM EXPLANATION Include the header file. Define the main function. Take a string as input from ...
Q: Add a JTextField and a JTextArea to the frame. Initialize the field to an empty string and the text ...
A: Add a JTextField and a JTextArea to the frame. Initialize the field to an empty string and the text ...
Q: how to design a KMS system in any organization so that employees can utilize it but not rely on it
A: Knowledge management system: Knowledge management system deals with the storage and administration ...
Q: System software should be defined.
A: Computer software is classified into two broad categories: system software and application programme...
Q: Write a program that displays the employees Ids together with their first and last names. Use two cl...
A: Note:-As per policy, we are entitled to answer the first question only. 2). Program Approach:- 1. Cr...
Q: Given a positive integer n, the following rules will always create a sequence that ends with 1, call...
A: 1)Read the n value using int(input()) function 2)print n value 3)repeat while until n!=1 4) chec...
Q: Write a Python function that returns the position of the element in a vector of numbers nearest the ...
A: To implement vectorMeanPos(), list are used. For finding position of element in a vector of number n...
Q: What is the procedure for encrypting a file in S3?
A: Server-side encryption is data encryption at rest—that is, Amazon S3 encrypts your data as it upload...
Step by step
Solved in 2 steps with 1 images
- Computer Science Scenario: Using the iptables command, create a firewall for the local system that meets the following objectives, at least one identity-tagged screenshots are needed for each step: Allows incoming connections for the SSH and FTP ports from any system Allows incoming connections for the telnet port for any system in the 192.168.1.0/24 network Logs all other incoming connections Drops all other incoming connections by changing the default policy Note: Do not save the changes you make during this lab exercise.RootDC Replica Part#1: Create a script to promote the forest Root DC READ: o Be sure to Use a unique Domain name(pinacolada)and a network ID of 210.168.25.0 o The scripts must be hands off, meaning that all commands to promote the Domain Controllers must be in the script.For this question you will be creating and writing Chat serverfi'client program. The Server will beresponsible formaintaininglists ofwho is connected clients will be able to query this list. The server willbe responsible forforwarding messages betweenclients. Clients will be able to either broadcast message(to everyone), or send message to specific individual.ServerThe serveris responsible for allowing clients to register, query for existing clients, and deregister. It alsohandles forwarding messages as neededStarting the ServerYou shouldn’t needto do anything special here. Make sure you do not hardcode port, but let your serversocket choose an openport. Make sure you at the very least print out which port it is listening on, so youknow how to set up the clients to connectClientThe client code will involve opening socket whenit needs to connect to the server (registration, ask forconnected users, deregister). It will also need to continue listening on this socket for any messages…
- When does a proxy send an acknowledgement to a response and when does it simply forward the response without sending an acknowledgement?البوابة التعليمية الإلكترونية لجامعة الإسراء Ivy CouiUses Course I|ITOINTIulivn IVIIutenTI Applets is executed by the JVM, presented in the user browser Select one: of O True O False Database that matches IP addresses to host names called:The netstat command (available on Linux and Windows) displays a computer's active network connections. Explain how to use this command to see whether a web page is not closing connections that it has established or, if connection pooling is utilised, not returning connections to the pool. You should be aware that connection pooling may result in the connection not being terminated promptly.
- #find all IP addresses for invalid logins, then see which IPs are also used for scanning def compareInvalidIPs(): return True 3. The getinvalidLogins() method should find all IP addresses that are used for both invalid logins AND are blocked by the firewall. To get the invalid logins, you should use the log/auth.log file. For compareInvalidIPs, you should first extract all gzipped versions of auth.log* (meaning auth.log, auth.log.0, auth.log.1, etc.) using the extractLogFiles() method that you implement. Similarly, you will extract all gzipped versions of ufw.log* using the extractLogFiles() method for firewall logs. You will then compare the IPs found in each version. Here is the output for my solution code when executing the if __name__=="__main__" code branch. Your output should be similar.Which of the following entities become the victim of a successful DNS poisoning attacks? An end user who uses the victim recursive DNS server since it may receive and then use forged DNS record. A recursive DNS server since it may accept and cache a forged DNS response. A authoritative DNS server since it receives a large number of forged DNS responses from the attacker. A root DNS server since it receives a large number of forged DNS responses from the attacker.Types of DNS records are listed. Every case has a reason behind it. Can the same name be used for both a web server and a mail server?
- Given the following commands, explain what the purpose of the command is and give a typical use case for each: Show interface Show arp tracert Example: the “ping” command, uses the Internet Control Message Protocol and verifies layer 3 connectivity, and would typically be used by a Network Administrator who wants to test connectivity between devices when a new device has been added to a network or as a troubleshooting method when experiencing connectivity issues.Q1) Which task is performed by the dynamic routing protocols? * a. discover end devices O b. update routing tables O c. propagate host gateways O d. assign automatic IP addressing Q2) Which of the following is a static routing feature? * a. Security increases because only the network administrator may change the routing tables. O b. Configuration complexity decreases as network size increases. O c. Routing updates are automatically sent to neighbors. O d. Routing traffic load is increased when used in stub network linksThis Chain applies for all packets that are addressed to the firewall INPUT OUTPUT FORWARD This chain applies for all packets originating from firewall and going out of the server O INPUT ⒸOUTPUT FORWARD This chain applies for all packets passing through the firewall from other hosts on the network. The host with iptables is neither the source nor destination of the packet: mainly used to route packets through the machines on the network. INPUT OUTPUT Ⓒ FORWARD This jump target does not respond to a packet at all and does nothing with the packet. It an attack sends a packet. they would not get any response. ODROP ⒸREJECT This jump target responds with an ICMP Destination Unreachable back to the source. This indicates that a server exists, which is beneficial for troubleshooting and for attackers. DROP O REJECT