During a routine network scan, a security administrator discovered an unidentified service running on a new embedded and unmanaged HVAC controller, which is used to monitor the company's datacenter:

Answers

Answer 1

Answer:

The answer is "Patch and restarts the unknown service".

Explanation:

Please find the complete question in the attached file.

SNMP would be a means to share information with different devices on the network. It allows systems to interact, and although machines are physically executing code.

SNMP Trapping was warning notifications that are sent to a central repository, the "SNMP manager" from either a remote SNMP enabled device. The trigger could warn them that a controlled device overheats.

Its key form of contact between both the SNMP control devices-SNMP Agent and SNMP Director-is trap communications. If you will note, SNMP is a possible protocol to also be shared with supervisors and agents.

During A Routine Network Scan, A Security Administrator Discovered An Unidentified Service Running On

Related Questions

The formula to convert Fahrenheit (F) temperature to Celsius (C) is C=F-32/1.8 which line of code will accomplish this conversion?

O Celsius = (Fahrenheit - 32) / 1.8

O Celsius = (Fahrenheit - 32) * 1.8

O Celsius = Fahrenheit - 32 * 1.8

O Celsius = Fahrenheit - 32 /* 1.8

Answers

I think it might be the first option

The formula code that coverts the temperature unit of Fahrenheit to Celsius is Celsius = (Fahrenheit - 32) / 18. Therefore, option A is correct.

What are the units of measuring temperature?

Temperature is given as the unit of measuring the hotness or coolness of a body. The SI unit of measuring temperature is Kelvin. The equivalent converts the temperature unit between Kelvin, Celsius, and Fahrenheit.

The code of line that helps in accomplishing the conversion of Fahrenheit to Celsius is,

Celsius = (Fahrenheit - 32) / 18.

Thus, option A is correct.

Learn more about Celsius to Fahrenheit, here:

https://brainly.com/question/14272282

#SPJ2

How long will it take to send 1.1 million bits using the Stop and Wait ARQ protocol if each packet contains 1000 bits and the only delay is propagation delay

Answers

Answer:

1.111 second

Explanation:

We know propagation speed =  [tex]$2 \times 10^8$[/tex] m/s

                                                 =  [tex]$2 \times 10^5$[/tex] km/s

One packet size = 1000 bit

Distance between sender and the receiver = 1000 m = 1 km

The channel data rate = 1 Mbps =   [tex]$1 \times 10^6$[/tex] bits per sec

There is no transmission delays of ACKs,

The time to transmit one data packet  = [tex]$T_{trans}+2T_{prop}$[/tex]

Here, time to transmit frame = [tex]$T_{trans}$[/tex]

          propagation time = [tex]$T_{prop}$[/tex]

Therefore, [tex]$T_{trans}$[/tex] = [tex]$\frac{bits\ per\ frame}{transmission \ speed}$[/tex]

                            = [tex]$\frac{1000}{1 \times 10^6}$[/tex]      = 0.001 seconds

[tex]$T_{prop}=\frac{distance\ between\ sender\ and\ receiver}{propagation \ speed}$[/tex]

         = [tex]$\frac{1}{2 \times 10^5}$[/tex]            

         = 0.000005 seconds

Therefore, T = 0.001 +2(0.000005)

                     = 0.00101 seconds

We known, 1.1 million bits= 1100 packets

Therefore to transmit 1 million bits = 1100 x 0.00101

                                                         =  1.111 second

Computer programmers are responsible for writing code that tells computers commands to follow.

True
False

Answers

True is the correct answer.

Answer:

True

Explanation:

the answer is true

__________consist of two or more computer-controlled machines or robots linked by automated handling devices such as transfer machines, conveyors, and transport systems.

Answers

Answer:

Flexible manufacturing systems

Explanation:

Flexible manufacturing systems which can be written in short form as (FMS) is the combination of more two or more machines which are controlled by computer.

The overall performance of the system is directed by computers thereby directing each work to the appropriate route where the needed activity will be carried out.

Write a class named TestScores. The class constructor should accept an array of test scores as its argument. The class should have a method that returns the average of the test scores. If any test score in the array is negative or greater than 100, the class should throw an IllegalArgumentException. Demonstrate the class in a program.

Answers

import java.util.Arrays;

public class TestScores {

   public static float getAverage(float arr[]){

       float total = 0;

       for (float x : arr){

           if (x < 0 || x > 100){

               throw new IllegalArgumentException();

           }

           else{

               total += x;

           }

           

       }

       return (total / arr.length);

   }

   

   public static void main(String [] args){

       float arr[] = {1,100,0,43,-1};

       System.out.println(getAverage(arr));

   }

}

In the main method we test our getAverage method with the arr array. You can replace the values in the arr array and test your own values. I hope this helps!

The code example of the implementation of the TestScores class in Java is shown below:

What is the class?

java

import java.util.Arrays;

public class TestScores {

   private int[] scores;

   public TestScores(int[] scores) {

       this.scores = scores;

   }

   public double getAverage() {

       int sum = 0;

       for (int score : scores) {

           if (score < 0 || score > 100) {

               throw new IllegalArgumentException("Invalid test score: " + score);

           }

           sum += score;

       }

       return (double) sum / scores.length;

   }

   public static void main(String[] args) {

       int[] scores = {85, 90, 92, 88, 95};

       TestScores testScores = new TestScores(scores);

       try {

           double average = testScores.getAverage();

           System.out.println("Average test score: " + average);

       } catch (IllegalArgumentException e) {

           System.out.println("Error: " + e.getMessage());

       }

   }

}

Read more about  class  here:

https://brainly.com/question/26580965

#SPJ2

3.7) BEST ANSWER BRAINLIEST

your answer will be reported if it is ridiculous


Which is NOT a question that might help a network engineer isolate which layer in a network has a problem?



Is the user operating the software correctly?


Is everything plugged in?


Are messages arriving in a timely manner?


Are the data displaying in a garbled manner?

Answers

Explanation:

i think it is are messages ariving in a timely manner?

Answer:

Is the user operating the software correctly?

Explanation:

Thats the correct one for edge

Which method accepts a function that combines all the elements in the array and then returns the resulting value?
a. filter()
b. reduce()
c. map()
d. forEach()

Answers

Answer:

The method that accepts a function that combines all the elements in an array and then returns the resulting values is map() method.

Explanation:

map()  method creates a new array with the results of calling a provided  function for every array element. map() element calls function for each array element to compute value.

What is the output password=sdf345

Answers

Answer:what do you mean

Explanation:

Answer:

False

Explanation:

If you put it in python your answer would be false

Problem1: How Much Snow? Snow is falling at the rate of 0.8 inch per hour. Evaporation occurs at the rate of 2% per hour. Complete program HowMuchSnow.java to calculate how many inches of snow are on the ground after snowing a number of hours.

answer in coding on j creator

Answers

public class HowMuchSnow{

    public static void main(String []args){

       System.out.println("Hello World");

       System.out.println("There are "+ SnowFall(3) + " inches of snow on the ground.");

    }

    public static float SnowFall(float hours){

        float falling = 0.8f - (0.8f * 0.02f);

        return falling * hours;

    }

}

I hope this helps!

According to Jonathan Zittrain, technology that cannot be modified by the user who wishes to create new uses for it is:_______

a. Sterile
b. Open
c. Generative
d. Clean

Answers

Answer:

a. Sterile

Explanation:

From a lecture that was given by jonathan zittrain, he described a sterile technology as a type of technology that will not develop. And going further he says that a y third party cannot do any sort of coding for such a technology. It works the same way always. He described it in these words 'what you see is what you get'.

is check payable a liability ?​

Answers

Answer:

Yes

Explanation:

Accounts payable (AP) is money owed by a business to its suppliers shown as a liability on a company's balance sheet.

A pay check is a liability

Why are computers popular in education these days?

Answers

Answer:

They have unlimited information

Explanation:

Answer:

computers are popular in education these days because students of this generation prefer to learn from mobiles and computers. They can gain lots of extra knowledge than from their book from computers and internet. If they get confused in some problems, they can just search it in Google and get the answer.

What type of cipher takes one character and replaces it with one character, working one character at a time

Answers

Answer: An algorithm

Explanation: ​An asymmetric encryption key that does have to be protected. ​An algorithm that takes one character and replaces it with one character.

Which is an algorithmic form of a procedure?
A.
function calc_area
B.
area=length*breadth
C.
call function calc_area
D.
return area to the main function
E.
end function calc_area

Answers

Answer:

b

Explanation:

im doing the test right now

Answer:

B is correct!

Explanation:

This type of file is created when you save your word processing document.
access,
data,
program, or
system

Answers

Answer:

data

Explanation:

Answer:

Data

Explanation:

Files contain data and stuff you have saved to the device.

True/False: When an object's internal data is hidden from outside code and access to the data is restricted to the object's methods, the data is protected from accidental corruption.

Answers

Answer:

True.

Explanation:

In object-oriented programming language, a process known as encapsulation is used for the restrictions of the internal data of a software program from the outside code, therefore preventing an unauthorized direct access to the codes. This is achieved through the use of classes.

When an object's internal data is hidden from outside code and access to the data is restricted to the object's methods, the data is protected from accidental corruption.

Question #6
Multiple Choice
What will you see after on the next line?
>>> int("3.9")

O 4
O an error statement
O 3
O 3.9

Answers

Answer:

an error statement

Explanation:

just took it. have a good one!

You will see after on the next line is an error statement. The correct option is second one.

What is on error statement?

"On error statement" enables an error-handling and specifies the location of the error within a procedure. The On Error statement is used in unstructured error handling and can be used instead of structured exception handling. S

An error statement is occurred after the code entered as >>> int("3.9")

Thus, the correct option is second one.

Learn more about  on error statement.

https://brainly.com/question/13735734

#SPJ2

. Because Maya knows that the most important part of an e-mail message is the subject line, she ________.

Answers

Answer:

adjust the subject line if the topic changes after repeated replies

Explanation:

E-mail (electronic mail) message is usually reffered to as a text, usually informal which can be sent electronically or received through a computer network. e-mail message is usually brief but at same time some do contains attachment which allows sending of images as well as spreadsheet. One of the important part of Email message is the Subject Line which serves as the introduction that gives the intent of the message, it is this Subject Line that will show when the recipient is going through the list of emails in his/her inbox. It allows the recipient to know what is conveyed in the body of the message.There are usually action information as well as dates at the end of the email message as well as closing thought.In the case of Maya from the question, Because Maya knows that the most important part of an e-mail message is the subject line, she adjust the subject line if the topic changes after repeated replies, since the subject line convey the information in the body text, so the subject line need to be adjusted to fit the topic as it changes.

Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated based on the first two numbers received as parameters.

Answers

Complete Question:

Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated based on the first two numbers received as parameters.

In other words, your program will keep asking for a new number until the number that the user inputs is within the range of the <firstParameter> and <secondParameter>.

The method should present a message asking for the value within the range as:

Please enter a number within the range of (<firstParameter> and <secondParameter>):

Note that <firstParameter> should be changed by the value received as that parameter and <secondParameter> as well.

If the user inputs a value that it is lower than the first value, the program will show the message:

The input number is lower than <firstParameter>

Note that <firstParameter> should be changed by the value received as that parameter

If the user inputs a value that it is greater than the first value, the program will show the message:

The input number is greater than <secondParameter>

Note that <secondParameter> should be changed by the value received as that parameter.

You do not need to modify anything in the main method, you just need to write the missing parts of your new getIntVal method.

Answer:

#include<iostream>

using namespace std;

void getIntVal(int num1, int num2) {

int num;

cout<<"Please enter a number within the range of "<<num1<<" and "<<num2<<": ";

cin>>num;

while(num<num1 || num>num2) {

if(num<num1) {

cout<<"The input number is lower than "<<num1<<endl;

}

if(num>num2) {

cout<<"The input number is greater than "<<num2<<endl;

}

cout<<"Please enter a number within the range of "<<num1<<" and "<<num2<<": ";

cin>>num;

}

cout<<"Output: "<<num;

}

int main() {

int num1,num2;

cout<<"Enter lower bound: ";

cin>>num1;

cout<<"Enter upper bound: ";

cin>>num2;

getIntVal(num1, num2);

return 0;

}

Explanation:

Programming Language is not stated, So, I answered using C++

I've added the full source code as an attachment where I use comments to explain difficult lines

Tessa heard that a hacker recently broke into her friend’s e-mail account. Tessa uses her home computer to manage her personal business and wants to make sure her information and online accounts are protected from hackers.

What steps should Tessa take to protect her accounts? Check all that apply.

change passwords frequently
review privacy settings
change current screen name
purchase another computer
adjust safety settings

Answers

Answer:
Adjust privacy settings
Change passwords frequently
Adjust safety settings
Explanation:
Hope that helped

The steps Tessa should take to protect her accounts are:

Change passwords frequently

Review privacy settings

Adjust safety settings

Change current screen name

Given that Tessa want to protect her accounts from the hackers,

We need to provide the steps to do the same,

To protect her accounts from hackers, Tessa should take the following steps:

a) Change passwords frequently: Regularly changing passwords for her online accounts can help prevent unauthorized access.

Strong, unique passwords that include a combination of letters, numbers, and symbols should be used.

b) Review privacy settings: Tessa should review the privacy settings on her online accounts and ensure that they are set to the appropriate level of security.

This includes adjusting who can see her personal information, posts, and photos.

c) Adjust safety settings: Tessa should check the safety settings on her computer and enable features like firewalls and antivirus software to protect against malware and other threats.

d) Change current screen name: If Tessa is using a screen name that can be easily linked to her personal information, it's advisable to change it to something less identifiable to reduce the risk of targeted attacks.

e) Purchase another computer: While purchasing another computer may be an option in certain cases, it's not a necessary step for general account protection.

However, if Tessa's current computer is outdated or lacks essential security features, upgrading to a more secure device could be beneficial.

Therefore, the steps Tessa should take to protect her accounts are:

Change passwords frequently

Review privacy settings

Adjust safety settings

Change current screen name

Learn more about Hacking click;

https://brainly.com/question/28311147

#SPJ2

Write a single statement that prints outsideTemperature with a or - sign. End with newline. Sample output with input 103.5: 103.500000

Answers

Answer:

Written in C Language

#include <stdio.h>

int main() {

   float temp;

   printf("Temperature: ");

   scanf("%f",&temp);

   temp-=(temp + temp);

   printf("%.6f", temp);

    return 0;

}

Explanation:

This line declares temp as float

   float temp;

This line prompts user for input

   printf("Temperature: ");

This line gets user input

   scanf("%f",&temp);

This line negates the user input

   temp-=(temp + temp);

This line prints out the required output with a - sign

   printf("%.6f", temp);

Match the correct term from the list below with the correct statement.

Answers

Answer:

self-serving bias

feedback

self-fulfilling prophecy

communication

context

What is the best way to create a pseudocode plan within your program?

Use a flowchart in a file.

Use comments in IDLE.

Use comments in a file.

Use a flowchart in IDLE.

Answers

The  best way to create a pseudocode plan within your program is option c: Use comments in a file.

What is a pseudocode?

Programmers can be set up or design their coding logic using pseudocode to organize and outline it. Learning about pseudocode can aid your development process if you create software.

The term pseudocode is one that often go through some of its fundamental building blocks.

Note that in IDLE or a file, you cannot be able to add flowchart shapes. In IDLE, you could build a pseudocode plan with comments, but you couldn't go back and add lines of code where they were missing.

Therefore, Making a file enables you to plan out your pseudocode using comments, and then fill it in with the actual code.

Hence, The  best way to create a pseudocode plan within your program is option c: Use comments in a file.

Learn more about pseudocode plan from

https://brainly.com/question/27646993
#SPJ1

Answer:

Comments in a file

Explanation:

summarize how to write well-organized paragraphs

Answers

Decide on a controlling idea and create a topic sentence. ...
Explain the controlling idea. ...
Give an example (or multiple examples) ...
Explain the example(s) ...
Complete the paragraph's idea or transition into the next paragraph.

Give a recursive algorithm that takes as input two positive integers x and y and returns the product of x and y. The only arithmetic operations your algorithm can perform are addition or subtraction. Furthermore, your algorithm should have no loops.

Answers

Answer:

#include <stdio.h>

int product(int x,int y)

(

 if(y==1)

    return x;

 else

    return (x+product(x,y-1));

)

int main()

(

 int a,b;

 scanf("%d %d",&a,&b);

 printf("%d\n*,product(a,b));

return 0;

)

Explanation:

See above code as explanatory enough.

What do type in?
What are the HR tags
What are the h3 headings

Answers

Answer:

HR tags are horizontal breaks in a document.

Your code should look like this:

<html>

<head>

</head>

<body>

<h1>

first heading

</h1>

<h3>

other headings

</h3>

</body>

</html>

<style>

body {

   background-color: #505693;

   color: #FFFFFF;

}

hr {

   background-color: #6A5ACD;

}

</style>

The _________ contains logic for performing a communication function between the peripheral and the bus.

Answers

Answer:

I/O module

Explanation:

The I/o module is known as the input/output module. Such a module is usually connected to system on one end and and in the other end, one or more input/output devices are connected. Such a technique helps to exchange data between the processor and also the input /output device. It helps in information transfer between the internal storage and also the external storage.

The best way to make sure text stand out in eNotes would be to
A. resize it.
B. printit it
C. bold it
D. strike-through​

Answers

The answer is C.Bold it

Answer: (D) bold it.

Explanation:

Infrastructure as a Service (IaaS) replaces the _________ of the computer hierarchy with an Internet-based infrastructure.A. digital logic level through user levelsB. digital logic level through high-level language levelsC. system software level through high-level language levelsD. digital logic level through machine levels

Answers

Answer:

D. digital logic level through machine levels

Explanation:

In Computer science, the modern computer systems are basically organized in levels and this is known as computer hierarchy. The three levels in a chronological order are operating system level, machine language level and digital (hardware) logic level.

A digital logic level is the most fundamental level of a computer and can be defined as a level of the computer hierarchy which typically comprises of wires and gates. In digital circuits, the two (2) main logic level of the binary logic state are logical low and logical high which is typically denoted by the number 0 and 1 respectively.

In Computer science, the Infrastructure as a Service (IaaS) replaces the digital logic level through machine levels of the computer hierarchy with an Internet-based infrastructure. This is what enables various users to access resources that are available over the internet through the use of cloud storage.

Write a program to simulate a simple calculator. In your program ask the user to enter an operation selected from the menu, ask for two operands. Calculate the result and display it on the screen. Here is a sample run

Answers

Answer:

Written in Python:

opcode = input("Enter operator: +,-,*,/")

operand1 = float(input("Operand 1: "))

operand2 = float(input("Operand 2: "))

if opcode == "+":

    print(operand1 + operand2)

elif opcode == "-":

    print(operand1 - operand2)

elif opcode == "*":

    print(operand1 * operand2)

elif opcode == "/":

    print(operand1 / operand2)

else:

    print("Invalid Operator")

Explanation:

This prompts user for operator

opcode = input("Enter operator: +,-,*,/")

The next two lines prompt user for two operands

operand1 = float(input("Operand 1: "))

operand2 = float(input("Operand 2: "))

This performs + operation if operator is +

if opcode == "+":

    print(operand1 + operand2)

This performs - operation if operator is -

elif opcode == "-":

    print(operand1 - operand2)

This performs * operation if operator is *

elif opcode == "*":

    print(operand1 * operand2)

This performs / operation if operator is /

elif opcode == "/":

    print(operand1 / operand2)

This displays invailid operator if input operator is not +,-,* or /

else:

    print("Invalid Operator")

Other Questions
Estimate the square root to the nearest hundredth.1. 138=2. 405=3. 800=4. 1150=5. 6500=6. 580=7. 300=8. 250=9. 284=10. 794=thank you Whats the distance of the points (2,-9) and (-1,4) -2m+13=2m-3i dunno the answer the us constitution creates a balance between the state and national governments. This is an example of ____ please give me soft lyric's that is not copyright 3. The most immediate influence of Roman culture on our daily lives can be found in oura. literatureb. architectureC. Scienced. legal system Who captured New Orleans for the Union in 1862?A. David FarragutB. Robert E. LeeC. Ulysses S. GrantD. William Sherman In a honeybee colony, their are drones, workers, and a queen.Each type of bee fulfills its own specialized role, but all worktogether for the benefit of the hole hive. EMERGENCY! Please give me the correct answer! (Physical science!!!)Wetlands have characteristics of both dry land and of bodies of water. How have amphibians adapted to this environment?A.They can lay their eggs underwater or on dry land.B.Water can pass through their lungs; they have night vision.C.Water can pass through the skin; they have lungs.D.They retain a set of gills their whole lives. Can someone tell me the answer plz Ill give you brainlist and points NO WRONG ANSWERS What time was the Jew curfew during the holocaust? Which selection is written in the first-person point of view?A. Maya and Ava waited to jump off the high dive. Ava was next inline, and Maya stood right behind her. Ava wanted to be brave, butjumping off would be easier if she had the strength of a friend.Maya sensed Ava's fear and reached out for her hand.B. Danny stood at the edge of the diving board, trying to ignore theline of swimmers behind her. Swallowing her fear, she closed hereyes and jumpedC. Charles decided that he would count to three and jump. His heartpounded with fear and his hands trembled, but he took a deepbreath and launched himself off the board into the water below.D. The water swallowed me in its coolness. As I paddled back to thesurface, my fear of jumping was replaced by my joy at conqueringthe high dive. All I could think about was climbing back up therefor another jump The PTA has $1,374 to spend on student planners. If each planner costs $3, how many planners can the PTA purchase? why did some people choose pastoral nomadism as a way of life? PLEASE ANSWER DUE TODAY I will give you brainliest if you do this correct for me como participo el pueblo en los acontecimientos de los estados generales Which statement best describes the relationship between city-states in the Mayan civilization? Each city-state was part of a large trade network, Each city-state was part of a centrally controlled empire. Each city-state shared resources to create a large Mayan military Each city-state shared a king with the other Mayan city-states. What could be a result of hyperventilating?A.) You could pass out underwaterB.) You could lose your ability to float.C.) You could be disqualified for cheating.D.) You could be the fastest swimmer in the race. Y +2 = 5/9(x-2)What is this?