What happens when the memory queue of a device fills up and new network traffic is received?

Answers

Answer 1

Answer:

The device would be overflowed with requests and sometimes you would either need to shut it down or config it to not receive certain requests. It's most likely someone ddos attack if you need a cause.

Explanation:


Related Questions

Some dialog boxes and the backstage area contain a _____ button, labeled with a question mark (?).

Answers

Some dialog boxes and the backstage area contain a help button, labeled with a question mark.

What is a dialog box?

A dialogue box can be defined as a pop-up menu that opens up as a temporary feature due to an application or required of an application.

The help option is appearing on a file that is depicted with a question mark describing that it contains all the information that the person will need or the queries that person is having, and it can solve the data which is being presented to them.

The help menu can even explain each and every feature that is present in the software.

Learn more about dialog box, here:

https://brainly.com/question/28445405

#SPJ1

After conducting a qualitative risk assessment of your organization, you recommend purchasing cybersecurity breach insurance. what type of risk response are you recommending?

Answers

The type of risk response that you are recommending is the transfer risk.

What is Cybersecurity?

Cybersecurity may be defined as the strategy of protecting computers, servers, mobile devices, electronic systems, networks, data, etc. from malicious attacks and hackers.

According to the question, the recommendation of purchasing cybersecurity insurance demonstrates transferring risk.

But if Sally had to manage the reduction in the likelihood of the events, she would definitely be reducing the risk of mitigation strategy.

Therefore, transfer risk is the type of risk response that you are recommending here with respect to Sally.

To learn more about Cybersecurity, refer to the link:

https://brainly.com/question/28004913

#SPJ1

The if function evaluates a certain condition and returns the value you specify if the condition is true, and another value if the condition is false. True or false?.

Answers

The if function evaluates a certain condition and returns the value you specify if the condition is true, and another value if the condition is false. .True

IF is one of the logical functions that examines a given condition and returns one result if the condition is TRUE and a different value if it is FALSE. It enables you to logically compare a value to what you anticipate by checking for a condition and returning a result if it is True or False. If function is mainly used in excel to make excel formulas.

Learn more on logical functions here: https://brainly.com/question/6878002#

#SPJ4

A(n) ________ is a commercially available set of software programs that eliminate the need for a firm to write its own programs for business functions.

Answers

A(n) pre-written, precoded, is a commercially available set of software programs that eliminate the need for a firm to write its own programs for business functions.

What is software?

Computer software is software that is made for the working of computer functions. These software programs are of different types, and they contain many things that help in the better performance of computers.

Thus, a set of software programs that are commercially accessible and that are "pre-written" or "precoded" reduce the need for a company to build its own programs from scratch to perform business operations.

To learn more about software, refer to the link:

https://brainly.com/question/14798210

#SPJ1

Could you run Genshin on a sd card?

Answers

Answer:

brainly is for homework

Explanation:

( also you can )

Formal changes to a project scope is called

Answers

Answer:

Scope change is an official decision made by the project manager and the client to change a feature, to expand or reduce its functionality. This generally involves making adjustments to the cost, budget, other features, or the timeline.

Explanation:

no explanation

Sophia notices that the public bus she takes to get to her volunteer work is
often late. She decides to interview someone at the city planner's office to
find out why this route seems to be understaffed. How did Sophia identify a
topic of interest for an interview?
OA. She concentrated on what was affecting her.
B. She accepted the interview topic her teacher assigned.
C. She concentrated on current events.
D. She focused on a hobby.
SUBMIT

Answers

A. She concentrated on what was affecting her, seems the most correct, as the problem is affecting her.

BUT, C could also be correct too..

Kari listens as her photography teacher discusses the pixel count of an image file. What is her teacher MOST LIKELY covering in class?

Answers

Since, Kari listens as her photography teacher, the thing that her teacher will MOST LIKELY be covering in class is Image pixel (Image size).

What does pixels mean in photography?

The term  Pixel is known to be used in digital imaging, a pixel(or picture element) is known to be a term that connote the smallest item of information in an image.

Therefore, Since, Kari listens as her photography teacher, the thing that her teacher will MOST LIKELY be covering in class is Image pixel (Image size).

Learn more about Image pixel  from

https://brainly.com/question/13187073

#SPJ1

file were we create rule sets

Answers

Answer:

Create a new rule set

You can create a new rule set file from the New File dialog:

Select File > New > File, or press Ctrl+N.

In the New File dialog box, select the General category on the left, and then select Code Analysis Rule Set.

Select Open.

The new .ruleset file opens in the rule set editor.

Explanation:

help

True or False:
In the Value Field Settings dialog
box, it is possible to give a custom
name to the summary field in the
PivotTable.
True
False

Answers

True because it true it literally tells you

Which of these can best help you understand yourself?

Answers

A  person can understand him or herself better by taking a personality test.

What is a personality test?

The issue that faces a lot of persons especially the young is the quest for self awareness and understanding. Not a lot of persons have been able to understand themselves and hence they are unable to deploy their full potentials.

The only path to self awareness is a personality test. This is the sort of test that helps the taker to be able to appreciate the subtle areas of his or her personality by responding to some personal questions or participating in some common activities that are a part of the personality test.

At the end of the test, the individual must have gotten a firm grasp on what are the peculiarities of his or her intricate personality features.

Hence, a person can understand him or herself better by taking a personality test.

Learn more about personality test:https://brainly.com/question/14034432

#SPJ1

give a 5 samples of welded metal and write there Uses/function/purpose

pls answer this TwT

Answers

Answer:

.aluminum

As the most abundant metal on earth, aluminum is used in a variety of applications. Aluminum has an unusually great ability to resist corrosion, which makes it durable and less prone to damage over time.

2.steel

Perhaps the most common metal used in welding projects, steel has many qualities that make it ideal for this process. Steel is relatively cheap, which makes it a popular choice. It also has a high tensile strength, which means that it can withstand a great deal of stress before it breaks.

3.cast iron

Cast iron is, as expected, a type of iron. Often, the term cast refers to materials that have been shaped for a particular purpose. As a material, cast iron has a relatively low melting point, which makes it a great candidate for welding.

4.Most copper is used in electrical equipment such as wiring and motors. This is because it conducts both heat and electricity very well, and can be drawn into wires

5.Brass

Brass is commonly used for decorative purposes primarily because of its resemblance to gold

Explanation:

Write code that sets the value of a variable named result to the sum of the values in the variables num1 and num2, unless that sum is in the range 20 to 30, inclusive, in which case set result to 0. Assume num1 and num2 already have values.

Answers

The code that sets the value of a variable named result to the sum of the values in the variables num1 and num2, unless that sum is in the range 20 to 30, inclusive, in which case set result to 0. Assume num1 and num2 already have values will be:

if 20 <= num1 + num2 <= 30:

   result = 0

else:

   result = num1 + num2

What is coding?

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming (i.e., the source code). It is also the name given to the source code after a compiler has prepared it for computer execution (i.e., the object code).

Computer communication is done through coding. Coding is the process through which humans instruct computers and other devices what to do. Additionally, the websites, applications, and other technologies that we use on a daily basis are programmed using computer code.

Learn more about coding on:

https://brainly.com/question/26642771

#SPJ1

A nonconforming unit of work is one that has no defects or errors. true/ false

Answers

It is false that a nonconforming unit of work is one that has no defects or errors.

What is nonconforming unit of work?

Non-Conforming Work is defined as any Work discovered by the Owner or any Subsequent Owner to be defective or not conforming to the requirements of a Contract.

There are various types of errors, or bugs, that can prevent computer programs from functioning properly. Runtime, syntax, and semantic errors are three of the most common types of errors.

Non-conforming use refers to an existing land use that was legal under a previous zoning scheme but does not comply with the current zoning scheme.

Thus, the given statement is false.

For more details regarding error, visit:

https://brainly.com/question/13286220

#SPJ1

Companies such as ORACLE, Amazon Web Services, and Microsoft offer courses to
learn about their technologies.
True
False

Answers

Companies such as ORACLE, Amazon Web Services, and Microsoft offer courses to learn about their technologies is a true statement.

What are Microsoft courses?

The world of Microsoft technology  is known to be one that is made of a lot of courses that people cab be able to choose a path and  learn. They include:

Microsoft Cloud.Microsoft Security.Dynamics 365.

Therefore, Companies such as ORACLE, Amazon Web Services, and Microsoft offer courses to learn about their technologies is a true statement.

Learn more about Microsoft  from

https://brainly.com/question/20659068

#SPJ1

What type of software allows users to perform general purpose tasks, like web browsing, typing documents, or gaming?

Answers

Answer: System Software

What is the least commonly modified settings and the most commonly modified settings in the bios?

Answers

The CPU clock setting in BIOS is one of the least frequently altered settings.

What are BIOS default settings?The technique can also be used to roll back your system after making other modifications because resetting your BIOS returns it to the most recent configuration that was saved. Whatever the circumstance, keep in mind that resetting your BIOS is a straightforward process for both novice and experienced users. A Load Setup Defaults or Load Optimized Defaults option is also available in BIOS. By selecting this option, your BIOS is brought back to its factory defaults, loading default settings tailored for your hardware. Any modifications you've made, such as changing the boot sequence, will be undone if you clear the BIOS settings. But don't worry, Windows won't be impacted. When finished, be sure to click the Save and Exit button to make your changes permanent.  

Hence, The CPU clock setting in BIOS is one of the least frequently altered settings. This is so that the correct clock speeds for the processors may be set by the current processors, which automatically recognize the bus. The boot device and boot order configuration are the BIOS settings that are most frequently changed.

To learn more about BIOS, refer to:

https://brainly.com/question/13103092

#SPJ4


ATTRIB is international command. True or false ? ​

Answers

Answer: True

Explanation:

hope this help

Answer:

TRUEE

Explanation:

What is the problem when network computers can access websites using an ip address only?

Answers

The DNS server is down

explanation: quizlet never lies

quiz 3.5: question 1 1 try left given two int variables distance and speed, write an expression that divides distance by speed using floating point arithmetic, i.e., a fractional result should be produced.

Answers

The fractional result that should be produced is (double) distance/speed. A fraction is a numerical value that is a part of an entire. A whole is appraised by dissecting it into several components.

What does fractional value mean?A fraction is a numerical value that is a part of an entire. A whole is appraised by dissecting it into several components.For instance, the symbol for half of a complete number or item is 12. Simply put, writing a number in fraction form is known as fractional notation. When neither a nor b are equal to 0, it is expressed as a/b. A fraction has two parts: a numerator and a denominator.The numerator, which is the number above the line, indicates how many parts of the whole are being discussed. The whole number component of the mixed number is created from the quotient (without the remainder). The fractional part's numerator is changed to the remainder.

To learn more about fractional, refer to:

https://brainly.com/question/17220365

#SPJ4

A hacker could obtain passwords without the use of computer tools or programs through the technique of:____.

Answers

The hacker could obtain passwords without the use of computer tools or programs through the technique of social engineering. The correct option is A.

What is social engineering?

Social engineering is based on the disclosure of private information through dialogues, interviews, inquiries, and other means in which a user may be indiscreet about his or her own or another person's personal data.

A sniffer is a computer tool that monitors network traffic. Backdoors are computer programs that hackers leave behind to exploit vulnerabilities.

Trojan horses are computer programs that pretend to replace a real program; as a result, the program's functionality is not authorized and is usually malicious in nature.

Thus, the correct option is A.

For more details regarding social engineering, visit:

https://brainly.com/question/15347749

#SPJ1

Your question seems incomplete, the missing options are:

A. social engineering.

B. sniffers.

C. backdoors.

D. trojan horses

________ programs should be run frequently to avoid the unexpected loss of files from your devices.

Answers

Backup programs should be run frequently to avoid the unexpected loss of files from your devices.

Check more about backup program below.

What does a backup program do?

Backup software are known to be a kind of a computer programs that are said to be used to carry out a backup service in a computer. Its help to back up information against loss or theft.

Note that they are often used to make supplementary real copies of files, databases or the total computers.

Therefore, based on the above, Backup programs should be run frequently to avoid the unexpected loss of files from your devices.

Learn more about Backup from

https://brainly.com/question/5849057

#SPJ1

Ruthie needs to buy a new laptop for her college courses. one course requires her to use the full, installed version of microsoft office. which operating systems should she choose for the laptop?

Answers

Ruthie needs to buy a new laptop for her college courses, and Windows operating systems should she choose for the laptop installed version of microsoft office.

What is an operating system?

The operating system can be defined as the hardware of the software of the computer that is there in a computer system job, it helps in coordinating between the various software.

Ruthie needs to buy a new laptop then she should have a whole Microsoft Office for that they would need her Windows software which is all the data, PowerPoint presentation, Outlook, classroom, will be provided.

This window system will help her operate fully in her lecture as well as in the assignment.

Learn more about operating system, here:

https://brainly.com/question/6689423

#SPJ1

ana buys a computer from a surplus sale event at a local university. when she boots it up, it asks for a password even before the operating system loads. how can she overcome this problem?

Answers

The way that she can overcome this problem is to format the system.

What are other ways that this can be done?

A person can also make use of the BIOS password and this is one that id often configured by inputting the BIOS Setup program.

Note that if the above password is unknown, it can be deleted by placing a jumper in course of the two motherboard pins. Some motherboards aids BIOS password removal by the act of removing the CMOS battery.

Therefore, The way that she can overcome this problem is to format the system.

Learn more about BIOS password from

https://brainly.com/question/22200917

#SPJ1

which word pair from list 2 best complete the folowing analogy

Answers

The word pair from list 2 that best complete the analogy is option C= report: describe.

What Constitutes a Good Analogy?

A successful analogy strikes a balance between two opposing objectives: recognizability as well as representativeness. The best analogies are well known. They are known to be use as a well-known idea or notion to describe an abstract thought.

Note that an analogy is seen as a form of a verbal word that describes the cognitive act of transferring knowledge or the meaning from one subject to another.

Therefore, The word pair from list 2 that best complete the analogy is option C= report: describe.

Learn more about analogy from

https://brainly.com/question/12010013
#SPJ1

A person, place, object, event or concept about which the organization wishes to maintain data is called a(n):______

Answers

A person, place, object, event or concept about which the organization wishes to maintain data is called an entity. The correct option is D.

What is an entity?

A lightweight persistence domain object is an entity. In a relational database, an entity typically represents a table, and each entity instance corresponds to a row in that table.

The entity class is the primary programming artifact of an entity, though entities can use helper classes.

An entity is a person, place, object, event, or concept about which the organization wishes to keep data.

Thus, the correct option is D.

For more details regarding entity, visit:

https://brainly.com/question/14972782

#SPJ1

Your question seems incomplete, the missing options are:

A. relationship.

B. object.

C. attribute.

D. entity.

a student uses a flash drive to store assignments/homework. the student plugs in the flash drive, reboots the computer, and it displays a message indicating the operating system is not found. what are two possible ways of fixing the problem relatively quickly?

Answers

The two possible ways of fixing the problem relatively quickly are a USB flash drive can store important files and data backups, carry favorite settings and use its software and hardware.

What is the operating system?An operating system (OS) is the program that controls all other application programs in a computer after being installed into the system first by a boot program. Through a specified application program interface, the application programs seek services from the operating system (API). Examples of operating systems that let users utilize applications like Microsoft Office, Notepad, and games on a computer or mobile device include Windows, Linux, and Android. To execute simple programs like browsers, the computer must have at least one operating system installed. The software needed to run application applications and utilities is known as the operating system.It serves as a conduit for more effective communication between computer hardware and application software.UNIX, MS-DOS, Windows 98/XP/Vista, Windows NT/2000, OS/2, and Mac OS are a few examples of operating systems.

To learn more about operating system, refer to:

https://brainly.com/question/22811693

#SPJ4

10. It's usually easier to keep your software updated Instead of having to remove a virus or reinstall your software.
True
False

Answers

Answer:

True

Explanation:

Or install an antivirus

If you store your data in the cloud your files are saved locally true or false?

Answers

Answer:

True

Explanation:

Because it is saved in your cloud so you can only see it however it still is locally seen because if you want to fix it they have to see it and they can access it

in chapter 10, the class clocktype was designed to implement the time of day in a program. certain applications, in addition to hours, minutes, and seconds, might require you to store the time zone. derive the class extclocktype from the class clocktype by adding a member variable to store the time zone called timezone. add the necessary member functions and constructors to make the class functional. also, write the definitions of the member functions and the constructors. finally, write a test program to test your class.

Answers

A program to test your class is given below:

The Program

#include <iostream>

class clockType

{

public:

void set_hour(int h);

int get_hour();

void set_minut(int m);

int get_minut();

void set_second(int s);

int get_second();

clockType() {};

clockType(int h,int m,int s)

{

 h = ((h < 0) ? 0 : (h > 23) ? 23 : h);

m = ((m < 0) ? 0 : ( m> 59) ? 59 : m);

 s = ((s< 0) ? 0 : (s > 59) ? 59 : s);

 hour = h;

 minut = m;

 second = s;

}

private:

int hour{ 0 };

int minut{ 0 };

int second{ 0 };

};

inline void clockType::set_hour(int h)

{

h = ((h < 0) ? 0 : (h > 23) ? 23 : h);

hour = h;

}

inline void clockType::set_minut(int m)

{

m = ((m < 0) ? 0 : (m > 59) ? 59 : m);

minut = m;

}

inline void clockType::set_second(int s)

{

s = ((s < 0) ? 0 : (s > 59) ? 59 : s);

second = s;

}

inline int clockType::get_minut()

{

return minut;

}

inline int clockType::get_second()

{

return second;

}

inline int clockType::get_hour()

{

return hour;

}

int main()

{

// example test program

// set time 22:54:12

clockType test(22, 54, 12);

std::cout << "Set time :" << test.get_hour() << "h" << test.get_minut() << "m" << test.get_second() << "s" << std::endl;

// set time 18:18:54

test.set_hour(18);

test.set_minut(18);

test.set_second(54);

std::cout << "Set time :" << test.get_hour() << "h" << test.get_minut() << "m" << test.get_second() << "s" << std::endl;

system("pause");

return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Other Questions
9 to the power of -3 as a fraction Bruce, whose primary job is supervising a small production group, is not getting cooperation from all members on the cross-functional team he leads. In particular, keylani, a senior marketing manager, seems to resist his direction and tries to influence team members to go in another direction. The source of conflict in this case may be?. how pollutant gas become water pollution Why is important for scientists to write detailed procedures? In the selection from The Once and Future King, how does Sir Ector react when Kay tells him that he pulled the sword from the stone? The cost of two compact disks and three mp3 albums is $75.00. The cost of three compact disks and four mp3 albums is $106.25. What is the cost of one compact disk? Analyze the quote: World goin' one way, people another a) The quadratic x^2-4-21 can be written in the form (x+a)^2+b find the values of a and bb) Hence, or otherwise, solve the equation x^2-4x-21=0 What is the most expensive dog breed in the world?SamoyedDalmation DobermanGerman Shepherd ---------------call this in english discover or invent medicines ? Is y= 2/3 (x) a linear equation Help now...you have into 9/27/22 9:1020 points BONUS IF YOU ANSWER QUICK!Which phrase tells a major function of the endomembrane system?producing and storing energydirecting the cells activitiesmanufacturing proteinstransporting substances in a cell why does oil float in water? Identify each practice as promoting either the goal of openness or the goal of transparency. If a bank pays 62 cents in non-interest expense per dollar of income, its _______ is equal to:_____.a. overhead ratiob. b. net non-interest margin c. c. burden d. efficiency ratio e. noninterest expense ratio Which file has as its primary purpose to present comparative financial reports on a historic basis? Think about a time when you tried to communicate an idea to someone who didnt respond the way you had hoped. In three to four sentences, describe the situation and what you could have done differently to communicate your message. Jonathon collected 4 1/2 kg of seashells. If he gives 2 3/4 kg of seashells to his friend, what is the weight of theremaining seashells that Jonathon has? What would be a reasonable critique of the conflict approach? Its assessment that the interests of children, adolescents, and adults will ultimately merge is unrealistic. It is too focused on latent functions. It seems to paint life as a zero-sum game; in other words, it assumes that when one entity benefits, another loses. It is too focused on manifest functions.