subject

What are the primary IP addresses for DNS servers hosted on the x128bit, iskytap and cloudparadox domains

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 24.06.2019 21:30
Computer security/cybersecurity1) each of the following code fragments contains a number of security vulnerabilities. for each fragment, identify these security vulnerabilities and, for each vulnerability, discuss at least one way that it could be improved. note that in your discussion of how each vulnerability could be improved, you do not need to re-write a new version of the program in c; simply discuss your solution, either in pseudocode or in 1-2 sentences.a) /* file descriptor leak */#include #include int main(int argc, char *argv[]){ char *filepath = argv[0]; char *shellpath = argv[1]; file *passwords; passwords = fopen(filepath, "r"); /* read the password and do something with it */ /* . . */ /* fork and execute alternative shell */ execl(shellpath, "shell", null); }b)#include /* assume the following function is written for an electronic storefront. the user will enter the id of the item to be ordered, as well as the quantity of units that they would like to purchase. the program will then lookup the price for the price for the item using a predefined function, and return the total cost of the order.*/int gettotalcost(){ char itemid[9]; int price, unitsordered, cost; printf(" enter the 9-digit id of the item to be ordered: "); scanf("%s", & itemid); /* lookup the price according to the itemid */ price = getpricebyid(itemid); printf(" enter the quantity of units to be ordered: "); scanf("%d", & unitsordered); cost = price * unitsordered; return cost; }c)#include /* the following function is intended to return a user's full name by concatenating the user's first and last name into a single string and then returning that string. */char *getfullname(char *firstname, char *lastname, int max_len){ char fullname[max_len]; strcpy(fullname, firstname); strcat(fullname, " "); strcat(fullname, lastname); return fullname; }d)#include /* the following code snippet runs through the list of cli arguments entered and displays them to the console. */int main(int argc, char *argv[]){ int i; printf("you've entered the following arguments: "); for(i = 0; i < argc; i++){ print(argv[i]); printf("\n"); } /* */}
Answers: 2
question
Computers and Technology, 25.06.2019 08:10
Which of the following is a difference between the systems development life cycle (sdlc) and extreme programming (xp)? the sdlc model has a separate planning and analysis phase, whereas xp combines both the phases into one phase.in the sdlc model, changes cannot be made to a system once it is delivered to the user, whereas the xp method delivers the system to the users and then make changes suggested by the user.the sdlc model develops an entire system at once, whereas xp uses incremental steps to improve an information system's qualitydevelopers following the sdlc model cannot go on to the next phase until the current phase is finished, whereas in xp, developers can move to any phase from the current phase.
Answers: 1
question
Computers and Technology, 25.06.2019 08:10
The __ is the section of a cpu core that performs arthimetic involving integers and logical operations
Answers: 2
question
Computers and Technology, 25.06.2019 08:50
A-12.3 an american spy is deep undercover in the hostile country of phonemia. in order not to waste scarce resources, any time he wants to send a message back home, he removes all the punctuation from his message and converts all the letters to uppercase. so, for example, to send the message, “abort the plan! meet at the dark cabin.” he would transmit given such a string, s, of n uppercase letters, describe an efficient way of breaking it into a sequence of valid english words. you may assume that you have a function, valid(s), which can take a character string, s, and return true if and only if s is a valid english word. what is the running time of your algorithm, assuming each call to the function, valid, runs in o(1) time?
Answers: 3
You know the right answer?
What are the primary IP addresses for DNS servers hosted on the x128bit, iskytap and cloudparadox do...
Questions
Questions on the website: 13722362