Java Please:
Create the AllDayEvent class, a subclass of the Event class to help you store an AllDayEvent.
This will keep the Event class functionalities, with one exception:
The constructor will receive the following parameters:
date - String format yyyy-MM-dd is the date when the event occurs;
name - String representing the name of the event;
When we call method EventDuration returns 24.
When we call getStartDate method returns the start date of the event - at 00:00:00.
To solve this problem you can use any class in java.util and java.text
import java.text.*;
import java.util.*;
import java.util.concurrent.TimeUnit;
class Event{
private Date startDate, endDate;
private String name;
public Event(String startDate, String endDate, String name) {
SimpleDateFormat format = new SimpleDateFormat("yyyy-MM-dd HH:mm:ss");
try {
this.startDate= format.parse(startDate);
this.endDate= format.parse(endDate);
} catch (Exception e) {
System.out.println("Data wrong format");
System.out.println(e.getMessage());
}
this.name= name;
}
public Date getStartDate() {
return startDate;
}
public Date getEndDate() {
return endDate;
}
public String getName() {
return name;
}
// Return the hourly data of an event
public final long eventDuration() {
long differenceInMs = Math.abs(endDate.getTime() - startDate.getTime());
return TimeUnit.HOURS.convert(differenceInMs, TimeUnit.MILLISECONDS);
}
}
// Your class here...
public class prog {
public static void main(String[] args) throws Exception {
Event = new AllDayEvent("2019-04-22", "asd");
System.out.println(e.eventDuration()); // 24
}
}

Answers

Answer 1

To create the AllDayEvent class as a subclass of the Event class in Java, you can modify the constructor and override the getStartDate and eventDuration methods.

The AllDayEvent class will keep the functionalities of the Event class but with specific behavior for all-day events. In the AllDayEvent constructor, you will receive the date and name of the event as parameters. The getStartDate method will return the start date of the event at 00:00:00. The eventDuration method will always return 24, representing the duration of an all-day event.

To implement the AllDayEvent class, you can extend the Event class and provide a new constructor that takes the date and name as parameters. Inside the constructor, you can use the SimpleDateFormat class from java.text to parse the date string into a Date object. Then, you can call the superclass constructor with the modified parameters.

To override the getStartDate method, you can simply return the startDate as it is since it represents the start date at 00:00:00.

For the eventDuration method, you can override it in the AllDayEvent class to always return 24, indicating a 24-hour duration for all-day events.

The given code in the main method demonstrates the usage of the AllDayEvent class by creating an instance and calling the eventDuration method.

To know more about Java inheritance click here: brainly.com/question/29798050

#SPJ11


Related Questions

Using NOT when searching allows you to___________.
A: search for subtraction math games.
B: eliminate unwanted topics to narrow down your search.
C: search for more than one topic.
D:narrow down your topic by combining words.

Apparently this is a Technology subject thing.

Answers

Answer:

Using NOT when searching allows you to......................

Explanation:

Use NOT in a search to: exclude words from your search. narrow your search, telling the database to ignore concepts that may be implied by your search terms. example: cloning NOT sheep.

B: eliminate unwanted topics to narrow down your search.

Name Detection
Apple
Apricot
Avocado
Banana
Breadfruit
Apple
Blackberry
Blackcurrant
Blueberry
Boysenberry C
urrant
Cherry
Cherimoya
Blueberry
Cloudberry
Coconut

INSTRUCTIONS: Using a single formula, detect all of the duplicates in the above list. If the term has already appeared in the list, then your formula should display it on the same row, if Norm thas appota should display

Answers

The formula "=IF(COUNTIF($A$1:A1,A1)>1,A1,"")" can be used to detect duplicates in the given list by displaying the duplicate terms in the adjacent column.

To detect duplicates in the given list using a single formula, you can use the COUNTIF function in Excel. Assuming the list starts from cell A1, follow these steps:

In cell B1, enter the following formula: =IF(COUNTIF($A$1:A1,A1)>1,A1,"")

Press Enter to get the result in cell B1.

Copy the formula in cell B1 and paste it down to cover all the cells in column B corresponding to the original list.

The formula checks if the count of occurrences of each term up to the current row is greater than 1. If it is, the term is displayed; otherwise, an empty string is displayed.

After applying the formula, you will have the duplicates displayed in column B, corresponding to the original list in column A.

Learn more about duplicates here:

https://brainly.com/question/32891254

#SPJ11

Carla has been improving the code for a website so that it will be more user-friendly. She’s now ready to ask permission to move her code to the repository. Which of these will she need?


a. a database

b. a collaborator

c. a pull request

d. a wireframe

Answers

Carla has been improving the code for a website so that it will be more user-friendly. She’s now ready to ask permission to move her code to the repository.  She needs a database permission. Hence option a is correct.

What is website?

Website is defined as a grouping of web pages and related information that is available on at least one web server under a single domain name. A website can be developed and maintained to serve a variety of objectives by an individual, group, company, or organization.

Database is defined as the collection of structured, electronically stored, ordered data on a computer system. A field is a data structure for one piece of data in a database table.

Thus, Carla has been improving the code for a website so that it will be more user-friendly. She’s now ready to ask permission to move her code to the repository.  She needs a database permission. Hence option a is correct.

To learn more about website, refer to the link below:

https://brainly.com/question/2497249

#SPJ1

Cybercriminals operate from Select 3 options . Undeveloped countries , developed countries, Africa and China, mostly Brazil and Russia, anywhere in the world

Answers

Answer:

Undeveloped countries, mostly Brazil and Russia, Africa and China,

Explanation:

Cybercrime is a computer-oriented crime where that involves the network and maybe to threaten, steal data, or any financial matter. As approx. 30% of cyber attacks come from China. While most of the cybercriminals and fraudsters are found in developing countries like Africa, India, and even Russia.

Reply to the comment with the following replace variation with variety

Answers

The term "variation" and "variety" may sound alike and similar but they have a different definition. Variation refers to the differences between individuals of the same species, while variety means the presence of many different types of something.

Hence, to replace "variation" with "variety," you will need to provide an explanation about different types of something.In a context where someone made a comment with the word "variation," you can reply using a phrase that uses the word "variety." For example, if the comment was, "I love the variation in colors in the sunset," you could reply, "I agree, the sunset's variety of colors is truly stunning.

It's amazing how different they can look each day. "When using the term "variety," it's essential to include a brief explanation to show the reader that you understand the definition of the word and how it relates to the context. Therefore, when using the phrase, you should aim for an explanation that is more than 100 words.

To know more about Variation visit:

https://brainly.com/question/11333978

#SPJ11

What parameter should you use to reload an application’s configuration files without restarting the system?

Answers

The parameter to reload an application's configuration files without restarting the system is usually "reload" or "restart" command, depending on the application.

The parameter commonly used to reload an application's configuration files without restarting the system is "reload" or "restart" command depending on the specific application and its configuration management system.

Reloading an application's configuration files without restarting the system is often desirable as it allows for changes to be applied to the application's behavior without interrupting its services or requiring a full system reboot.

The specific command and parameter used to reload the configuration files depend on the application and its configuration management system. Some applications may have built-in commands to reload configuration files, while others may require external tools or scripts.

For example, in Apache web server, the command "apachectl -k graceful" can be used to gracefully restart the server and reload the configuration files without dropping any active connections. Similarly, in Nginx web server, the command "nginx -s reload" can be used to reload the configuration files without interrupting the server's services.

In general, it's important to consult the documentation of the application or the configuration management system being used to determine the appropriate command and parameter for reloading configuration files. Additionally, it's recommended to test the reloading process in a non-production environment before applying changes to a live system to ensure that the application's services are not disrupted.

Learn more about Apache web server here:

https://brainly.com/question/9081826

#SPJ4

the repetition of a series of steps is called a(n) ____.

Answers

The repetition of a series of steps is called a loop.

In programming, a loop is used to execute a set of statements repeatedly until a certain condition is met. There are two types of loops: a for loop and a while loop. A for loop is used to execute a set of statements a specified number of times, while a while loop is used to execute a set of statements until a specific condition is met. The use of loops in programming can help reduce the amount of code needed to perform a task and can make the code more efficient.

This process can be applied to various fields such as mathematics, computer programming, and problem-solving. For example, in computer programming, a loop is used to iterate through a set of instructions multiple times until a certain condition is met. Overall, iteration allows for efficiency and optimization when performing repetitive tasks or improving upon a solution.

Learn more about programming here,

https://brainly.com/question/31515798

#SPJ11

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n):

Answers

Answer:

two-tiered client/server architecture

Explanation:

You are attempting to update a windows 10 workstation using windows update. The update fails with this message: "failure configuring windows updates. Reverting changes. " you reboot and try again but receive the same error. What should you try next? (choose two. )

Answers

If a Windows 10 workstation fails to update with the error message "failure configuring windows updates. Reverting changes," there are a few things that can be tried to fix the issue:

Run the Windows Update troubleshooter: The Windows Update troubleshooter is a built-in tool that can identify and fix issues related to Windows updates. To run the troubleshooter, go to Settings > Update & Security > Troubleshoot > Windows Update and select "Run the troubleshooter."

Reset Windows Update components: Sometimes, the Windows Update components can become corrupted, which can cause issues with updates. To reset the Windows Update components, open a Command Prompt window as an administrator and run the following commands in sequence:

arduino

net stop wuauserv

net stop cryptSvc

net stop bits

net stop msiserver

ren C:\Windows\SoftwareDistribution SoftwareDistribution.old

ren C:\Windows\System32\catroot2 catroot2.old

net start wuauserv

net start cryptSvc

net start bits

net start msiserver

These commands stop the Windows Update services, rename the SoftwareDistribution and catroot2 folders, and restart the services. This will reset the Windows Update components to their default settings.

The information security manager should be concerned about these update failures because they can leave the system vulnerable to security risks and exploits. To protect against these issues, it's essential to keep systems up to date with the latest security patches and updates. Additionally, regular system backups can help ensure that data is not lost in the event of an update failure.

To know more about Windows 10 click this link -

brainly.com/question/31563198

#SPJ11

if some aspect of a computer accounts for 50% of program execution time, what is the limit on how many times faster programs can run if engineers focus on improving that aspect?

Answers

If some aspect of a computer accounts for 50% of program execution time, the limit on how many times faster programs can run depends on how much the engineers are able to improve that specific aspect. Let's say the engineers are able to improve that aspect by a factor of "x."

If the aspect originally accounted for 50% of program execution time, after the improvement, it would account for 50% divided by "x" of the program execution time. This means that the improved aspect would now take up a smaller portion of the program execution time.

To calculate the limit on how many times faster the programs can run, we need to calculate the inverse of the portion of program execution time taken up by the improved aspect. So, the limit on how many times faster the programs can run would be 1 divided by (50% divided by "x").

In conclusion, the limit on how many times faster programs can run if engineers focus on improving an aspect that accounts for 50% of program execution time is 2 divided by the factor of improvement ("x").

To know more about  execution  visit :

https://brainly.com/question/11422252

#SPJ11

______ control is not displayed at the runtime but its event is fired automatically at the specific time interval .

Answers

Timer Interval Property is a control is not displayed at the runtime but its event is fired automatically at the specific time interval .

What is a timer tool?

TimerTools is known to be one that  is said to be aimed to aid a person to be able to manage their Countdowns and stopwatches.

What is a timer interval?

The INTERVAL-TIMER function is known to be that which returns the number of seconds and it begins from an arbitrary point in regards to time.

Note that in regards to the above, Timer Interval Property is a control is not displayed at the runtime but its event is fired automatically at the specific time interval .

Learn more about Timer from

https://brainly.com/question/1786137

#SPJ1

necesito ejemplos de actitud filosófica por favor

Answers

Answer:

La filosofía es una disciplina intelectual que estudia críticamente las cuestiones más básicas de la humanidad y la naturaleza. Preguntas fundamentales de la filosofía son, entre otras, las siguientes:

-¿Existe alguna realidad fuera de mis pensamientos?

-¿Qué es el conocimiento?

-¿Qué es la verdad?

-¿Qué hace que una acción sea valiosa?

-¿Los humanos y los animales tienen valor y son iguales o diferentes?

-¿Qué es el tiempo?

Así, el planteamiento y reflexión de este tipo de preguntas son claros ejemplos de actitud filosfófica.

Select the correct term to complete the sentence.
GUI and CLI are two types of
system BIOS
device drivers
user interfaces

Answers

Answer:

its user interface

Explanation:

Answer:

user interfaces

Explanation:

Which hexadecimal number is equivalent to the decimal number 11?

Answers

1011, hope that helps.

The refine area in the search tab of the ribbon provides quick options for the refining your search including?

Answers

The refine area in the search tab of the ribbon provides quick options for refining your search including Advanced Search, filter option, Outlook ribbon, etc.

What is the process of refining your search results?

The process of refining your search results describes the methodology through which you can also select a category within the Refine group to further filter your search results:

From, only shows results from a specific person. The subject only shows results based on the subject. Has Attachment – only shows emails that have attachments.

Based on your preference, you can use Advanced Search by clicking the filter button on the right side of the search box. Alternatively, the Outlook ribbon will change to show the Search tab and you use any of the options in the Refine group to refine your search results.

Therefore, the refine area in the search tab of the ribbon provides quick options for refining your search including Advanced Search, filter option, Outlook ribbon, etc.

To learn more about Outlook search, refer to the link:

https://brainly.com/question/24165533

#SPJ1

3g twn requires every voice packet to be integrity protected
true or false

Answers

False.  3G networks do not require every voice packet to be integrity protected. However, 3G networks do provide integrity protection for voice calls through the use of encryption.

The encryption algorithm used in 3G networks is called the KASUMI algorithm, which is used to encrypt both voice and data communications over the air interface between the mobile device and the base station.

The integrity protection provided by the KASUMI algorithm ensures that voice packets are not modified or tampered with during transmission over the air interface. This helps to prevent eavesdropping and other types of attacks that could compromise the privacy and security of voice communications.

Therefore, while 3G networks do provide integrity protection for voice calls, they do not require every voice packet to be integrity protected.

Learn more abou voice packet here:

https://brainly.com/question/29588750

#SPJ11

1. What is the recommended cryptosystem to secure data at rest in the cloud?
2. What are centralized logical routed hubs in the cloud the enable consumers to connect their virtual networks and on-premises networks to a single component?

Answers

1. The recommended cryptosystem to secure data at rest in the cloud is AES (Advanced Encryption Standard). 2. Virtual private clouds (VPCs).

1. AES, also known as Rijndael, is a symmetric encryption algorithm that is widely recognized as the standard for securing data at rest in the cloud. It offers a high level of security and efficiency in encrypting and decrypting data. AES operates on fixed-size blocks of data and supports key sizes of 128, 192, and 256 bits.

When storing data in the cloud, it is crucial to ensure its confidentiality and integrity. AES provides strong encryption capabilities, making it difficult for unauthorized individuals to access or decipher the encrypted data. It uses a symmetric key, meaning the same key is used for both encryption and decryption processes.

To enhance security, AES is often combined with other cryptographic measures such as key management practices, secure key storage, and secure access controls. These additional measures help protect the encryption keys and ensure that only authorized individuals have access to the decrypted data.

Overall, AES is recommended cryptosystem for securing data at rest in the cloud due to its proven security, efficiency, and compatibility with various platforms and systems.

2. Virtual private clouds (VPCs) are network environments within the cloud infrastructure that allows consumers to have control over their virtual network settings and connections. VPCs act as centralized logical routed hubs, facilitating the connection between virtual networks and on-premises networks to a single component.

VPCs provide a range of networking features, including virtual private networks (VPNs), subnets, route tables, and security groups. With VPCs, consumers can define their own IP address ranges, configure network gateways, and establish secure communication channels between their virtual networks and external networks.

By using VPCs, consumers can extend their on-premises networks to the cloud, enabling seamless integration and connectivity between different network environments. This allows for hybrid cloud architectures, where applications and resources can be distributed across both on-premises and cloud environments.

VPCs offer scalability, flexibility, and control over network configurations, enabling consumers to tailor their network setups to meet their specific requirements. They provide a secure and isolated environment for running applications and services, ensuring data privacy and network segregation.

In summary, virtual private clouds serve as centralized logical routed hubs in the cloud, enabling consumers to connect their virtual networks and on-premises networks to a single component while maintaining security, control, and flexibility over their network configurations.

To learn more about cryptosystems visit:

brainly.com/question/30564489

#SPJ11

Wanda is taking photos using a lens that sees and records a very narrow view with a focal length longer than 60mm. When her friend asks what type of lens she is using for their photography outing,

Answers

Answer:

a telephoto lensExplanation: It's on Quizlet lol

And I got it correct on the test...

It provides an instant 2x optical zoom and has a focal length that is twice that of the primary lens. Additionally, it has a limited field of view, which causes distant things to resemble those that are nearby.

What role of telephoto lens in taking photos?

Simply put, a telephoto lens deceives the eye into thinking a topic is closer than it actually is. This may be the best option for photographers who are physically unable to go close to their subjects or who are concerned for their safety.

With a telephoto lens, the background elements appear larger and nearer to the foreground elements. The converse is true with wide-angle lenses, which make background elements appear smaller and farther away from the camera.

Therefore, a telephoto lens Wanda uses a lens longer than 60 mm in focal length to capture images with a very small field of view. When her friend inquires about the lens she will be using on their photographic excursion.

Learn more about telephoto lens here:

https://brainly.com/question/15599633

#SPJ2

FILL IN THE BLANK. This type of software allows students to record, sort, mathematically analyze and represent numerical data in tabular and/or graphical forms. ___

Answers

Spreadsheets  software is a type of software allows students to record, sort, mathematically analyze and represent numerical data in tabular and/or graphical forms.

Why do people use spreadsheets?

One tool for storing, modifying, and analyzing data is a spreadsheet. A spreadsheet's data is arranged in a series of rows and columns, where it can be searched, sorted, calculated, and used in a number of charts and graphs.

Therefore, A program known as a spreadsheet, also referred to as a tabular form, is used to arrange data into rows and columns. This information can then be arranged, sorted, calculated (using formulas and functions), analyzed, or graphically represented to illustrate.

Learn more about Spreadsheets from

https://brainly.com/question/26919847
#SPJ1

ambrose is testing his it department's new firewall deployment. he is using a collection of applications that employ a brute-force technique to craft packets and other forms of input directed toward a target. what is this collection of tools called?

Answers

Packet Filtering Firewall is responsible for filtering the packets based on the IP addresses source and destination port numbers and also the source and destination protocols.

What is information security?Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, firewalls, frameworks, processes and network engineers.A firewall can be defined as a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.In Computer technology, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.Therefore, the other functionality which would influence a decision to deploy a stateless, rather than stateful, firewall are:Block TCP portsAllow network protocols.

To learn more about firewall refer to:

https://brainly.com/question/16157439

#SPJ4

Please Hurry!!!
and if you don´t recognize these people plz don´t answer
Do any of u recognize these people?

Please Hurry!!! and if you dont recognize these people plz dont answer Do any of u recognize these people?
Please Hurry!!! and if you dont recognize these people plz dont answer Do any of u recognize these people?

Answers

Answer:

they look familiar

Question 4 of 25
If an ad's job is to persuade us, our job is to:
O A. report the advertisers to government authorities.
B. see through its tactics and make an informed choice.
O C. feel happiness, excitement, sympathy, and fear.
O D. buy the products the advertisement is trying to sell.
SURMIT

Answers

Feel happiness, excitement, sympathy, and fear.

What is Persude?

Humans' reactions to events or circumstances, or their emotions, are known as emotions.

The situation that causes an emotion determines the kind of emotion that individual will feel. For instance, when someone hears excellent news, they are happy. When someone is in danger, they become afraid.

Our daily lives are significantly impacted by our emotions. Depending on our emotions—happiness, rage, sadness, boredom, or frustration—we make choices. We pick interests and pastimes based on the feelings they arouse.

Therefore, Feel happiness, excitement, sympathy, and fear.

To learn more about Emotions, refer to the link:

https://brainly.com/question/28464758

#SPJ1

Samantha was working on a Word document and the horizontal and vertical margins disappeared. Which solution will fix the problem? Close the Word document and reopen it. Click on the View Ruler button located at the top of the vertical scroll bar on the right-hand side of the screen. Double-click in the ruler area to redisplay the ruler. Click on the View Ruler button located at the top left-hand side of the screen that looks like an L.​

Answers

Answer:

B

Explanation:

Click on the View Ruler button located at the top of the vertical scroll bar on the right-hand side of the screen is the solution will fix the problem. Hence, option B is correct.

What is MS Word DOC?

Microsoft Word is a word processor that may be used to create papers, letters, reports, and other types of writing of a professional caliber. It includes sophisticated capabilities that give you the best formatting and editing options for your files and projects.

Microsoft Word documents can be opened and edited in Docs. Even better, you may download your document as a Word document with a typical Word extension. But Docs also allows you to export other file types.

It is simple to modify huge sections of text, alter the flow between pages, change font sizes and styles, and perform other operations with Word and the DOC format.

Thus, option B is correct.

For more information about MS Word DOC, click here:

https://brainly.com/question/9174181

#SPJ2

Do you have any tips for Edenuity?

Answers

An identity thief who obtains your personal information by going through items you have thrown out is using a technique known as A. scavenger hunting. B. dumpster diving. C. pretexting. D. None of the above.

Answers

An identity thief who obtains your personal information by going through items you have thrown out is using a technique known as dumpster diving. So, option B is the correct answer.

Dumpster diving technique involves rummaging through trash bins, dumpsters, or other waste disposal areas in search of documents, receipts, or any materials containing sensitive information such as names, addresses, social security numbers, or financial details.

By collecting this information, the identity thief can engage in fraudulent activities, including identity theft, financial fraud, or impersonation.

Dumpster diving poses a significant risk to individuals and organizations as it bypasses traditional security measures and highlights the importance of securely disposing of personal information to prevent unauthorized access and potential identity theft. Therefore, the correct answer is option B.

To learn more about identity thief: https://brainly.com/question/1531239

#SPJ11

Identify the correct characteristics of Python numbers. Check all that apply.

1. Python numbers can be large integers.

2. Python numbers can be complex values such as 12B16cd.

3. Python numbers can be floating-point numbers.

4. Python numbers have numeric values.

5. Python numbers are created automatically.

Answers

Answer:

The answers are 1, 2, 3, and 4

Explanation:

i just did it on edge

Answer:

The answers are 1, 2, 3, and 4

Explanation:

im simply good

Application software is the software that is used when you do each of the following tasks except
Select one:
a. start your computer.
b. surf the web.
c. create art.
d. send an email.

Answers

Application software is the software that is used when you do each of the following tasks except a. start your computer.

Correct option is a. start your computer. Application software is designed to perform specific tasks for the user, such as surfing the web, creating art, or sending an email. It is different from system software, which is responsible for managing and controlling the computer's hardware and operating system, including the task of starting the computer.

Application software (App) is a kind of software that performs specific functions for the end user by interacting directly with it. The sole purpose of application software is to aid the user in doing specified tasks.

Learn more about Application Software: https://brainly.com/question/2919814

#SPJ11

Some people use the term _____ to refer to the case that contains and protects the motherboard, internal hard drive, memory, and other electronic components of the computer from damage.

Answers

Answer:

System unit.

Explanation:

Some people use the term system unit to refer to the case that contains and protects the motherboard, internal hard drive, memory, and other electronic components of the computer from damage.

A system unit also referred to as chassis or tower can be defined as a hardware case that is typically used as a protective case for the main component or primary devices such as power supply, random access memory (RAM), graphics card, CD-ROM drive, Harddisk drive, motherboard, internal cables, central processing unit (CPU) that makes up a computer system.

Basically, the main purpose of a system unit is to properly house the main components of a computer, serve as an electrical insulator and to prevent them from any form of damage.

First, read in an input value for variable valCount. Then, read valCount integers from input and output each integer on a newline followed by the string" reports.".

Ex: If the input is 3 70 65 75, the output is:

70 reports.
65 reports.
75 reports.​

Answers

Answer:

The program in Python is as follows:

valCount = int(input())

reports = []

for i in range(valCount):

   num = int(input())

   reports.append(num)

   

for i in reports:

   print(i,"reports.")

Explanation:

This gets input for valCount

valCount = int(input())

This creates an empty list

reports = []

This gets valCount integer from the user

for i in range(valCount):

   num = int(input())

Each input is appended to the report list

   reports.append(num)

This iterates through the report list

for i in reports:

This prints each element of the report list followed by "reports."

   print(i,"reports.")

When looking at aggregated logs, you are seeing a large percentage of Windows hosts connecting to an Internet Protocol (IP) address outside the network in a foreign country. Why might this be worth investigating more closely

Answers

Answer:

"It might demonstrate a malware infection" is the correct response.

Explanation:

Because once glancing at aggregate data log files, clients could perhaps actually listen to road conditions but instead correlation coefficient.  For obvious reasons, whenever you see a significant portion of presenters designed to connect to something like a particular destination out beyond your channel, it might have been worthwhile to investigate quite tightly, although it might demonstrate malware.
Other Questions
An architecture student measured the heights of all the buildings downtown. Building heights (meters) 11 11 11 17 17 17 17 17 17 50 50 50 50 50 50 50 81 81 81 81 X is the height of a randomly chosen building. What is the expected value of X? Write your answer as a decimal. Which of the following inequalities represents all values of X for which the quotient below is defined? I AM VERY GENEROUS NO JOKES PLEASE PS... PLEASE HELPWhat is the end result of crossing-over during the first stage of meiosis?-the paternal DNA only is copied onto the chromatids-the chromatids are identical to each other-the chromatids contain the maternal DNA only-the chromatids become non-sister (non-identical) chromatids Who is typically in the business of "resolver casos?"detectivesseamstressesreceptionistssalespeople Match the definition to the term. 1. tense vocal force or emphasis 2. intonation pause between sounds, words, or phrases 3. pitch the highness or lowness of a tone 4. inflection where vocal folds (cords) are located 5. auxiliary stress, pitch, and juncture 6. conjugation a helping verb 7. stress systematic arrangement of the forms of a verb 8. juncture the time an action takes place9. irregular verb a verb that does not follow a regular pattern10. larynx alteration in pitch or tone of the voice; endings on verbs and other words( the numbers are the words and i need them matched with the sentences below thx) What are the key elements that led to the rise of Ghana (hint: gold, salt, location)? The key elements that made Ghana rise were. Compare the reaction of the doctor in Mr. Enfield's description of the incident involving Mr. Hyde and the reaction of Dr. Lanyon to the transformation of Hyde into Jekyll.How are doctors' reactions similar? Micaela and Elisa each improved their yards by planting rosebushes and geraniums. They bought their supplies from thesame store.Micaela spent $122 on 14 rose bushes and 8 geraniums.Elisa spent $120 on 12 rose bushes and 12 geraniums.What is the cost of one geranium? $1 $7 $3 $5 r5r6s+8s15 what is the answer for this equation Positive and informative messages should emphasize benefits when A. Presenting factual information only.B. Presenting benefits that may not be obvious.C. The benefits make the audience seem selfish. Explain why a+b+c=240degrees what is the probability that the offspring of a cross between a homozygous recessive parent and a heterozygous parent will be homozygous recessive? You are an epidemiologist studying an emerging disease reported over the past three years in Wisconsin, Minnesota, and Michigan. You have noticed a seasonal pattern of disease, with new cases appearing in late April through September and peaking in July. No new cases appear during late fall or the winter months. This pattern is suggestive of __________. when providing nutrition education to the client with diabetes, the nurse should include which statement regarding fat intake? what teaching includes the planned use of behavioral contingencies, differential reinforcement, and discrimination training in the student's everyday environment this is the amount that can be given as a gift each year without the transaction being subject to the federal gift tax law. The Hungarian parliament passed a series of laws that revolutionaries had demanded in 1848, including one for Which solution would make the inequality below true? Read carefully!!! 2x - 4 > 1490512 Choose ALL answers that describe the quadrilateral TUVW if TU = 27,UV = 42, VW = 18, and WT = 30.ParallelogramQuadrilateralRectangleRhombus SquareTrapezoid What is the main conflict in this passage?