(50pt) choose a program. it could be your lexer from the project, a project from another class, or a program you found online. make sure it is a program you understand the input format and it is not overly complicated. write three fuzzers (like i did in class) to test this program: a mutation fuzzer, generation fuzzer, and a protocol-based fuzzer. run a few tests from each fuzzer on the program. what did you learn? did you discover any bugs you did not know were there? you may use java,c,c , or python to write your fuzzers.
q10. which of the following is true about model capacity (where model capacity means the ability of neural network to approximate complex functions) ? (a) as number of hidden layers increase, model capacity increases (b) as dropout ratio increases, model capacity increases (c) as learning rate increases, model capacity increases (d) none of these
you are the network administrator for a growing business. when you were hired, the organization was small, and only a single switch and router were required to support your users. during this time, you monitored log messages from your router and switch directly from each device's console. the organization has grown considerably in recent months. now you manage eight individual switches and three routers. it's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. what should you do?
what combines art along with science to determine how to make urls more attractive to search engines resulting in higher search engine ranking?
in the array implementation of a list, the index-based operation getitem uses the subscript operator on the array variable. a. true b. false
what function is used to show returns of the first character or characters in a text string based on the number of characters specified? question
write a program that prompts the user for a fibonacci number until the number 1 is encountered. not including the 1, calculate the maximum value.
you have three hard disks, each 1 tb in size. after installing them as a raid-5 array in a computer, how much usable storage space will you have?
you are a forensic examiner. the logical structure of a hard disk that you are analyzing appears almost destroyed. you are not able to get the system to boot up despite your best efforts. you choose to perform a zero-knowledge analysis. is this an appropriate choice for the next step?
every morning when james logs into his computer and attempts to access microsoft 365, he is asked to enter his password. after that, he is sent a text on his mobile phone with a six-digit code he must enter. in terms of multifactor authentication, his password is something he knows. what is the text message?
you are an administrator in a large organization that has subscribed to a new azure ad subscription. you want your users to be able to reset passwords themselves. which azure ad feature allows this to happen?
you are working on a linux distribution that uses systemd. which file in the /usr/lib/systemd/system/ directory is text-based and used to start the services that support multiple users and support networking?
a new junior technician asks you why it takes so long to access a file on your tape backup system compared to the server's hard drive. what can you tell her is the most likely explanation for the slow access?
sally has a user account and has previously logged on using a biometric system. today, the biometric system didn't recognize her, so she wasn't able to log on. what does this describe?
each node builds a routing table that gives the next node and hop count for each destination. how is the packet information used to build the table? what are the advantages and disadvantages of this technique?
Create a function get_longest_sublist that takes a single parameter, which is a list of lists. Complete the function such that it returns the longest sublist in lists. If the parameter is empty then simply return an empty list.