Apprise_araks_sparagus
.docx
keyboard_arrow_up
School
University of Illinois, Urbana Champaign *
*We aren’t endorsed by this school
Course
250
Subject
Computer Science
Date
May 7, 2024
Type
docx
Pages
2
Uploaded by ChiefButterfly4386 on coursehero.com
Question: What are Intents?
Answer: Intents displays notification messages to the user from within the Android enabled device. It can be used to alert the user of a particular state that occurred. Users can be made to respond to intents.
Question: What is a Sticky Intent?
Answer: A Sticky Intent is a broadcast from sendStickyBroadcast() method such that the intent floats around even after the broadcast, allowing others to collect data from it.
Question: What is Android?
Answer: It is an open-sourced operating system that is used primarily on mobile devices, such as cell phones and tablets. It is a Linux kernel-based system that’s been equipped with rich components that allows developers to create and run apps that can perform both basic and advanced functions.
Question: What is portable wi-fi hotspot?
Answer: Portable Wi-Fi Hotspot allows you to share your mobile internet connection to other wireless device. For example, using your Android-powered phone as a Wi-Fi Hotspot, you can use your laptop to connect to the Internet using that access point.
Question: What is a Fragment?
Answer: A fragment is a part or portion of an activity. It is modular in a sense that you can move around or combine with other fragments in a single activity. Fragments are also reusable.
Question: Do all mobile phones support the latest Android operating system?
Answer: Some Android-powered phone allows you to upgrade to the higher Android operating system version. However, not all upgrades would allow you to get the latest version. It depends largely on the capability and specs of the phone, whether it can support
the newer features available under the latest Android version.
Question: When is the best time to kill a foreground activity?
Answer: The foreground activity, being the most important among the other states, is only killed or terminated as a last resort, especially if it is already consuming too much memory. When a memory paging state has been reach by a foreground activity, then it is killed so that the user interface can retain its responsiveness to the user.
Question: What is the Android Architecture?
Answer: Android Architecture is made up of 4 key components: Linux Kernel, Libraries, Android Framework, Android Applications
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
When users post an update on social media,such as a URL, image, status update etc., other users in their network are able to view this new post on their news feed. Users can also see exactly when the post was published, i.e, how many hours, minutes or seconds ago.
Since sometimes posts are published and viewed in different time zones, this can be confusing. You are given two timestamps of one such post that a user can see on his newsfeed in the following format:
Day dd Mon yyyy hh:mm:ss +xxxx
Here +xxxx represents the time zone. Your task is to print the absolute difference (in seconds) between them.
Input Format
The first line contains , the number of testcases.Each testcase contains lines, representing time and time .
Constraints
Input contains only valid timestamps
.
Output Format
Print the absolute difference in seconds.
Sample Input 0
2Sun 10 May 2015 13:54:36 -0700Sun 10 May 2015 13:54:36 -0000Sat 02 May 2015 19:54:36 +0530Fri 01 May 2015…
arrow_forward
q18-
An attacker tricks a victim into clicking a link, which displays a fake error message on their screen. The message advises the user to call their help desk and provides a fake helpdesk number. On making the call, the victim is then tricked into installing a remote access trojan by a fake help desk consultant. What is the most accurate description of this attack strategy?
a.
Phishing attack
b.
Scareware attack
c.
Spam attack
d.
Spam attack Reverse social engineering attack
e.
Social engineering attack
arrow_forward
JavaScript triggers? It has a "onclick" function.
arrow_forward
Alert - don't use chatgpt and don't copy from anywhere.
arrow_forward
Q3-
An error message occurs when you are trying to reach to specific website. Usually, the error might appear because the bad request “400” or internal Server Error “500”. Think about a better way to display an error message in an active way.
*please send a clear answer
arrow_forward
LDAP Injection is a form of web-based attack in which certain parameters in URL or web page form field data entered by a user are changed.
TRUE OR FALSE
arrow_forward
Q3-
An error message occurs when you are trying to reach to specific website. Usually, the error might appear because the bad request “400” or internal Server Error “500”. Think about a better way to display an error message in an active way.
arrow_forward
Smart Detection is able to identify a performance problem that slows down the loading of pages
in a certain kind of web browser.
Click the Yes button if the assertion is correct. Choose No if none of those apply.
arrow_forward
Servlet Adder is part of a web application. The application started on the server and received 10 user requests, after that the application
was shutdown.
How many times was the service() method called by the web container?
O a. 0 time
O b. 10 times
Oc. Never be called
O d. 1 time
arrow_forward
The web page must display a button. When a user clicks on the button, a prompt should show up, asking the user to enter any number. Upon entering the number, an alert should then show up with a message such as: 'The 5th power of "x" (x being the user's entered number) is "y" (with y being the result). In other words, the 5th power of a user's random entered number must be computed. How is this coded?
This is the actual instruction: 'Create an HTML document and link a JavaScript file to the document in the document header. Write a function getAndShow() in the JavaScript file that will use a prompt dialog to ask the user for any number. Use the number returned by the prompt to compute the fifth power of that number and display it in a message box with a suitable message.'.
There's also mention of a getAndShow() function that has to be added to the js file.
Lastly, the images in the original questions are guidelines on what the code must produce.
arrow_forward
True or False: Cookies are transmitted in HTTP headers and can be used to identify a user and maintain
state across multiple visits to a website.
Select one:
O True
O False
arrow_forward
Social security numbers can be entered either as ddddddddd or ddd-dd-dddd. Write a regular expression to match either pattern.
arrow_forward
Deluxe Bath Controller (This scenario is used by questions 14 and 15.)
At a touch of the Fill button the bath automatically fills with water. When it reaches the overflow point it automatically stops unless the user has already touched the Fill button again to stop the flow of water. There is also an Empty button to empty the bath.
What is the name given to the security attack when an opponent prevents messages from reaching a destination?
Denial of service
Masquerading
Modification of messages
Eavesdropping
Which of these is the highest-level part of the directory structure on Linux?
Directory
Topmost Directory
File Allocation Table
Superblock
Which security goal aims to protect information from disclosure?
Integrity
Confidentiality
Authenticity
Accountability
What does a network switch do?
It broadcasts messages to all the computers that are connected to it
It job is to disable part of the network
It collects all the network cables in one place
Routes a message…
arrow_forward
Get and Post are wo different methods of HTTP in which information such as parameters of a form
element can be sent from a browser to a web server.
List three differences between two methods in a browser behavior when sending the information in
those two methods. Write the answer in three comparisons in a, b, c as Get: a, b, c. POST: a, b, c.
arrow_forward
Lab 02: Splitting a URL into pieces
URLS are composed of five pieces:
The scheme, also known as the protocol
The authority (may further be divided into the user info, the host, and the port)
The path
The fragment identifier, also known as the section or ref
The query string
Read-only access to these parts of a URL is provided by nine public methods: getFile(), getHost(),
getPort(), getProtocol(), getRef(), getQuery(), getPath(), getUserinfo(), and getAuthority().
Write a Java program which uses these methods to split URLS entered on the command line into their
component parts.
arrow_forward
TS app is a mobile application, which is similar to Uber that connects "clients" with service
providers ("drivers") who provide transportation services (“rides").
Clients can use their mobile app to perform the following operations:
• Register through Facebook or Google social networks.
• Register by providing a phone number. This type of registration requires sending
an SMS that contains a PIN code that the user must use to validate that he is the
actual owner of this number.
Authenticate using the corresponding method adopted during registration.
• Add a credit card's details (payment method) and make payments using this card
following a completed ride.
Request a ride from one city to another.
Monitor the different stages of a ride on a map component.
• Provide feedback on the driver following a completed ride.
View the history of the rides.
Drivers can use their mobile app to perform the following operations:
Authenticate by providing a username and password.
Accept a request for a…
arrow_forward
What are the events in JavaScript? Create a script that shows the Onclick event.
arrow_forward
Computer science:
True or False.
"When the object in the response was last modified can be indicated in the HTTP response message by the Date: header."
arrow_forward
The process that the public uses to log/register complaints begins with the loading of the complaint on the Online Portal or Mobile App. All loaded complaints will be in the ComplaintLoaded state. Complaints can either be accepted (through the acceptance option) or rejected (through the reject option). All accepted complaints will be in the ComplaintsAccepted state and rejected complaints will be in the Complaints Rejected State. For both Accepted and Rejected Complaint, there is a send notification option that sends notifications out. The process ends with Notification Sent state for all the notifications that are sent out. The Online Portal or Mobile App has a mechanism to check the details of the complaint before accepting or rejecting. Question
Analyse the process used to log/register complaints and create a state machine diagram.
arrow_forward
Create a Snort rule that looks for an HTTP method ‘GET’ and contains ‘gif’ in the URL. Test the rule and enter the token.
arrow_forward
Please construct two iframes, such that one of the iframes seems to be part of the page inanother iframe. Please then describe how this setup can be used in clickjacking attacks.
arrow_forward
A remote object is made active once a client makes a call to one of its methods. What makes this better than just pre-loading faraway objects?
arrow_forward
Neat hand writing only, otherwise leave a DOWNVOTE , no chat GPT please
arrow_forward
Facebook is one of the most popular social networks where users can post posts to different (text or image) and comment on them • Each user must register beforehand in order to use the system. The user is identified by a name, surname, date of birth, email address (which will also serve for authentication) and a password. • Any user can make a post which contains a text and/or image. Post is identified by a unique code, text used, an identification code for the image and date of post. • A user (including the author of the post) can comment on the post. The comment is characterized by an identification code, text, and date of post. Also, a user may like a comment or post. The system should keep track which user has liked the post/comment, etc. • Users can also exchange messages with each other. Each message is characterized from the unique code, text, date and time of sending as well as information if the recipient has seen the message or not. Write the rational schema, normalization -…
arrow_forward
Some students are starting a newspaper called 352times, they have the following security goals:
Anyone should be able to read the paper with minimal effort, without doing anything more than sending a request to the newspaper’s server and reading the request in plaintext, ignoring any part of it that is not plaintext
Those who care should be able to put in a bit more effort to verify that the newspaper was written by the true authors, without any additional communication with the newspaper
Any unauthorized changes in the newspaper should be detected by the group of people who care
Write a protocol for the newspaper to publish its news.
Write the protocol that the people who want to verify the authorship and detect any unauthorized changes would use.
arrow_forward
Use “Postman” to test API at https://postman-echo.com/
Use GET, POST, PUT, DELETE methods
Use global variables
Create test script
Import any API from other websites
Try to use “Rest Assured” Library to test API at https://reqres.in/ (only for GET and POST methods)
Upload screenshots to the system.
arrow_forward
The Pizza Ordering System allows the user of a web browser to order pizza forhome delivery. To place an order, a shopper searches to find items to purchase,adds items one at a time to a shopping cart, and possibly searches again for moreitems. When all items have been chosen, the shopper provides a delivery address.If not paying with cash, the shopper also provides credit card information. Thesystem has an option for shoppers to register with the pizza shop. They can thensave their name and address information, so that they do not have to enter thisinformation every time that they place an order.Develop a use case diagram, for a use case for placing an order, PlaceOrder. Theuse case should show a relationship to two previously specified use cases,IdentifyCustomer, which allows a user to register and log in, and PaybyCredit,which models credit card payments.
arrow_forward
Max points: 30
Earned points: 0
Message
Feedback for case 0 --------------------- hashtag_counts is not a list. Feedback for case 1 --------------------- hashtag_counts is not a list. Feedback for case 2 --------------------- hashtag_counts is not a list.
arrow_forward
add tags for these feature files with --tags option:
When you select scenarios by one tag
When you select scenarios that have one or another tag
When you select scenarios that have 2 tags
When you disable scenarios that have a specific tag
Given Scenarios:
Feature: Login functionalityBackground:Given a web browser is at the BrainBucket login pageScenario: user can't login without entering emailGiven User is not logged inWhen Password is enteredAnd User click Login buttonThen 'Warning: No match for E-Mail Address and/or Password' will be shownScenario: user can recover his passwordGiven User is not logged inWhen User clicks 'Forgotten Password' buttonAnd enters his emailThen Message 'An email with a confirmation link has been sent your email address.' will be dispalyed
arrow_forward
Two friends Rio and Alex play video games in their leisure hour. Rio showed Alex a new game where they need to gain energy and spend the energy to pass the level. After playing some time Alex found it very interesting and addictive. While playing the game Alex saw an advertisement that popped up where he was offered to get a crack version of a paid token to boost up his energy. Alex clicked on that advertisement to retain the token and got a link in his email address. Alex got very addicted and could not wait to click on that link that came to his email id but he found nothing. Later he left the tab but after a while, Alex found that his account was hacked and all his data was deleted from his account.
Later on, Alex asked for his uncle’s help to regain access to his email address. His uncle found out the reason behind this. He added that nowadays there are more machine learning approaches for spam detection. Not only this, but he also said that machine learning is used in making…
arrow_forward
Graduation Project
* SSH connection:- Setting up github with server to connect via setting a ssh connection using public and private keys.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning
Related Questions
- When users post an update on social media,such as a URL, image, status update etc., other users in their network are able to view this new post on their news feed. Users can also see exactly when the post was published, i.e, how many hours, minutes or seconds ago. Since sometimes posts are published and viewed in different time zones, this can be confusing. You are given two timestamps of one such post that a user can see on his newsfeed in the following format: Day dd Mon yyyy hh:mm:ss +xxxx Here +xxxx represents the time zone. Your task is to print the absolute difference (in seconds) between them. Input Format The first line contains , the number of testcases.Each testcase contains lines, representing time and time . Constraints Input contains only valid timestamps . Output Format Print the absolute difference in seconds. Sample Input 0 2Sun 10 May 2015 13:54:36 -0700Sun 10 May 2015 13:54:36 -0000Sat 02 May 2015 19:54:36 +0530Fri 01 May 2015…arrow_forwardq18- An attacker tricks a victim into clicking a link, which displays a fake error message on their screen. The message advises the user to call their help desk and provides a fake helpdesk number. On making the call, the victim is then tricked into installing a remote access trojan by a fake help desk consultant. What is the most accurate description of this attack strategy? a. Phishing attack b. Scareware attack c. Spam attack d. Spam attack Reverse social engineering attack e. Social engineering attackarrow_forwardJavaScript triggers? It has a "onclick" function.arrow_forward
- Alert - don't use chatgpt and don't copy from anywhere.arrow_forwardQ3- An error message occurs when you are trying to reach to specific website. Usually, the error might appear because the bad request “400” or internal Server Error “500”. Think about a better way to display an error message in an active way. *please send a clear answerarrow_forwardLDAP Injection is a form of web-based attack in which certain parameters in URL or web page form field data entered by a user are changed. TRUE OR FALSEarrow_forward
- Q3- An error message occurs when you are trying to reach to specific website. Usually, the error might appear because the bad request “400” or internal Server Error “500”. Think about a better way to display an error message in an active way.arrow_forwardSmart Detection is able to identify a performance problem that slows down the loading of pages in a certain kind of web browser. Click the Yes button if the assertion is correct. Choose No if none of those apply.arrow_forwardServlet Adder is part of a web application. The application started on the server and received 10 user requests, after that the application was shutdown. How many times was the service() method called by the web container? O a. 0 time O b. 10 times Oc. Never be called O d. 1 timearrow_forward
- The web page must display a button. When a user clicks on the button, a prompt should show up, asking the user to enter any number. Upon entering the number, an alert should then show up with a message such as: 'The 5th power of "x" (x being the user's entered number) is "y" (with y being the result). In other words, the 5th power of a user's random entered number must be computed. How is this coded? This is the actual instruction: 'Create an HTML document and link a JavaScript file to the document in the document header. Write a function getAndShow() in the JavaScript file that will use a prompt dialog to ask the user for any number. Use the number returned by the prompt to compute the fifth power of that number and display it in a message box with a suitable message.'. There's also mention of a getAndShow() function that has to be added to the js file. Lastly, the images in the original questions are guidelines on what the code must produce.arrow_forwardTrue or False: Cookies are transmitted in HTTP headers and can be used to identify a user and maintain state across multiple visits to a website. Select one: O True O Falsearrow_forwardSocial security numbers can be entered either as ddddddddd or ddd-dd-dddd. Write a regular expression to match either pattern.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- New Perspectives on HTML5, CSS3, and JavaScriptComputer ScienceISBN:9781305503922Author:Patrick M. CareyPublisher:Cengage Learning
New Perspectives on HTML5, CSS3, and JavaScript
Computer Science
ISBN:9781305503922
Author:Patrick M. Carey
Publisher:Cengage Learning