A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the following types of malware is MOST likely installed on the compromised host?
A. Keylogger
В. Spyware
C. Trojan
D. Backdoor
E. Rootkit

Answers

Answer 1

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.


Related Questions

Explain the purpose of the open() and close() operations.

Answers

Answer:

The open() operation notifies the system that the named file is about to become active. The close() operation notifies the system that the named file is no longer in active use by the user who issued the close operation.

How do i connect WiFi on windows xp without icon?

Answers

Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.

Answer:

Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.

Irene llegó tarde al colegio_______________
ayúdenme


^_^^_^^_^^_^^_^^_^^_^^_^^_^​

Answers

Answer:

Explanation:

Absconding

1. Open the start file EX2019-ChallengeYourself-9-3. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
2. If the workbook opens in Protected View, click the Enable Editing button in the Message Bar at the top of the workbook so you can modify the workbook.
3. Use Consolidate to create a summary of real estate sales for all property types. Place the consolidated data on the Summary worksheet in cells B3: C15. Use the Average function to consolidate the data from cells B2: C14 in the Condo, Townhouse, and Single Family worksheets. Include links to the source data.
4. Import individual sales data from the tab-delimited text file Select Sales Data 2019-2020. Import the data as a table in cell A1 of the Select Sales worksheet.
5. Remove the data connection when the import is complete.
6. In the Select Sales worksheet, add data validation to restrict values in the House Type columns (cells B2: B139) to the values in the cell range named PropertyTypes. Include a drop-down list of values in the cells to assist in data correction.
7. Add the following input message to cells B2:B139: Select a property type from the list.
8. Add the following error alert to cells B2:B139: Not a valid property type.
9. Apply data validation circles to any values that violate the data validation rules you just created.
10. Add a comment to cell B1 in the Select Sales worksheet that reads: This needs to be fixed.
11. Add a hyperlink from cell B1 in the Select Sales worksheet to link to the named range (defined name) PropertyTypes. Test the link.
12. Use Flash Fill to add a new column of data to the Select Sales worksheet to display the number of bedrooms/the number of bathrooms.
a. In the Select Sales worksheet, cell F1, type the heading: BR/BA
b. Complete the column of data using this pattern in cell F2: 1 BR/1 BA
You will need to enter at least two samples in order for Flash Fill to suggest the correct autofill data. Check your work carefully.
Sales Summary 2019-2020
Number of Sales Average Selling Price
1
2
3 One BR, One BA
4 One BR, Two BA +
5 Two BR, One BA
6 Two BR, Two BA
7 Two BR, Two BA +
8 Three BR, One BA
9 Three BR, Two BA
10 Three BR, Three BA +
11 Four BR, One BA
12 Four BR, Two BA
13 Four BR, Three BA+
14 Five BR-. One BA
15 Five BR+ Two BA+
16
17
18
19
20
21
22
23
24

Answers

Answer:

Omg what is this

soooo long questionn

i am fainted

what rubbish you written how long the question is of which subject

what's your name

Compare and contrast traditional and cloud data backup methods. Assignment Requirements You are an experienced employee of the DigiFirm Investigation Company. Chris, your team leader, explains that your biggest client, Major Corporation, is evaluating how they back up their data. Chris needs you to write a report that compares traditional backup methods to those provided by a cloud service provider, including the security of cloud services versus traditional forms of on-site and off-site backup. For this assignment: 1. Research both traditional and cloud data backup methods. 2. Write a paper that compares the two. Make sure that you include the security of cloud services versus traditional forms of on-site and off-site backup. Required Resources Course textbook Internet Submission Requirements Format: Microsoft Word Font: Arial, size 12, double-space Citation Style: Follow your school's preferred style guide Length: 1-2 pages If-Assessment Checklist I researched both traditional and cloud data backup methods. I wrote a report that compares the two. I included the security of cloud services versus traditional forms of on-site and off-site backup. I organized the information appropriately and clearly. . I created a professional, well-developed report with proper documentation, grammar, spelling, and nunctuation

Answers

Answer:

Ensures all database elements are known and secured through inventory and security protocols. Catalogs databases, backups, users, and accesses as well as checks permissioning, data sovereignty, encryption, and security rules. 

Security Risk Scoring

Proprietary Risk Assessment relays the security posture of an organization's databases at-a-glance through risk scores.

 Operational Security

Discovers and mitigates internal and external threats in real time through Database Activity Monitoring plus alerting and reporting. Identifies and tracks behavior while looking for anomalous activity internally and externally.

Database Activity Monitoring

Monitors 1 to 1,000+ databases simultaneously, synthesizing internal and external activity into a unified console.

Only by covering both of these areas can organizations have defense in depth and effectively control risk.

A technology company starts a program dedicated to training high school students in the use of the latest computer programming languages. How can the company justify creating and funding such a program since it is not about its primary products

Answers

Answer:

The answer is "Spending the money can improve the company's reputation and attract new personnel with the necessary abilities".

Explanation:

In many cases, companies engage in activities tangential to their principal service or brand. As more than just a result, the purpose is to boost the company's reputation and at the same time raising societal awareness.

To strengthen its very own business reputation and to create future employees by teaching necessary skills, a technology organization may be established throughout the given case.

Every one of these initiatives helps to boost the brand's reputation & image, as well as the customer's confidence.

Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.

Answers

Answer:

c

Explanation:

if you want to present slides to fellow students or co workers, which productivity software should you use

Answers

Answer:

Power point is a good software to use for slides

Create a function, return type: char parameters: int *, int * Inside the function, ask for two integers. Set the user responses to the int * parameters. Prompt the user for a character. Get their response as a single character and return that from the function. In main Define three variables and call your function. Print values of your variables

Answers

Answer and Explanation:

In C programming language:

char fun(int*a, int*b){

printf("enter two integers: ");

scanf("%d%d",a,b);

int e;

printf("please enter a character: ");

e=getchar();

return e;

}

int main(int argc, char *argv[]) {

int d;

int f;

int g;

fun();

printf("%d%d%d", d, f, g);

}

We have declared a function fun type char above and called it in main. Note how he use the getchar function in c which reads the next available character(after the user inputs with printf()) and returns it as an integer. We then return the variable e holding the integer value as char fun() return value.

Chất xơ có nhiều trong thực phẩm nào?

Answers

Answer:

Quả lê Quả lê là một loại trái cây phổ biến vừa ngon vừa bổ dưỡng. ...

Quả dâu tây. Dâu tây là loại quả cực kỳ ngon. ...

Quả bơ Quả bơ khác hơn so với hầu hết các loại trái cây. ...

Quả táo. ...

Quả mâm xôi. ...

Quả chuối. ...

Cà rốt. ...

Củ cải đường.

different types of computer and state the major difference between them​

Answers

Answer:

computers system may be classified according to their size.

four types of computers are;

microcomputers / personal computers- micro computers are also called personal computers which is PC this computer came in different shapes size and colors. a personal computers are designed to be used by one person at a time.

some examples of the computer are;

laptopdesktopa palmtopa work station

2. mini computers- mini computers are sometimes called mid-range computers which are more powerful than microcomputers and can support a number of users performing different tasks, they were originally developed to perform specific tasks such as engineering calculations.

3. Mainframe computers- Mainframe computers are larger systems that can handle numberous users, store large amounts of data and process transaction at a high rate. these computers are expensive and powerful.

4. super computers- super computers are the most largest, fastest and most powerful computer. this systems are able to process hundreds of million of instructions per second they are used for job requiring and long complex calculation.

Write a c program that asks the user
to enter distance in KM and Petrol Price in Rs.
Program should compute estimated budget for
the travel distance (Assume your car covers 100
KM in 8 Liters of fuel). Program should run in a
loop and ask the user “Do you want to
continue?”. If user enters ‘y’ or ‘Y’ program
should repeat otherwise terminate.

Answers

Answer:

#include <stdio.h>

int main()  

{

int x;

float y;

printf("Input total distance in km: ");

scanf("%d",&x);

printf("Input total fuel spent in liters: ");

scanf("%f", &y);

printf("Average consumption (km/lt) %.3f ",x/y);

printf("\n");

return 0;

}

when was first generation of computer invented? ​

Answers

Introduction: 1946-1959 is the period of first generation computer. J.P.Eckert and J.W. Mauchy invented the first successful electronic computer called ENIAC, ENIAC stands for “Electronic Numeric Integrated And Calculator”.

Write a game that performs the roll of two dice randomly. The game should first ask for a target sum. Everytime the player enters r, the program should repeatedly print the side of the dice on a separate line. The game should stop prompting if one of these two events occur: -The sum of the two sides is equal to the target sum. -The player enters q.

Answers

Answer:

Explanation:

The following program was written in Java. It asks the user to first enter the target sum. Then it creates a while loop that continues asking the user to either roll dice or quit. If they decide to roll, it rolls the dice and prints out both values. If the target sum was hit, it prints that out and exits the program otherwise it loops again. The code has been tested and can be seen in the attached image below.

import java.util.Random;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Random rand = new Random();

       Scanner in = new Scanner(System.in);

       System.out.print("Enter Target Sum: ");

       int targetSum = in.nextInt();

       while (true) {

           System.out.println("r: Roll Again");

           System.out.println("q: Quit");

           String choice = in.next();

           char choiceModified = choice.toLowerCase().charAt(0);

           if (choiceModified == 'r') {

               int roll1 = rand.nextInt(6) + 1;

               int roll2 = rand.nextInt(6) + 1;

               int total = roll1 + roll2;

               System.out.println("Dice 1: " + roll1);

               System.out.println("Dice 2: " + roll2);

               if (total == targetSum) {

                   System.out.println("Target Sum of " + targetSum + " hit.");

                   break;

               }

           } else if (choiceModified =='q') {

               break;

           } else {

               System.out.println("Wrong choice");

           }

       }

   }

}

During the testing phase of an ERP system, the system implementation assurers should review: Group of answer choices Program change requests Vendor contracts Error reports Configuration design specifications

Answers

Answer:

Error reports

Explanation:

ERP is a multimodal software system that integrates all business processes and the function's of the entire organizations into  single software system using a one database.

What is the advantages and disadvantages of hardware devices and software devices ?


Urgent need for assignment due today 12 o’clock!

Answers

Answer:

Advantages of hardware:

Physical existence

Multitasking

Speedy

Disadvantages:

Costly as different equipment cost differently

Time consuming

requires space

Privacy issues

Explanation:

Advantages of Software:

Less costly

Improved privacy controls

Requires no space

Disadvantages:

Does not have physical existence

hacking and cyber attacks may steal important information

Regular updates required

Write a program that takes a date as input and outputs the date's season. The input is an integer to represent the month and an integer to represent the day. Ex: If the input is: 4 11 the output is: spring In addition, check if both integers are valid (an actual month and day). Ex: If the input is: 14 65 the output is: invalid The dates for each season are: spring: March 20 - June 20 summer: June 21 - September 21 autumn: September 22 - December 20 winter: December 21 - March 19

Answers

Answer:

Explanation:

The following program is written in Java. It is a function that takes in the two parameters, combines them as a String, turns the combined String back into an integer, and uses a series of IF statements to check the parameters and determine which season it belongs to. Then it prints the season to the screen. The code has been tested with the example provided in the question and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       getSeason(4, 65);

       getSeason(4, 11);

   }

   public static void getSeason(int month, int day) {

       String combined = String.valueOf(month) + String.valueOf(day);

       int combinedInt = Integer.parseInt(combined);

       if ((month > 0 && month < 12) && (day > 0 && day < 31)) {

           if ((combinedInt >= 320) && (combinedInt <= 620)) {

               System.out.println("The Season is Spring");

           } else if ((combinedInt >= 621) && (combinedInt <= 921)) {

               System.out.println("The Season is Summer");

           } else if ((combinedInt >= 922) && (combinedInt <= 1220)) {

               System.out.println("The season is Autumn");

           } else {

               System.out.println("The Season is Winter");

           }

       } else {

           System.out.println("Invalid date");

       }

   }

}

Hello everybody,
For the quiz questions, I tried using the circular method, but got a numeric, period or comma error?
So I tried using the solver to find the same solution I got, but when I entered it in the answer box, he always said incorrectly.
Any help would be highly appreciated and write the results here, why do I have to read the solution quiz because I was wrong? thank you.


The bisection method is being used to calculate the zero of the following function between x = 0 and x = 1.
What is the midpoint for the 3rd iteration? (The midpoint for the 1st iteration is 0.5.) Provide your answer rounded to the thousandths place.

Answers

Answer:

i don't know the answer please tell me

(True/False). In an "ID" column with the data type INTEGER PRIMARY KEY, each value entered for the ID must be unique.

Answers

Answer:

The answer is "True".

Explanation:

The key to a relational database that is unique for each data record is a primary key, also called a primary keyword.This unique identifier, including a driver's license name, telephone number, or vehicle identification number. This is an identifier (VIN).There must always be the only primary key in such a relational database.This is a specific relational database field (or column combination) that identifies each table entry in a unique way.It utilized it to swiftly analyze the data within the table as a unique identifier.

Which one of the following does not contain information?
1) A weather report
2) A time table
3) A price list displayed in a supermarket
4) An unlabeled chart

Answers

Answer:4




Explanation: common sense

Answer:

4

Explanation:

4 is the ans as weather;timtable and price list display information

There are two circular grounds Ground-A and Ground-B. Ground-A is having diameter of 15 meters and Ground-B is having diameter of 20 meters. Mohsin is running in Ground-A and Neetesh is running in Ground-B. Write a program in C++ that asks the user to input the time taken, in seconds, to complete one compete round of the ground by both the friends and displays who is running faster.

Answers

Answer:

A

Explanation:

b/c the round of 'A' is less than ruond of'B'

Write an algorithm to find the sum of the following series:
a) 1+x+x^2+x^3+...+x^20
b) 1-x+x^2-x^3+...+x^20
c) 1+x/2+(x²)/3+(x^3)/4+...+(x^20)/21

Answers

Answer:

The algorithm is as follows:

Input x

sum_a = 0

sum_b = 0

sum_c = 0

for i = 0 to 20

   sum_a = sum_a + x^i

   sum_b = sum_b + (-x)^i

   sum_c = sum_c + x^i/(i+1)

print sum_a, sum_b, sum_c

Explanation:

Required

An algorithm to solve (a), (b) and (c)

For Series (a):

This series is a geometric progression and the common ratio is x

i.e.

[tex]r = x/1 = x^2/x = ...... = x^{n+1}/x^n =x[/tex]

So, the sum of the series is:

Sum = Previous Sums + x^i --- where i is between 0 and 20 (inclusive)

For Series (b):

This series is a geometric progression and the common ratio is -x

i.e.

[tex]r = -x/1 = -x^2/x = ...... = -(x^{n+1}/x^n) = -x[/tex]

So, the sum of the series is:

Sum = Previous Sums + (-x^i) --- where i is between 0 and 20 (inclusive)

For Series (c):

This series is a neither arithmetic nor geometric progression.

It obeys the following rule:

[tex]\frac{x^i}{1+i}[/tex]  --- where i is between 0 and 20 (inclusive)

So, the sum of the series is:

Sum = Previous Sums + [tex]\frac{x^i}{1+i}[/tex]

If x=3.123, then int(x) will give ?

Answers

Answer:

3

Explanation:

int(x)=3

int(x) rounds to the smallest whole number

For example,

if you say int(3.99) it is also 3

how can I order the prices negatively affect other producers of goods and services​

Answers

Scarcity of availability causes producers to either charge
higher prices or to produce more goods and services (like energy
production, cars, paper, etc.)

Write programming code in C++ for school-based grading system. The program should accept the Subject and the number of students from a user and store their details in an array of type Student (class). The student class should have: • studName, indexNo, remarks as variables of type string, marks as integer, and grade as char. • A void function called getData which is used to get students’ details (index number, name, and marks). • A void function called calculate which will work on the marks entered for a student and give the corresponding grade and remarks as give below. Marks Grade Remarks 70 – 100 A Excellent 60 – 69 B Very Good 50 – 59 C Pass 0 – 49 F Fail • Should be able to display the results for all students (index number, name, marks, grade, remarks). 2. Draw a flowchart for the calculate function above. 3. Create a folder with name format ICTJ254_indexnumber (eg

Answers

Answer:

Explanation:

// C++ Program to Find Grade of Student

// -------codescracker.com-------

#include<iostream>

using namespace std;

int main()

{

   int i;

   float mark, sum=0, avg;

   cout<<"Enter Marks obtained in 5 Subjects: ";

   for(i=0; i<5; i++)

   {

       cin>>mark;

       sum = sum+mark;

   }

   avg = sum/5;

   cout<<"\nGrade = ";

   if(avg>=91 && avg<=100)

       cout<<"A1";

   else if(avg>=81 && avg<91)

       cout<<"A2";

   else if(avg>=71 && avg<81)

       cout<<"B1";

   else if(avg>=61 && avg<71)

       cout<<"B2";

   else if(avg>=51 && avg<61)

       cout<<"C1";

   else if(avg>=41 && avg<51)

       cout<<"C2";

   else if(avg>=33 && avg<41)

       cout<<"D";

   else if(avg>=21 && avg<33)

       cout<<"E1";

   else if(avg>=0 && avg<21)

       cout<<"E2";

   else

       cout<<"Invalid!";

   cout<<endl;

   return 0;

}

If your organization hires a new employee, what would you do to create a user account in the Linux system and add the account to a group? What commands would you use? What configuration files would you check and modify?

Answers

Following are the responses to this question:

The user account is "olivia".In the Linux system to see the account go to the "/home directory".For the configuration file we use ".bash_logout , .bash_profile, and .bashrc" files.

Creating users:

We will use the useradd command to achieve this. Using that same command, you can create users who would log in or customers who would log in (in the case of creating a user for a software installation).

In its basic form, the command is as follows:

[Options] useradd username

Take this user olivia, for instance. Assuming that you had been to issue the command prompt:

olivia has become a user.

Users are added to the system without the need for a home directory and are unable to log on. It if we were using this rather than running the command without arguments?

sudo using useradd -m olivia

Using the command above, a new user would be created, including a home directory that corresponded to the username. That means that you might now see the name "olivia" in the directory "/home".

But what about the lockout concern that was raised earlier? Both these methods are possible. After creating the user, you can enter the following command:

Password for olivia is: sudo passwd olivia

You'll be requested to enter & verify your new password once you've completed the process. This unlocks the user profile, allowing them to log in.

This command might look like if you wanted to accomplish it in one go:

sudo useradd -m olivia -p PASSWORD

You should be using Passcodes as the login for the user olivia.

As soon as the user logs in, he or she can update their account password by using the password command to input their current password, and afterward entering/verifying their new one.

To create a user that has no personal account and cannot log in, execute the following instructions:

sudo use useradd as  the-M USERNAME ​sudo use usermod as the -L USERNAME

The user to be added is identified by USERNAME.

It establishes a user with really no root folder and prevents them from signing in with a second operation.

To add an existing user to a group on Linux, follow the instructions:

As root, log in to your accountUse the useradd instruction to add a new user (for example, useradd roman)If you'd like to log on as a new customer, type su plus that user's name.Entering the word "exit" will logout you from your account.

Another way to add a user to a group under Linux would be to use the following syntax:

Alternatively, you can use the usermod command.The name of the club should be substituted for example group in this sentence.Example username should be replaced with the name of the user you'd like added.

The following operations are performed when a new login is added to the system.

The user's home directory (/home/username by default) is now created.To set configuration files for the user's session, the following secret files are copied into another user's home directory.

.bash_logout

.bash_profile

.bashrc

/var/spool/mail/username includes the user's mail spool.The new user account is arranged in groups with the same name.

Learn more:

Linux system: brainly.com/question/13843535

111+ 11- 1


1111+1111




1101 +1101


1010-11​

Answers

Answer: 121, 2222, 2202, 999

Explanation:

Answer:

a. 121

b. 2222

c. 2202

c. 999

I think you have been doing a great job but you haven’t been signing many people up for our new service feature I want you to set a goal of signing up 25% of your new customers for our new service feature if I get 96 new customers that means I have to get how many of them to sign up

Answers

Answer:

24 customers

Explanation:

Given

[tex]Customers = 96[/tex]

[tex]p = 25\%[/tex] --- proportion to sign up

Required

The number of customers to sign up

This is calculated as:

[tex]n = p * Customers[/tex]

So, we have:

[tex]n = 25\% * 96[/tex]

[tex]n = 24[/tex]

What is the easiest way to deploy a C++ program to a user’s computer? a. Copy the source code to the user’s computer and then compile it b. Create a batch file that copies the program to the user’s computer and then run it c. Copy the executable file to the user’s computer d. Create an installer program and then run it on the user’s computer

Answers

Answer:

c. Copy the executable file to the user’s computer

Explanation:

When you run a c++ program, an executable file (.exe) is created in the same directory with the source file.

To deploy this program on another system, you need to transfer the executable file from the original system where the program was executed to the new system.

The program will work fine without errors.

However, do not mistake the executable file for the source file. The source file ends in .cpp.

Draw AND, OR, XOR and XNOR gates with truth table and logic gates.

.​

Answers

Answer:

see picture. let me know if you have questions.

Other Questions
as a law enforcement officers, how you will handle a situation if a person with mental illness is involved? The fact that only your liver cells produce liver enzyme and not your skin cells, which contain the same DNA, can be explained by O PCR O gene expression O gene flow NA HELP Describe one main ideas that walt whitman and Henry David have in common (read the picture for full question ) A large bakery buys flour in 25-pound bags. The bakery uses an average of 4200 bags a year. Preparing an order and receiving a shipment of flour involves a cost of $10.70 per order. Annual carrying costs are $76 per bag. Determine the EOQ. (Keep two decimal places in your answer) Problems 5-9, Find the value of the variable to the nearest tenth of each triangle. After the civil war, the U.S became more: video cameras can ............robbers discribe two ways to zoom in and out from an image exactly in which countries abortion was banned. and what are missing to do it? Consider the baggage check-in process of a small airline. Check-in data indicates that from 9am to 10am, 190 passengers checked in. Moreover, based on counting the number of passengers waiting in line, airport management found that the average number of passengers waiting for check-in was 56.Required:How long did the average passenger have to wait in line? How do you expand ln(1/49^k) A forest was cleared and turned into a field of organic soybean plants. Which of the following most likely occurred?A. The variety of plants and animals both increasedB. The number of insects increasedC. The number of insects decreasedD. The number of plant species increased What is the impact on human achievement?A. SocialB. CulturalC. PoliticalD. Economic The teacher's helper was putting cookies onto plates. He put 1 cookie on the first plate, 4 cookies on the second plate, 16 cookies on the third plate, and 64 cookies on the fourth plate. What kind of sequence is this? Cundo ha sentidonostalgia usted oalguien cercano austed? How did the attack of Pearl Harbor change the course of World War Two Tom and Jerry make separate investments at the same time. Tom invests $2000 at an annual interest rate of 2% compounded continuously. Jerry invests $1800 at an annual rate of 2.5% compounded monthly.a.) Who has the most money after 15 years? Clearly show all work to support your answer. b.) How long will it take for Toms investment to triple in value? If p (x) = x4 + 2x2 + 1 and q (x) = x4 2x2 + 1, find p (x) -q (x). Bismarcks policies included all of the following actions except:a. strengthening the German army.b. unifying all of Germany.c. making and breaking alliances as necessary.d. forcing Protestants to convert to Catholicism. Assuming that a person going to community college can't afford to go to a four-year college is an example of a) a generalization. b) discrimination. O c) a stereotype. O d) tolerance.