Which security measure provides protection from IP spoofing?

A ______ provides protection from IP spoofing.

PLEASE HELP I need to finish 2 assignments to pass this school year pleasee im giving my only 30 points please

Answers

Answer 1

Answer:

An SSL also provides protection from IP spoofing.


Related Questions

what is a web client​

Answers

Answer:

A Web client typically refers to the Web browser in the user's machine or mobile device. It may also refer to extensions and helper applications that enhance the browser to support special services from the site.

hope this helps

have a good day :)

Explanation:

A Web client typically refers to the Web browser in the user's machine or mobile device. It may also refer to extensions and helper applications that enhance the browser to support special services from the site.

Here's an example:

Your web browser is an example of a web client. The remote machine containing the document you requested is called a web server. The client and server communicate using a special language (a "protocol") called HTTP.

Good luck!

PLEASE HELP ME ASAP!!!!

Answers

First party insurance: Loss due to laptop theft, loss due to interruption in business activities due to website failure

Third party insurance: cost of lawsuits filed against the policyholder, fees of a special programmer investigating a cyber fraud, expenses of providing notifications of the cyber attack to clients and employees

what is the Is option that prints to the author of a file?​

Answers

Answer:

We need to use Option - 'author' along with option- 'l'

A security technician is configuring a new firewall appliance for a production environment. The firewall must support secure web services for client workstations on the 10.10.10.0/24 network. The same client workstations are configured to contact a server at 192.168.1.15/24 for domain name resolution.

Required:
What rules should the technician add to the firewall to allow this connectivity for the client workstations

Answers

Answer:

Explanation:

Based on the information provided in the question, the best rules that the technician should add to the firewall would be the following

Permit 10.10.10.0/24 0.0.0.0 -p tcp --dport 443

Permit 10.10.10.0/24 192.168.1.15/24 -p udp --dport 53

This is because port 443 is used for "Secure webs services" while UDP port 53 is used for queries and domain name resolution. Both of which are the main configurations that the security technician needs to obtain.

Select the correct answer from each drop-down menu.

As a technical writer, you should state your purpose in the 1. ________ of your summary. In addition, you must _
2.______ the words used in the original document while writing a summary.

1. Last sentence
1. First sentence

2. Paraphrase
2. Copy
2. Quote

Answers

Answer:

1. First sentence

2. Paraphrase

Explanation:

Just took it

Yo I need to know where to find a ps4 for free or a very cheap price please

Answers

Download offer up from the apple store or play store and search that up there’s many good deals and sometimes comes with games and controls included for cheap!

Determining Uses for Outer Joins
Which situation would most benefit from an outer join?
a query that shows only customers who placed orders
a query that shows all duplicate customers from both tables
O a query that shows only the orders that have customers attached
a query that shows all customers, whether or not they placed an order
ve

Answers

Answer:

a query that shows all customers, whether or not they placed an order

Explanation:

EDG 21

Describing the One-to-Many Relationship
What is another name for the one-to-many relationship?
child-to-parent
O parent-to-child
O student-to-teacher
O teacher-to-student
Ve

Answers

Answer: B) Parent-to-child

Answer:

What is another name for the one-to-many relationship?

child-to-parent

Correct Answer: parent-to-child( B)

student-to-teacher

teacher-to-student

Explanation:

The Internet is written in a "language" called
O Usenet
O package switching
O HTTP
O ARPANET​

Answers

Answer:

HTTP

Explanation:

I hope it helps u.

Mark Me as brainlist answer

HTTP

Have a great day! I hope this helped!

You have a larger file but do not need it right away. In this scenario, you have to change the way a file is used to make it what?
O open
o closed
compressed
O usable

Answers

Answer:

Compressed

Explanation:

I hope this helps!

Answer:

usable

Explanation:

open doesnt make any sense, neither does closed and compressed is wrong i chose it and got it wrong. Its usable

URGENTTTTTTTTTTTT
You want to find a random decimal between 0 and 1, with 0 included. Choose the correct lines of code, in the order they should appear in IDLE. Sample Output: 0.3570702149467504
>>>_________
>>>_________

from math import *
randint(0,1)
from random import *
random( )​

Answers

Answer:

from random import *

print(random())

Explanation:

You can try this in any online python ide quicker than putting the question here!

I WILL GIVE MOST BRAINLY



Which factor most contributed to the rise of globalization beginning in the 20th century?
A.Consumers preferring to buy local goods
B.Governments breaking up corporate monopolies
C.Economist promoting barriers to trade
D.Internet access becoming widespread


Plz help I need this ASAP

Answers

i say C, i’m srry if i’m wrong

The factor that contributed to the rise of globalization beginning in the 20th century is economist promoting barriers to trade. Thus, option C is correct.

What is globalization?

Globalization has made communication between the countries easier to share information openly. This has also helped to increase the speed of transportation of products. Globalization brings nations together, breaking down cultural barriers and turning the world into a global village.

Technology not only changes the way we produce and connect, but also enables more humans to create and test new objects and ideas, reducing the costs and risks of innovation. Product development, even in developing countries.

Globalization has positive effects such as increase in national income, access to global capital, emergence of new business opportunities, increase in loans and investments, transfer of technology, development of energy and communication infrastructures. Improvement of labor quality and working conditions

Thus, option C is correct.

Learn more about Globalization on:

https://brainly.com/question/15283031

#SPJ7

n
What options are available in the Lookup Wizard? Check all that apply.
label the field
sort the records
filter the records
o adjust the column width
O adjust the header height
reduce the number of columns
Je
set where to get lookup field values

Answers

Answer:

Label the field

sort records

adjust the column width

set where to get lookup fields

Explanation:

Please help me ASAP!

Answers

Answer:

security hacker

Explanation:

security hackers are people who hack software to check for vulnerabilities. most of the time security hackers are white hat hackers who work to perform penetration tests to see if a software is secure.

tell me if this is wrong :)

The person previous to my response is correct. The answer is security hacker. In the description it specifically states that her job involves hacking into the companies system.

Write a program that lets the user enter the total rainfall for each of 12 months into a vector of doubles. The program will also have a vector of 12 strings to hold the names of the months. The program should calculate and display the total rainfall for the year, the average monthly rainfall, and the months with the highest and lowest amounts.

Answers

Answer:

Explanation:

#include<iostream>

#include<iomanip>

#include<vector>

using namespace std;

double getAverage(const vector<double> amounts)

{

   double sum = 0.0;

   for (int i = 0; i < amounts.size(); i++)

       sum += amounts[i];

   return(sum / (double)amounts.size());

}

int getMinimum(const vector<double> amounts)

{

   double min = amounts[0];

   int minIndex = 0;

   for (int i = 0; i < amounts.size(); i++)

   {

       if (amounts[i] < min)

       {

           min = amounts[i];

           minIndex = i;

       }

   }

   return minIndex;

}

int getMaximum(const vector<double> amounts)

{

   double max = amounts[0];

   int maxIndex = 0;

   for (int i = 0; i < amounts.size(); i++)

   {

       if (amounts[i] > max)

       {

           max = amounts[i];

           maxIndex = i;

       }

   }

   return maxIndex;

}

int main()

{

   vector<string> months;

   vector<double> rainfalls;

   months.push_back("January");

   months.push_back("February");

   months.push_back("March");

   months.push_back("April");

   months.push_back("May");

   months.push_back("June");

   months.push_back("July");

   months.push_back("August");

   months.push_back("September");

   months.push_back("October");

   months.push_back("November");

   months.push_back("December");

   cout << "Input 12 rainfall amounts for each month:\n";

   for (int i = 0; i < 12; i++)

   {

       double amt;

       cin >> amt;

       rainfalls.push_back(amt);

   }

   cout << "\nMONTHLY RAINFALL AMOUNTS\n";

   cout << setprecision(2) << fixed << showpoint;

   for (int i = 0; i < 12; i++)

       cout << left << setw(11) << months[i] << right << setw(5) << rainfalls[i] << endl;

   cout << "\nAVERAGE RAINFALL FOR THE YEAR\n" << "Average: " << getAverage(rainfalls) << endl;

   int minIndex = getMinimum(rainfalls);

   int maxIndex = getMaximum(rainfalls);

   cout << "\nMONTH AND AMOUNT FOR MINIMUM RAINFALL FOR THE YEAR\n";

   cout << months[minIndex] << " " << rainfalls[minIndex] << endl;

   cout << "\nMONTH AND AMOUNT FOR MAXIMUM RAINFALL FOR THE YEAR\n";

   cout << months[maxIndex] << " " << rainfalls[maxIndex] << endl;

   return 0;

}

Complete the divisible_by(list1, int1) function below. As input, it takes a list of integers list1 and an integer int1. It should return a list with all the integers in list1 where the integer is divisible by int1. For example, divisible_by([2, 9, 4, 19, 20, -3, -15], 3) should return the list [9, -3, -15].
1 def divisible_by(listi, n):
2 # code goes here
3 pass
4
5 if _name == "__main__":
6 # use this to test your function
7 test_list = [2, 9, 4, 19, 20, -3, -15]
8 print(divisible_by(test_list, 3))

Answers

Answer:

The function is as follows:

def divisible_by(listi, n):

   mylist = []

   for i in listi:

       if i%n == 0:

           mylist.append(i)

   return mylist

   pass

Explanation:

This defines the function

def divisible_by(listi, n):

This creates an empty list

   mylist = []

This iterates through the list

   for i in listi:

This checks if the elements of the list is divisible by n

       if i%n == 0:

If yes, the number is appended to the list

           mylist.append(i)

This returns the list

   return mylist

   pass

Design an algorithm to find the weighted average of four test scores. The four test scores and their respective weights are given in the following format: testscore1 weight1 ... For example, the sample data is as follows: 75 0.20 95 0.35 85 0.15 65 0.30 The user is supposed to enter the data and press a Calculate button. The program must display the weighted average.

Answers

Answer:

data = [75, 0.2, 95, 0.35, 85, 0.15]

print (f'Average weight: {sum(data) / len(data)}')

Explanation:

This is python algorithm for finding average weight. To get average weight, you sum up all data involved and divide that amount by the number of data provided.

List to String (0.5 points) Since we are often dealing with a list of strings, it would be useful to have a function to tum a list of strings back into one single concatenated string, This function will return a string that is each element of input_list concatenated together with each separated by the string Separator For example, the following function call: list_to_string('This', 'is's 'fun' should return; "This is fun To do this, write a function called list_to_string This function should have the following inputs, outputs, and internal procedures: Input(s) input_list - list of strings . separator - string Output(s); . output - string Procedure(s): - assign a variable called output to be the first (index 0) element from input_list - loop through the rest of input_list, looping from the 2nd element index 1) through to the end of the list - Within the loop, use string concatenator to combine output with the current element, separated by separator • Assign the output of this to be the new value of output • return output, which should now be a list of the elements of input_list joined together into a single string

Answers

Answer:

The function is as follows:

def list_to_string(input_list,separator):

   output = ""

   for inp in input_list:

       output+=inp+separator

       

   output = output[:-1]

   return output

Explanation:

Given

See attachment for instruction

Required

A function to convert list to string

This defines the string

def list_to_string(input_list,separator):

This initializes the output to an empty string

   output = ""

This iterates through the input list

   for inp in input_list:

This concatenates every string in the list including the separator

       output+=inp+separator

This removes the last character of the string

   output = output[:-1]

This returns the output string

   return output

What are the difference between data and information?​

Answers

Answer

The terms data and information can mean different things in different contexts, but the main differences between them are: Data is a collection of facts. Information is how you understand those facts in context. Data is unorganized, while information is structured or organized.

The biggest limitation of a network operating system (NOS) is _____ in terms of memory, process, device, and file management.

Answers

Answer:

Lack of global control.

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

There are different types of operating systems (OS) used for specific purposes and these are;

1. Batch Operating System.

2. Multitasking/Time Sharing OS.

3. Multiprocessing OS.

4. Single User OS.

5. Mobile OS.

6. Real Time OS .

7. Distributed OS.

8. Network OS.

A network operating system (NOS) can be defined as specialized computer operating system that are designed primarily for use on network devices such as routers, switches, workstations, which are mainly connected to a local area network.

Generally, the biggest limitation of a network operating system (NOS) is lack of global in terms of memory, process, device, and file management.

PLEASE HELP ME ASAP

Answers

The answer is B; network security. If there is an issue with the software corruption, there is an issue with the security and validity of the website. A website encryption could prevent this from happening or even a simple virus cleaner.

Answer quick plzzz I only have 2 hours

Answers

Answer:

option 2

Explanation:

Answer:

B. Kathy performs tasks common to the Engineering and Technology pathway and Sean and Joan perform tasks common to the Science and Math pathway.

The given SQL creates a Movie table and inserts some movies. The SELECT statement selects all movies released before January 1, 2000 Modify the SELECT statement to select the title and release date of PG-13 movies that are released after February 1, 2008. Run your solution and verify the result table shows just the titles and release dates for The Dark Knight and Crazy Rich Asians. 3 6 1 CREATE TABLE Movie ( 2 ID INT AUTO_INCREMENT, Title VARCHAR(100), 4 Rating CHAR(5) CHECK (Rating IN ('G', 'PG', 'PG-13', 'R')), 5 ReleaseDate DATE, PRIMARY KEY (ID) 7); 8 9 INSERT INTO Movie (Title, Rating, ReleaseDate) VALUES 19 ('Casablanca', 'PG', '1943-01-23'), 11 ("Bridget Jones's Diary', 'PG-13', '2001-04-13'), 12 ('The Dark Knight', 'PG-13', '2008-07-18'), 13 ("Hidden Figures', 'PG', '2017-01-06'), 14 ('Toy Story', 'G', '1995-11-22'), 15 ("Rocky', 'PG', '1976-11-21'), 16 ('Crazy Rich Asians', 'PG-13', '2018-08-15'); 17 18 -- Modify the SELECT statement: 19 SELECT * 20 FROM Movie 21 WHERE ReleaseDate < '2000-01-01'; 22

Answers

Answer:

The modified SQL code is as follows:

SELECT Title, ReleaseDate FROM movie WHERE Rating = "PG-13" and ReleaseDate >  '2008-02-01'

Explanation:

The syntax of an SQL select statement is:

SELECT c1, c2, c...n FROM table WHERE condition-1, AND/OR condition-n

In this query, we are to select only the title and the release date.

So, we have:

SELECT Title, ReleaseDate

The table name is Movie.

So, we have:

SELECT Title, ReleaseDate FROM movie

And the condition for selection is that:

Ratings must be PG-13

And the date must be later than February 1, 2008

This implies that:

Rating = "PG-13"

ReleaseDate >  '2008-02-01'

So, the complete query is:

SELECT Title, ReleaseDate FROM movie WHERE Rating = "PG-13" and ReleaseDate >  '2008-02-01'

4. Ito ay ang lugar kung saan nagtatagpo ang bawat column at
row.
A. cell
B. data
C. file tab
D. sheet tab

PATULONG ​PO PLS

Answers

Answer: A. Cell

Explanation:

A cell is the point on the worksheet that results from the intersection of a column and a row.

This is why cells can be identified by the column and row that they are the result of. For instance, a cell can be called "A12" which is also known as its "address". This means that it is a result of the intersection of "Column A" and "Row 12".

PLEASE HELP ME ASAP!!!!

Answers

The answer is A. Spyware describes software with malicious behavior that aims to gather information about a person or organization and send such information to another entity in a way that harms the user. For example by violating their privacy or endangering their device's security.

Write a new method in the Rectangle class to test if a Point falls within the rectangle. For this exercise, assume that a rectangle at (0,0) with width 10 and height 5 has open upper bounds on the width and height, i.e. it stretches in the x direction from [0 to 10), where 0 is included but 10 is excluded, and from [0 to 5) in the y direction. So it does not contain the point (10, 2). These tests should pass:

Answers

Answer:

Explanation:

The Rectangle and Point class is not provided in this question but was found online. Using that code as guidance I created the following method named contains. This method takes in a Point object and checks to see if the x-axis point is inside the parameters of the Rectangle class and then checks the same for the y-axis. If it is inside the Rectangle then the method returns true otherwise it returns false.

def contains(self, point):

       return self.width > point.x >= self.corner.x and self.height > point.y >= self.corner.y

Write a recursive method named hanoi that prints a solution to the classic Towers of Hanoi puzzle. Your method should accept three integer parameters representing the number of disks, the starting page number, and ending peg number. Your method should print the solution to the game to move from the given start peg to the given end peg. For example, the call of hanoi(3, 1, 3); should print the following output to move the three pegs from peg

Answers

Answer:

Explanation:

The following recursive method is written in Java. It creates a simulation of the towers of Hanoi and outputs every step-by-step instruction on how to solve it. The output for the code can be seen in the attached picture below.

class Brainly {

   public static String hanoi(int numOfDisks, int startPeg, int endPeg) {

       int helpPeg;

       String sol1, sol2, MyStep, mysol;   // Contains moves

       if (numOfDisks == 1) {

           return "Move from " + startPeg + " to " + endPeg + "\n";

       } else {

           helpPeg = 6 - startPeg - endPeg;    // Because startPeg + helpPeg + endPeg = 6

           sol1 = hanoi(numOfDisks - 1, startPeg, helpPeg);

           MyStep = "Move from " + startPeg + " to " + endPeg + "\n";

           sol2 = hanoi(numOfDisks - 1, helpPeg, endPeg);

           mysol = sol1 + MyStep + sol2;     // + = String concatenation !

           return mysol;

       }

   }

   public static void main(String[] args) {

      String output = hanoi(3, 1, 3);

       System.out.println(output);

   }

}

Write a Java program named Problem 3 that prompts the user to enter two integers, a start value and end value ( you may assume that the start value is less than the end value). As output, the program is to display the odd values from the start value to the end value. For example, if the user enters 2 and 14, the output would be 3, 5, 7, 9, 11, 13 and if the user enters 14 and 3, the output would be 3, 5, 7, 9, 11, 13.

Answers

Answer:

hope this helps

Explanation:

import java.util.Scanner;

public class Problem3 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.print("Enter start value: ");

       int start = in.nextInt();

       System.out.print("Enter end value: ");

       int end = in.nextInt();

       if (start > end) {

           int temp = start;

           start = end;

           end = temp;

       }

       for (int i = start; i <= end; i++) {

           if (i % 2 == 1) {

               System.out.print(i);

               if (i == end || i + 1 == end) {

                   System.out.println();

               } else {

                   System.out.print(", ");

               }

           }

       }

   }

}

Your assignment is to write an assembly language program which read a string and print it in uppercase. This program asks the user to enter a string which is subsequently displayed in uppercase. It is important to first ensure that string to be converted is in the a-z range. The program does not recognize any space, symbols or any kind of punctuation marks. Any time the user enters any of this character the program is going to repeatedly ask for the valid string.

An example execution of your program could be:
Please enter your string: 1winter
Invalid Entry!
Please enter your string: summer
Your capitalized string:SUMMER

Answers

Answer:

try this

Explanation:

MSG1 DB 10,13,'enter any string:-$'

MSG2 DB 10,13,'converted string is:-$'

P1 LABEL BYTE

M1 DB 0FFH

L1 DB?

P11 DB 0FFH DUP<'$'>

DATA ENDS

DISPLAY MARCO MSG

MOV AH,9

LEA DX,MSG

INT 21H

ENDM

CODE SEGMENT

ASSUME CS: CODE,DS:DATA

START:

MOV AX,DATA

MOV DS,AX

DISPLAY MSG1

LEA DX,P1

MOV AH,0AH

INT 21H

DISPLAY MSG2

LEA SI,P1

MOV CL,L1

MOV CH,0

CHECK:

CMP[SI],61H

JB DONE

CMP[SI],5BH

UPR: SUB[SI],20H

DONE: INC SI

LOOP CHECK

DISPLAY P11

MOV AH,4CH

INT 21H

CODE ENDS

END START

What kinds of components are tangible assets?

Answers

Answer:

Tangible assets are physical like cash, inventory, vehicles, equipment, buildings and investments.

Explanation:

Other Questions
Find the missing term in the perfect-square trinomial. ____ 108y + 36 Approximately what percentage of Americans do not participate in the government process?a. 5-10%b. 15-2096c. 20-30%d. 30-4596 Identify which of the following statements does NOT support thetheory of Natural Selection.A. populations tend to produce more individuals than theenvironment can support.B. individuals adapt to their environments and, thereby, evolve.C. genetic variation exists within populations.D. individuals who survive longer tend to leave more offspring thanthose who die young. The segments shown below could form a triangle.A. TrueB. False ( This isnt really a homework question, its more of just a general question ) I am starting to code C# and I have downloaded visual studio and dotnet, but when trying to run the code for opening a new console template it keeps giving me this error " dotnet : The term 'dotnet' is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again.At line:1 char:1+ dotnet new console+ ~~~~~~ + CategoryInfo : ObjectNotFound: (dotnet:String) [], CommandNotFoundException + FullyQualifiedErrorId : CommandNotFoundException " Please help me fix this. ( btw i am using dotnet 6.0 SDK, but before that I was using 5.0.203 Although the many different tribes of Native America are vastly different, music lies at the heart of all of them. Question 1 options: True False Question 2 (1 point) The most commonly used instrument in Native American music is the drum. Question 2 options: True False Question 3 (1 point) Dance is not an important part of Native American music and culture. Question 3 options: True False Question 4 (1 point) When judging the quality of Native American music, what is most important? Question 4 options: The strength of the beat/rhythm The tone of the singer The feelings that the music generates The dance that accompanies the music Question 5 (1 point) What does the drum represent in Native American music? Question 5 options: the voice of the tribal leader the heartbeat of Mother Earth the movement of water the feeling of the wind Question 6 (1 point) Irish music focuses on _____. Question 6 options: religious ceremonies tribal rituals storytelling social status Question 7 (1 point) The national instrument of Ireland is the _____ Question 7 options: fiddle bodhran tin whistle harp Question 8 (1 point) Sean nos songs are typically about what types of topics? Question 8 options: Miserable topics like death or oppression Joyous topics like weddings or births Religious topics like worship Warning people of upcoming war or battle Question 9 (1 point) Which of the following is a traditional dance song in Ireland? Question 9 options: Jig Reel Hornpipe All of the above Question 10 (1 point) Visitors to Ireland today can participate in a ______, a traditional session of Irish music played in a pub. Question 10 options: Sean nos Celtic Jig Trad Sesh Hornpipe PLEASE HELP ASAPA deck of cards has 52 cards. There are 4 suits, diamonds, hearts, clubs and spades. Each suit has 13 cards. What is the probability that I will randomly pick a 2, put it back, then randomly pick a 4? Can someone answer this please Select the two words that both end in the suffix -ence and follow the spelling rule above. I WILL MARK BRAINLIEST IF ANYONE HELPS ME WITH THE CORRECT ANSWER!! The chart to the right shows the cost to attend a university for one semester. Silas will attend the university next year. He has received a $19,000 scholarship and his parents will contribute $16,000 toward his college expenses. If Silas saves for 12 months, about how much will he need to save per month to cover his college expenses for one year (two semesters)? Select one:A ] $745.60B ] $1,250.00C ] $864.23D ] $1,141.20 Elli painted two fourths of the fence. Nolan painted three eighths of the fence. How much of the fence did they paint please help me out when u can ty Elie Wiesel once said that anyone who witnesses an atrocity, or an act of inhumanity, and does nothing to stop it is just as guilty as the person committing the act. Those who know and remain silent are guilty of the same offense. To stand by silently is to participate in the crime. In a paragraph of at least 4 sentences, evaluate this statement. (Remember, evaluate means show whether it is right or wrong.) Explain why you feel the way you do, and give an example to support your feeling. 1.Summarize this amendment in at least 2-3 lines. 2.Would you want a soldier kicking you out of your house? Why would this be unfortunate? Explain. Can you please help me An architect wants to draw a rectangle with a diagonal of 13 centimeters. The length of the rectangle is to be 3 centimeters more than triple the width. What dimensions should she make the rectangle? PLEASE ANSWER IN SCIENTIFIC NOTATION WITH STEPS PLEASE DUE BY 10:15 AM Which of these actions is likely to spread pathogens in the environment? Cupping mouth while coughing Touching wounds Wiping door knobs Washing fruits don't have a question so this be fr ee points also who likes these songsSmells Like Teen Spirit - Nirvana.Imagine - John Lennon.One - U2.Billie Jean - Michael Jackson.Bohemian Rhapsody - Queen.Hey Jude - The Beatles.Like A Rolling Stone - Bob Dylan.I Can't Get No Satisfaction - Rolling Stones.