QUES: On April 25, 2007, Internet Archive and Suzanne Shell jointly announced the settlement of their lawsuit. The Internet Archive said it "...has no interest in including materials in the Wayback Machine of persons who do not wish to have their Web content archived. We recognize that Ms. Shell has a valid and enforceable copyright in her Web site and we regret that the inclusion of her Web site in the Wayback Machine resulted in this litigation." Shell said, "I respect the historical value of Internet Archive's goal. I never intended to interfere with that goal nor cause it any harm."
Who never intended to interfere with Suzanne Shell's goal?

ANS: unanswerable

QUES: Federations often employ the paradox of being a union of states, while still being states (or having aspects of statehood) in themselves. For example, James Madison (author of the US Constitution) wrote in Federalist Paper No. 39 that the US Constitution "is in strictness neither a national nor a federal constitution; but a composition of both. In its foundation, it is federal, not national; in the sources from which the ordinary powers of the Government are drawn, it is partly federal, and partly national..." This stems from the fact that states in the US maintain all sovereignty that they do not yield to the federation by their own consent. This was reaffirmed by the Tenth Amendment to the United States Constitution, which reserves all powers and rights that are not delegated to the Federal Government as left to the States and to the people.
What is the foundation for federalist paper no. 93?

ANS: unanswerable

QUES: Denial of service attacks are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim account to be locked, or they may overload the capabilities of a machine or network and block all users at once. While a network attack from a single IP address can be blocked by adding a new firewall rule, many forms of Distributed denial of service (DDoS) attacks are possible, where the attack comes from a large number of points – and defending is much more difficult. Such attacks can originate from the zombie computers of a botnet, but a range of other techniques are possible including reflection and amplification attacks, where innocent systems are fooled into sending traffic to the victim.
What are attacks where innocent systems are fooled into sending traffic to the victom called?

ANS: reflection and amplification attacks

QUES: West began an on-and-off relationship with designer Alexis Phifer in 2002, and they became engaged in August 2006. The pair ended their 18-month engagement in 2008. West subsequently dated model Amber Rose from 2008 until the summer of 2010. West began dating reality star and longtime friend Kim Kardashian in April 2012. West and Kardashian became engaged in October 2013, and married on May 24, 2014 at Fort di Belvedere in Florence, Italy. Their private ceremony was subject to widespread mainstream coverage, with West taking issue with the couple's portrayal in the media. They have two children: daughter North "Nori" West (born June 15, 2013) and son Saint West (born December 5, 2015). In April 2015, West and Kardashian traveled to Jerusalem to have North baptized in the Armenian Apostolic Church at the Cathedral of St. James. The couple's high status and respective careers have resulted in their relationship becoming subject to heavy media coverage; The New York Times referred to their marriage as "a historic blizzard of celebrity."
Kanye's first engagement was to which well-known designer?

ANS:
Alexis Phifer