A computer is the __________ of an attack when it is used to conduct an attack against another computer.

Answers

Answer 1

Answer:

A computer is the __________ of an attack when it is used to conduct an attack against another computer.

Answer: Subject

Explanation:


Related Questions

Which statement best describes one reason why assembly
language is easier to use than machine language?
O A. It allows programmers to easily calculate prime numbers.
O B. It uses the simplest form of code, also known as binary
code.
O c. It is the best way to tell a computer to complete a
single task.
O D. It allows programmers to write abbreviations instead of
repeating calculations

Answers

Answer:

D. It allows programmers to write abbreviations instead of repeating calculations

Advantages & Disadvantages of flow chart​

Answers

Answer:

Advantages of flow charts:

1. Communication where flowcharts are a more effective technique of explaining a system's rationale to all parties involved.

2. Efficient interpretation by using a flowchart, a problem can be investigated more effectively, resulting in lower costs and less time wasted.

3. Appropriate documentation such when program flowcharts serve as good documentary evidence, that is required for a variety of objectives, allowing things to run more smoothly.

4. Effective Coding where during the systems analysis and software development phases, the flowcharts serve as a guide or blueprint.

5. Practical Debug where the flowchart assists with the debugging process.

6. Efficient Program Maintenance by using a flowchart, it is simple to maintain an operational program. It allows the programmer to focus his efforts more effectively on that section.

Disadvantages of flow charts:

1. Manual traceability is required to ensure the accuracy of the flowchart drawn on paper.

2. Simple changes to the problem reasoning may necessitate a complete redo of the flowchart.

3. Displaying many branches and looping in flowchart is challenging.

4. When dealing with a complicated project or algorithm, the flowchart becomes very challenging and imprecise.

5. It can take some time to modify a flowchart.

Which are ways that technology keeps you hooked?

Answers

Answer:

you get games, apps, siri, g oog le and different things like phones, tablets, comuptures

Explanation:

The process of copying and storing data,files,progrms,etc.from internet server to user's computer is know as ..........

Please help me ​

Answers

(Storage) i think…okay

Which VPN protocol provides encryption but does not support IP multicast traffic?

IPsec
PPTP
L2TP
SSL VPN

Answers

Answer:

this?

Explanation:

multiple choice?

The __________ backup method is based on the philosophy that a full backup should occur at regular intervals, such as monthly or weekly

Answers

Answer:

full/incremental backup

Explanation:

I believe it's full/incremental backup.

what is the Result obtained after data processing called?​

Answers

Answer:

Output

Any information which get processed by and sent out from a computer is called output. It is the final result which we get after processing

Answer:

output

Explanation:

it'll be called output

Maria is developing an online gaming website. She is working on an interactive game that has a central character guiding visitors through the game. Which element of multimedia is most suitable for this type of website?

Answers

Answer:

The answer is animation. This question has been answered already.

Source:

https://brainly.com/question/12414395

What happens when you restrict someone on messenger?.

Answers

Answer:

You won't get any notifications from the person that's restricted, via messages, videos, or images. If the restricted person tries calling you, your phone won't ring.

When you insert a new slide in a presentation, where is it placed in relation to the existing slides?.

Answers

Whenever you create a new slide, it appears below the selected slide.

If you have 2 slides and want one in between the two select the first slide and then select new slide.

When you start an online course, what should you do to make sure you have access to college resources

Answers

As a student starting an online course, you should explore the college website to make sure you have access to college resources.

What is an online course?

An online course can be defined as an education programme that typically involves the process of providing and sharing learning resources (contents) in an organized way over the Internet, so as to allow the students (users) progress in their understanding of a course or topic.

As a student starting an online course, you should do the following to make sure you have access to college resources:

Explore the college website.Bookmark links to your course.Search for information with regards to advising, degree requirements, and financial aid.

Read more on online course here: https://brainly.com/question/14591988

#SPJ1

Describe a new career in computer science that may be created in the future

Answers

No Code / Low Code Business Analyst.

This would involve someone that goes in to make sure that the business processes of the No Code / Low Code programmers are doing their job efficiently!

For this step, submit your work in the programming environment by running your code, checking your code for a score. The score you get will show a percentage - this is a percentage of the 10 possible points. For example, if you check your code and earn a 50%, this means you have earned 5 out of 10 points. You can check your code more than once, until you earn a score you are happy with.

You must include all of the following requirements in your webpage to earn full points:

A page title
At least three headers (h1, h2, etc)
Paragraph tags
Font styles (for example, using to change the font's color)
At least two images (see below for more information about images)
At least one link to another website
One email link
A background, using either of the following techniques:
Inserting a background image (does not count as one of the two images above)
Changing the background color (using the tag)
Once you complete the steps on this page, proceed to Step 2 on the next page. You must complete both steps to complete this unit's assignment.

Answers

A sample HTML code that contains headers, paragraph tags, hyperlinks is

<h1> This is a header </h1><h2> This is a subtitle heading </h2><p> This is a paragraph </p><a href=”www.brainly.com”> Brainly Website </a>

What is HTML?

This is the building block of a website and is an acronym that means Hypertext Markup Language.

The HTML code that can be used to add a sample image is: "<img src="pic_Brainly.jpeg" alt="Brainly" width="500" height="333">

The src code means the specific location of the external resource

The width and height show how tall and wide the image would be.

The alt shows the alternative information for the image that can be seen when a person hovers over the image on the website.

Read more about HTML and CSS here:

https://brainly.com/question/24051672

#SPJ1

Mack signs into his laptop and gets a message saying all his files have been encrypted and will only be released if he sends money to the attacker. what kind of software did this

Answers

Answer: Ransom-Ware

Random-Ware is a type of malware that encrypts files in hopes of the victim to give the attacker a form of currency to gain access to the files again.

Which device performs the function of determining the path that messages should take through internetworks?.

Answers

Answer:

A router

Explanation:

The _____ _____ form of database attack injects code into user login information with one or more statements that perform actions on the database.

Answers

Answer:

The answer is cross-site scripting(XSS)attack.

Explanation:

Hope this helps!

The cross-site scripting (XSS) attack form of database attack injects code into user login information with one or more statements that perform actions on the database.

What is cross-site scripting (XSS)?

Cross-site scripting (XSS) attacks insert a malicious executable script into the source code of a trustworthy program or website. Attackers frequently give users a malicious link to click on in order to launch an XSS attack.

Cross-site scripting can be broadly classified into three types: stored, reflected, and DOM-based XSS. When a third-party web application is loaded from an unrelated attack site in a way that makes it execute a JavaScript segment that has been prepared by the attacker in the security context of the targeted domain by using a reflected or non-reflected.

Thus, it is cross-site scripting (XSS) attack.

For more information about cross-site scripting (XSS) attack, click here:

https://brainly.com/question/26706948

#SPJ5


1. The Forever block is present in the
......... block category.

Answers

Answer:

loop or a repeating block. I think it’s this because I like robotics and I have to know a lot of different kinds of blocks.

Explanation:

This is why.

What is the one small catch with password managers?.

Answers

Answer:

password managers can acess and autofill your passwords

Explanation:

the catch is if you loose all data from your computer or smartphone, then you loose all your passwords

What report shows which types of mobile devices visited a website?.

Answers

Answer:

Technology > Network report. All traffic > Source/Medium report.

Explanation:

hope this helps

what is full form COMPUTER????​

Answers

Explanation:

The full form of the Computer is Common Operating Machine Purposely Used for Technological and Educational Research.

Explanation:

The computer full form of common opreating machine purposely used for technical educational research

I hope you helps:)

You defined a shoe data type and created an instance.
class shoe:
size = 0
color = 'blue'
type = 'sandal'
myShoe = shoe()
Which statement assigns a value to the type?
type = 'sneaker'
myShoe.type( 'sneaker')
myShoe.type = 'sneaker'
NEXT QUESTION
ASK FOR HELP

Answers

Answer:

myShoe.type = 'sneaker'

Explanation:

type is a field of the class shoe. The myShoe object which is an instance of the class shoe has the field type also.

To assign a value to type filed of the object myShoe, reference the object then the field as such;

   myShoe.type = "sneaker"

You defined a shoe data type and created an instance. The statement that assigns a value to the type is myShoe.type = 'sneaker'. The correct option is C.

What is data in programming?

A variable's data type and the kinds of mathematical, relational, and logical operations that can be performed on it without producing an error are classified as data types in programming.

An attribute of a piece of data called a "data type" instructs a computer system on how to interpret that data's value.

type is one of the class shoe's fields. The field type is also present in the myShoe object, which is an instance of the class shoe.

Reference the object and the field as such in order to assign a value to the type field of the object myShoe;

Therefore, the correct option is C. sneaker" in myShoe.type.

To learn more about data in programming, refer to the link:

https://brainly.com/question/14581918

#SPJ2

i'll give u 16 points answer thisss

Answers

Big hero six was the greatest kid movie ever invented like there is no question about that I love that movie

A restaurant has an app that allows users to view the menu and order online. You have been hired to upgrade the app because it is out of date, in both style and content. What parts of the existing code could you reuse, and what might you need to design from scratch?

Answers

Answer:

You could reuse most of the code. You will need to update some of the style parameters and re-word some of the content, but the base code is there to be used. You will need to fix the items that are on the menu. (Adding new items, Deleting items that don't exist, e.g.)

How to change lowercase to uppercase in excel 2010 shortcut key?.

Answers

I believe it’s shift

What two functions does tcp/ip perform?

reassemble data packets at the destination.
alert users about unsafe websites and servers.
request servers for data the user wants.
check and request for missing data packets.

Answers

The two functions does tcp/ip are:

Reassemble data packets at the destination.Request servers for data the user wants.

What are the functions of TCP IP?

The role of the Transmission Control Protocol is known to be the one that helps to take in and put together the Data Packets while that of IP is to send the Data Packets to the right location or destination.

Therefore, The two functions does tcp/ip are:

Reassemble data packets at the destination.Request servers for data the user wants.

Learn more about tcp/ip from

https://brainly.com/question/17387945

#SPJ1

Why is it important for companies to invest in building a complete data and analytics platform?.

Answers

Companies need to invest in data and analytics platform as it  generates insights by housing data in one place and converting it into easily consumable information at high speed.

Why is it vital to use the analytics of a platform?

Analytics platforms is known to have helped a lot of data scientists as it has help to boast access to a lot of data sources and hardware.

Note that Companies need to invest in data and analytics platform as it  generates insights by housing data in one place and converting it into easily consumable information at high speed.

See options below

It produces cultural support and alignment, a growth mindset, and new ideas and priorities to improve business processes.

It creates awareness of what data can do to improve business processes.

It generates insights by housing data in one place and converting it into easily consumable information at high speed.

It stores large amounts of data that are easily retrievable for future business growth.

Learn more about analytics platform from

https://brainly.com/question/26468036

#SPJ1

How do milestones help a project manager ensure that a project goes smoothly?

A. By showing whether the project is progressing as planned

B. By showing whether the project is being monitored appropriately

C. By indicating whether the right team members have been given the right tasks

D. By indicating whether the project plan needs to be changed

Answers

Answer:

kung pwede lang sana none of the above

Explanation:

good evening po

jk lng po

By showing whether the project is progressing as planned. The correct option is A.

What are Milestones?

Milestones are specific points in time within a project that represent significant accomplishments or completion stages.

They assist a project manager in ensuring the smooth running of a project by providing a means to measure progress and monitor the overall health of the project.

Milestones also help team members stay focused on the project's goals and objectives, as well as provide a sense of accomplishment as each milestone is reached.

While monitoring and appropriate task assignments are important for project success, they are not the primary ways in which milestones assist a project manager in ensuring the smooth running of a project.

Likewise, while milestones may indicate the need for changes to the project plan, their primary purpose is to track progress and identify potential issues, rather than to indicate a completion date.

Thus, the correct option is A.

For more details regarding milestones, visit:

https://brainly.com/question/15843795

#SPJ7

Fifteen years ago, everyone didn't have a cell phone. Anyone developing an app would not have found many users. Today, the existence of mobile apps is one of the reasons why smartphones are so popular today. These apps make phones and tablets smart, in terms of functionality and features. The app market is seeing hundreds of new applications introduced every day. This example shows that _______.

Answers

Answer:

Are there any options?

Explanation:

The world is frequently coming in with better and more advanced technologies. More people are entering the digital world every day. The pace at which disruptive technologies are arriving is accelerating – and they’re changing how we live. The same technologies are giving rise to new business models. Example of development in the past 15 years- A.I.

What are two benefits of defining a function?

Answers

Answer:

enhances the readability of a program.

Define special computer​

Answers

Answer:

A computer designed from scratch to perform a specific function. Contrast with general-purpose computer. See ASIC.

Answer:

Special computer is the computer designed for a particular type of application only. It is defined as a stored program digital computer, whose architecture is oriented towards one or more applications.

Other Questions
P = 3t + 7tWork out the value of P when t = -4 Solve the equation by completing the square.0 = 4x2 64x + 192A. x = -12, -4B. x = 4, 12C. x = -8, 24D. x = -24, 8 The hall voltage is the potential created across a current-carrying metal-strip when the strip is placed in a magnetic field perpendicular to the current flow in the strip. it is used as a research tool to probe the movement of charges in materials, as well as determining the blood flow rate. one fundamental use of the hall effect is the determination of the charge of the charge carriers. what of the following statements is true concerning the strips with a positive versus a negative hall voltage? a) the top strip has positive charge carriers, and the electric field points in the same direction as the electric force. b) the bottom strip has positive charge carriers, and the electric field and electric force point in the same direction. c) the top strip has negative charge carriers, which get deflected to the top of the plate. d) the bottom strip has negative charge carriers, and the magnetic force points upward along the plate. What is the approximate length of minor arc JH? Round to the nearest tenth of a centimeter.3.5 cm6.9 cm21.6 cm46.8 cm What effect did the war have on UNM? Select the correct answer. for which literary work did joseph heller use his military experiences as a primary source? a. "wakefield" b. catch-22 c. "the euphio question" d. a man without a country A researcher asks the first 10 people he meets at a shopping mall about their opinions on a certain brand of shampoo. This is an example of a ________________.A. self-selecting sampleB. convenience sampleC. random sampleD. systematic sample define science in 20 words was the engineer who asked Congress to pass the Transcontinental Railroad Act but died before the railroad washed?Asa WhitneyTheodore JudahThomas DurantAbraham Lincoln A breakfast bar comes in two sizes. The 5-ounce bars come in a box of 10. A box of the 7-ounce has 6 bars. The 5-ounce bar contains 15 grams of dietary fiber. How many grams of dietary fiber are in one box of the 7-ounce bars? Compare and contrast nuetrons,protons, and electrons In a still life the composition is broken up into how many parts?A. 2B. 5C. 4D. 3 Escribe una situacion mas autoritaria que hayas vivido y propon una forma democratica de transformarla. i need help i also need answers a scientist notes that the number of bacteria in a colony is 50.3 hours later, she notes that the number of bacteria has increased to 80. if this rate of growth continues, how much more time will it take for the number of bacteria to reach 1119? Hypertext enables you to navigate through pieces of information by clicking the __________, that connect them. what is the date that lincoln opened the gerrysburg cemetery? Solve below functions word problem ASAP How can food shipments from outside help the people of the Sahel? Which of the following is true about email communication