Answer:
Although hacking is very bad, it can be found everywhere and anywhere.
Examples: Phishing, password checking, and keyloggers
Explanation:
Explanation:
Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.
To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.
Ishmael would like to capture a selected potion of his screen and then capture action he performs on that selected portion. What should he do?
Use a video from my PC command
User the insert screen recording control
Create a poster frame
Use an embed code
Answer: User the insert screen recording control
Explanation:
Since Ishmael wants to capture a selected potion of his screen l, after which he'll then capture the action that he performs on that selected portion, he should use the insert screen recording control.
It should be noted that on most keyboards, there's an "insert screen" button. Also, Ishmael can simply open the window that he wants to screenshot and then click the screenshot button.
Therefore, the correct option is B.
which feature of project management includes monetary compensation for the employees
Answer:
Extrinsic compensation
Explanation:
The feature of project management that includes monetary compensation for employees is the Extrinsic compensation.
Extrinsic compensation is reward ( tangible ) given to workers/employees by the management of a project for the speedy completion of a task or for the completion of a specific task . It can in the form of monetary compensation or non-monetary compensation.
example of Non-monetary compensation includes certificate of honor, medical insurance .
example of monetary compensation includes : work Bonuses , salaries
what's wrong with this python code i don't know what's wrong with both of them
Answer:
Keep it in the format
first one:
def swapping_stars():
line_str = ""
for line in range(6, 8):
for char in range(0, 6):
if line % 2 == char % 2:
line_str = line_str + "*"
else:
line_str = line_str + "-"
print(str(line_str))
swapping_stars()
second one:
if you want it to go:
23456
def print_numbers(list):
for i in range(1, len(list)):
print(str(list[i]))
num_list = [1, 2, 3, 4, 5, 6]
print_numbers(num_list)
if you want it to go
123456
def print_numbers(list):
doneONE = False
for i in range(1, len(list)):
if not doneONE:
print(str(list[i] - 1))
doneONE = True
print(str(list[i]))
num_list = [1, 2, 3, 4, 5, 6]
print_numbers(num_list)
Explanation:
Kevin is scanning old images from his college library. He might use these scanned images in the college magazine. He might also use them on the college website. What is the best practice for Kevin to follow when scanning the images?
A.
scan the images with 72 DPI
B.
scan only the images that are ideal for a website
C.
scan the images with 150 DPI
D.
scan the images with 600 DPI
E.
scan the images that are ideal for a magazine
Answer: D. Scan the images with 600 DPI
Explanation:
Answer: D. Scan the images with 600 DPI
Explanation: Correct for Plato/Edmentum
In VPython, which line of code creates a ball five units away from the user from the center?
ballPosition = _______
myBall = sphere(pos = ballPosition)
vector(0, 0, -5)
vector(0, -5, 0)
vector(-5, 0, 0)
The line of code creates a ball five units away from the user from the cente is ballPosition = vector(0, 0, -5)
What is python code?In Python, there is found to be a generally used coding language such as HTML, etc.
Know that it is often used in programming and software creation and as such, having the ballPosition = to be vector(0, 0, -5) myBall = sphere(pos = ballPosition) is the right thing to do.
Learn more about VPython from
https://brainly.com/question/26497128
#SPJ2
She goes to look at her
HTML code to see what is wrong line by line until she can figure out what she
messed up. Which process is Ana using?
A. Fragmentation
B. Identification
C. Pinpoint
D. Debugging
The process is Ana using is Debugging. Check below to see what the term is all about.
What is debugging used for?Debugging is known to be the act of working on how a given program runs, and also how it creates data so as to be able to defects and know issues in a given code.
Note that since she goes to look at her HTML code to see what is wrong line by line until she can figure out what she messed up, she is engaged in debugging.
Learn more about Debugging from
https://brainly.com/question/163290
#SPJ2
so i just went to play forge of empires and when i logged on to it all of my progress was gone and i was so far in to it
Answer:
That's tough...
Explanation:
Answer:
ok and?
Explanation:
This is not a question
How does a computer get the server's IP and how does it know which way to the server?
Functions of file in computer
[tex]\huge{\textbf{\textsf{{\color{pink}{An}}{\red{sw}}{\orange{er}} {\color{yellow}{:}}}}}[/tex]
File in computers are used to store data, information and commands.
Thanks hope it helps.Pls mark as brainliest.Choose the expression that belongs in the blank in order to have the output shown.
>>> a = 5
>>> print(_____)
The value is5
"The value is " + str(a)
"The value is" , str(a)
"The value is " , str(a)
"The value is" + str(a)
Answer:
Option B
Explanation:
Given
a = 5
and if the value allotted to variable a is to be printed, the following command will be used
print "The values is", str(a)
Hence, option B is correct
Stages of reverse engineering
Answer:
Capture Data, Refine the Model, and then Manufacture it.
Explanation:
What is the output of this program?
grades = [89, 70, 98, 100, 83]
print(grades[-4])
Group of answer choices
89
100
70
98
Answer:
70 is the answer negative one begins from 83 and count down to 89, Therefore, 70 is is -4 and is chosen as the best answer
first calculating device
Answer:
abacus is first calculating device
What is the check digit for the following original product number: 140501941 ? *
a)10
b)7
c)5
d)2
Explanation:
I think it is 7, but I could be wrong..... sorry
Consider the classes below: Which of the following statements is true? Group of answer choices The value of counter will be different at the end of each for loop for each class. The value of j will be the same for each loop for all iterations. Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true. Neither The value of counter will be different at the end of each for loop for each class nor The value of j will be the same for each loop for all iterations is true.
Answer:
probly
Explanation:
Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true.
Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?
Answer:
It stands for Parentheses, Exponents, Multiplication/Division, Addition/Subtraction.
Which of these is a discipline?
software manager
customer service specialist
help desk technician
software engineering
Answer:
Option D
Explanation:
Discipline here refers to any educational course in which a person studies.
software manager , customer service specialist and help desk technician are basically the job designations and not discipline in which one can pursue study.
However, software engineering is a discipline as one can educate himself/herself in this discipline and become a software engineer.
Hence, option D is correct
just need to know if these are correct
Answer:
Yes, they are correct.
Answer:yea g
Explanation:
Fatima has 3 packs of batteries. Each pack contains 4 batteries. She gives her brother 8 batteries to put in his toy robot. Let b represent the number of batteries Fatima has left. Which equation could be used to find the value of b?
Answer: See explanation
Explanation:
Let b represent the number of batteries Fatima has left.
The equation that can be used to find the value of b goes thus:
(3 × 4) = b + 8
12 = b + 8
b = 12 - 8
Therefore, based on the above equation, the number of batteries that Fatima has left will be 4.
what is faster C++ or go lang
Answer:
C++
Explanation:
Examples of hardware that computes on a network can share are the operating system and the web browsers
Answer:
False.
Explanation:
The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.
A software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.
In conclusion, the hardware components of a computer are the physical parts that can be seen and touched while the software components cannot be touched but rather are installed as a program.
Hence, examples of software but not hardware that computers on a network can share are the operating system and the web browsers
What is fish processing?
PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
1.) Online crimes causing loss of money: give 5 names and examples to each
2.) Online misconduct or crimes targeting medical offices and services: give 5 names and examples to each
3.) Online misconduct or crimes that you have experienced: give 5 names and examples to each
Answer:
1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.
2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.
3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got sc/mmed it might apply to this question
BRAINLIEST 14 points
The Great Firewall of China _____. Select 4 options.
blocks websites
filters all emails
filters social media
filters web searches
jams signals
Answer:
the first four options
Explanation:
they make the most sense
The Great Firewall of China is designed and developed to:
Block websites.Filter all emails.Filter social media.Filter web searches.What is the Great Firewall of China?The Great Firewall of China can be defined as a set of legislation and network security protocol that domestically monitors, regulates and controls inbound and outbound Internet traffic in the People's Republic of China, based on set aside security rules.
In this context, the Great Firewall of China is designed and developed to domestically:
Block websites.Filter all emails.Filter social media.Filter web searches.Read more on Great Firewall of China here: https://brainly.com/question/27411286
#SPJ2
What does the revolver do?
sends the domain name and requests the IP address
sends the IP address and requests the content of the web page
sends the IP address and requests the domain name
sends the domain name and requests the content of the web page
Answer:
last one
Explanation:
When using the Photo Album dialog box, a picture
cannot be modified in this view.
cannot have text added.
can be inserted from a file or disk.
will be permanent when added to the box.
Answer:
can't have text added and will be permanent when added to the box
4. Which of the following is a face-to-face meeting between the hiring party and the applicant?
A. Interview
B. Application
C. Résumé
D. Reference
Answer:
A. interview
Explanation:
Your program has a loop where a user guesses a letter.
Your program compares the guess to each letter in the word.
Finish the code.
for n in range(lenWord):
if _______ == letter:
blanks = blanks[:n] + letter + blanks[n+1:]
correct[n]
correct
correct(n)
Answer:
its correct[n]
Explanation:
for n in range(lenWord):
if correct[n] == letter:
blanks = blanks[:n] + letter + blanks[n+1:]
A loop in a computer program is an teaching that repeats until a specified condition is reached.
In a loop structure, the loop asks a question. If the answer needs action, it is executed. The same question is asked again until no other action is required.
What are loops used for in programming?A Loop is employed to repeat a specific block of code a over and over. There are two main types of loops, for loops and while loops.
What are the 3 types of loops in programming?In Java, there are three kinds of loops which are – the for loop, the while loop, and the do-while loop. All these three loop constructs of Java executes a set of replicated statements as long as a specified condition stays true.
To learn more about A loop, refer
https://brainly.com/question/26568485
#SPJ2
subscribe to twomad or you are cringe for the rest of your life kid
Answer:
What if I don't want to?..........
What requirements are necessary in order for you to share a file?
Check all that apply.
You own it.
You commented on it.
You can edit.
You know about the topic of the document.
Answer:
I. You own it.
II. You can edit.
Explanation:
A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.
Generally, all files are identified by a name and type such as audio, image, video, document, system, text, etc. Each type of files can be transferred or send from one computer node to another computer node through the use of a wired or wireless connection and with the necessary level of permission.
The requirements which are necessary in order for you to share a file are;
I. You must own the file. This simply means that you have the authority to share the file and have it saved on your device.
II. You have the permission or required credentials to edit the file. A read-only permission cannot be used to edit a file but a full permission can be used.