FILL IN THE BLANK. A(n) _____ is someone who breaks into computer systems, launches Internet worms & viruses, or perpetrates other dubious computer-related vandalism.

Answers

Answer 1

A(n) hacker is someone who breaks into computer systems, launches Internet worms & viruses, or perpetrates other dubious computer-related vandalism.

Hackers are individuals who use their programming abilities and understanding of computer systems to penetrate and take over a computer network, whether for personal gain, revenge, or simply to demonstrate their skills. They may do this by exploiting security flaws in the system or by tricking users into installing malicious software on their computers or other devices. Some hackers are motivated by personal gain or criminal activity, such as stealing sensitive data, extorting businesses or individuals, or engaging in financial fraud. Others are motivated by political or social causes, using their hacking abilities to gain access to restricted information or disrupt systems associated with organizations they oppose. Some hackers may simply engage in computer-related vandalism, launching Internet worms and viruses or engaging in other forms of computer-related vandalism.

To learn more about viruses; https://brainly.com/question/26128220

#SPJ11


Related Questions

Emma would like to track profits made each month. She should use a
O template
word processor
O spreadsheet
database

Answers

Database is the answer
Database and can you please make me brainiest

A problem with virtual networks is that data transmitting through them cannot be encrypted and therefore is not secure.

a. True
b. False

Answers

The given statement is False, "virtual networks don't have the drawback of making data transmission across them insecure because it is unable to encrypt it."

What is Virtual Networking?

Multiple PCs, virtual machines (VMs), virtual servers, or other devices can communicate with one another over various office and data center locations thanks to virtual networking. Virtual networking expands these capabilities by using software administration to connect computers and servers over the Internet, as opposed to physical networking, which connects computers using cabling and other hardware. It makes use of virtualized variations of conventional network tools like switches and network adapters to provide easier network configuration changes and more effective routing.

With the help of virtual networking, devices can operate in numerous locations with the same capabilities as a regular physical network. This enables data centers to spread across various physical locations and gives network administrators new, more effective options, such as the ability to quickly modify the network as needs change without having to replace or purchase additional hardware, greater flexibility in provisioning the network to specific needs and applications, and the capability to move workloads across the network infrastructure without compromising service, security, and availability.

To learn more about virtual network visit:

https://brainly.com/question/29492966

#SPJ4

Define bit, nibble, byte, binary

Answers

Answer: , a group of 4 bits is called a nibble

Explanation:

True or false
The process of converting source code into object is called compilation

The compiler converts program written in high level language into machine language at a time​

Answers

Answer:

a.true

b.true

Explanation:

Hope it will helps you

me mark me as brinliest

Answer:

True

Explanation:

true trur true true

many transportation systems, such as the washington, d.c., metro (subway), charge higher fares during rush hours than during the rest of the day. why might they do this?

Answers

Many transportation system, such as the Washington, D.C., metro (subway), charge higher fares during rush hours than during the rest of the day because, during these hours, the transportation demand is higher than the supply. The cost of transporting people during rush hour is higher than during other times.

The cost of providing transportation is linked to the level of demand for the service. The peak hour fares assist to decrease overcrowding and distribute the burden of transporting people at peak times. The objective of charging higher fares at peak hours is to discourage people from commuting during those hours and to encourage people to commute during the off-peak hours.

This is to make it simpler and more pleasant for commuters to get on and off trains and buses during non-peak hours as well as to incentivize them to travel during off-peak hours to reduce congestion on the system.

To know more about  transportation

https://brainly.com/question/27667264

#SPJ11


All markup languages follow web programming standards. These standards are defined by the

Answers

The World Wide Web Consortium is the primary entity in charge of developing and upholding web standards (W3C). Numerous standards, including the common markup languages we use to create webpages, have been established by the W3C.

Who sets the standards for web programming?

The W3C is the most well-known organization for setting web standards, but there are others as well, including the WHATWG (which oversees the HTML language's living standards), ECMA (which publishes the standard for ECMAScript, on which JavaScript is based), Khronos (which publishes 3D graphics technologies like WebGL), and others. The preferred markup language for building Web pages is HTML. A Web page's structure is described in HTML. A number of elements make up HTML. The content's presentation in the browser is controlled by HTML elements. The labels "this is a heading," "this is a paragraph," "this is a link," etc., are provided by HTML elements.

To learn more about web programming refer to

https://brainly.com/question/27518456

#SPJ1

Help PLEASE ILL MARK as brainlest

Help PLEASE ILL MARK as brainlest

Answers

Answer:

computer animation (3d)

What number will be output by the console.log command on line 5?*

1. var oop= 10;
2.oop =oop + 1;
3.оор= oop + 2;
4.oop=oop + 3;
5. console.log(oop);

Answers

Answer:

16 will be output by the console.log command on line 5

Explanation:

Let us look at the code line by line

1. var oop= 10;

This line will assign the value 10 to the variable oop

2.oop =oop + 1;

This line will add 1 to the value of oop

oop = 10+1 = 11

3.оор= oop + 2;

This line will add 2 to the latest value of oop.

oop = 11+2 = 13

4.oop=oop + 3;

This line will ad 3 to the latest value of oop.

oop = 13+3 = 16

5. console.log(oop);

This line will print 16 to the console.

Hence,

16 will be output by the console.log command on line 5

like native apps, hybrid apps are developed for specific platforms and deployed to an app store. True or False

Answers

True. Hybrid apps are developed using web technologies such as HTML, CSS, and JavaScript and are wrapped in a native app container that allows them to run on specific platforms such as iOS and Android.

That allows developers to create an app once and deploy it to multiple platforms without having to write platform-specific code for each one.

Once the hybrid app is developed, it can be submitted to the respective app store for the targeted platform.This allows users to download the app directly from the app store just like they would with a native app.

However, it's important to note that hybrid apps may not provide the same level of performance and native look-and-feel as a true native app. Additionally, hybrid apps may require additional development effort to ensure compatibility with different platforms and devices.

For more questions on Hybrid
https://brainly.com/question/29099208
#SPJ11

The given statement, "like native apps, hybrid apps are developed for specific platforms and deployed to an app store" is True.

Hybrid apps are designed to work on specific platforms and can be deployed to app stores just like native apps. Hybrid apps are a combination of native and web apps and are built using web technologies like HTML, CSS, and JavaScript.

The main advantage of hybrid apps is that they can be developed once and deployed across multiple platforms, which saves time and money for developers.

However, they still need to be optimized for each platform they are deployed on, and the user experience may not be as seamless as with native apps. Despite this, hybrid apps are becoming increasingly popular due to their cost-effectiveness and flexibility.

They also allow developers to easily update the app across multiple platforms simultaneously, which is a major advantage. Overall, hybrid apps offer a good compromise between native and web apps, and are a great option for businesses and developers looking for a cost-effective way to reach users across multiple platforms.

For more such questions on hybrid apps, click on:

https://brainly.com/question/21777487

#SPJ11

Drag the tiles to the correct boxes to complete the pairs.
Match the different aspects of the marketing information systems to the scenarios that portray them.

Answers

Interactive, pre-marketing, research, and mass communication eras are the ones that best fit the marketing eras to the scenarios that depict them.

What are the different marketing eras?Interactive, pre-marketing, research, and mass communication eras are the ones that best fit the marketing eras to the scenarios that depict them.Interactive era, Individualized mail sent to various clients based on their unique preferences.Pre-marketing era , a town crier enticing shoppers to purchase a novel product, assuring that it is a one-of-a-kind.Research era , data analysis to determine the needs of the consumer and corresponding product marketing.In the era of mass communication, a business might advertise its goods in newspapers, magazines, and on the radio.      

To learn more about Marketing eras refer to:

https://brainly.com/question/9350735

#SPJ1

Marsha found her sister's diary that listed all of her passwords. However, it wasn't listed for which s the passwords were used. She tried each password listed until she was able to log into her sister's computer. What method of code-breaking did Marsha use?

Answers

Answer:

Brute Force

Explanation:

Brute Force - a method of hacking were the attacker submits many combination of attempts in hope of getting into the system eventually.

. Explain briefly the following concepts as used in the Windows environment (a) Desktop. (b) Window. (c) Icon. d) Sidekick menu. =) Taskbar. Task​

Answers

A minimized application is still accessible from the taskbar since it is still displayed on the desktop.

What does Windows' task bar do?

A minimized application is still accessible from the taskbar since it is still displayed on the desktop. They have what is known as desktop presence. The taskbar allows users to quickly transition between open primary windows and some secondary windows while viewing them on the desktop.

What does a Windows desktop look like?

The common components of a desktop environment are icons, windows, toolbars, folders, wallpapers, and desktop widgets (see Elements of graphical user interfaces and WIMP). Drag and drop capabilities and other elements that complete the desktop metaphor may be offered via a GUI.

To know more about Taskbar visit:-

https://brainly.com/question/28147966

#SPJ1

20) which one of the following statements is not true? a) the internet backbone is owned by the federal government in the united states. b) icann manages the domain name system. c) the iab establishes the overall structure of the internet. d) the internet must conform to laws where it operates. e) w3c determines programming standards for the internet.

Answers

The statement that the internet backbone is owned by the federal government in the United States is not true. In fact, the internet backbone is owned by multiple Tier 1 ISPs around the world. No one owns the whole internet backbone and the internet itself is free for everyone.

The internet backbone

The internet is a global network of computers. Its core is the internet backbone, the largest and fastest network linked together with fiber-optic cables around the world. The traffic of the global internet runs here connecting all locations around the globe. This backbone infrastructure is owned by multiple ISP companies.

Learn more about the internet https://brainly.com/question/2780939

#SPJ4

What is HDD in computer and technology

Answers

An HDD is a traditional storage device that uses mechanical spinning platters and a moving read/write head to access data.

Answer:

Hard Disk, also called hard disk drive or hard drive. It used as Storage.

Storage devices like hard disks are needed to install operating systems, programs and additional storage devices, and to save documents.

Storage Capacity:

16 GB, 32 GB and 64 GB. This range is among the lowest for HDD storage space.120 GB and 256 GB. This range is generally considered an entry point for HDD devices such as laptops or computers.500 GB, 1 TB and 2 TB. Around 500 GB and above of HDD storage is typically considered decent for an average user. More than 2 TB. Anything over 2 TB of HDD space is suitable for users who work with high-resolution files, Currently, the highest capacity HDD is 20 TB.

What does test connection failed because of an error in initializing provider access?

Answers

When encountering the error message "test connection failed because of an error in initializing provider access," it is important to check the connection settings and configuration, as well as the provider software used to connect to the database. Updating or reinstalling the provider may be necessary to resolve the issue.

When test connection failed because of an error in initializing provider access, it means that an error occurred while attempting to connect to a data source or database, and the initialization process failed. When this occurs, it is important to check the connection settings and configuration to ensure that everything is set up correctly and that there are no issues with the network or server.

The specific error message "test connection failed because of an error in initializing provider access" typically indicates that there was an issue with the provider that was being used to connect to the database. In this case, it may be necessary to update or reinstall the provider software to resolve the issue.

Learn more about Error

brainly.com/question/19575648

#SPJ11

consider a subnet with address 132.118.42.128/26. what is the last host address in this network? give your answer in dottec decimal format

Answers

The last host address in this network is 132.118.42.318

Given subnet address: 132.118.42.128/26

To find out the last host address in this network, we need to follow the below steps:

Step 1: Calculate the total number of host addresses within the subnet. This can be done by subtracting the subnet mask from 256.

Subnet mask = 26 bits (as per given in the question)256 - 64 = 192The total number of host addresses in this subnet is 192.

Step 2: Calculate the first host address. To calculate the first host address, we need to find out the network address.

Network address = 132.118.42.128Subnet mask = 255.255.255.192First host address = network address + 1= 132.118.42.129

Step 3: Calculate the last host address. To calculate the last host address, we need to find out the broadcast address.

Broadcast address = Network address + Total number of hosts - 1Broadcast address = 132.118.42.128 + 192 - 1= 132.118.42.319

Therefore, the last host address in this network is 132.118.42.318 (which is the host address right before the broadcast address).

Hence, the answer in dotted decimal format is 132.118.42.318.

Learn more about   host address:https://brainly.com/question/28218464

#SPJ11

Keli is unable to find a shape that meets her needs. Which feature in Power Point should she use to create shapes that are completely customized?

Answers

Answer:

I just use the search bar in the app and type in shapes. Then you right click on the shape and click on edit points to shape it into whatever shape you want.

Explanation:

I went into the PowerPoint and did it myself.

How do you write mathematical expressions that combine variable and literal data

Answers

Variables, literal values (text or integers), and operators specify how the expression's other elements are to be evaluated. Expressions in Miva Script can generally be applied in one of two ways: Add a fresh value.

What connection exists between literals and variables?

Literals are unprocessed data or values that are kept in a constant or variable. Variables can have their values updated and modified since they are changeable. Because constants are immutable, their values can never be updated or changed. Depending on the type of literal employed, literals can be changed or remain unchanged.

What kind of expression has one or more variables?

The concept of algebraic expressions is the use of letters or alphabets to represent numbers without providing their precise values. We learned how to express an unknown value using letters like x, y, and z in the fundamentals of algebra. Here, we refer to these letters as variables.

to know more about mathematical expressions here:

brainly.com/question/28980347

#SPJ1

What is computer ethics? What are the things that are prohibited by computer ethics?

Answers

Answer:

Computer ethics was set up in 1992. It entails the moral guidelines for computer professionals and users in the usage of the computer. An example is not using the computer to commit any type of fraud etc.

The things prohibited by Computer ethics include

1. Using the computer to commit any type of fraud.

2. Hacking of individual personal and private files.

3. Piracy and usage of pirated softwares etc.

If you want to open the Navigation pane to do a Find, what should you first click on the Home tab? Paragraph, Editing, Styles, or View

Answers

Answer:

You would first click view.

Explanation:

hope this helps

Answer:

editing (b)

Explanation:

Why is soil testing an important aspect to consider in the design and construction of a building?

Answers

Answer:

The soil must be able to withstand the weight of the building otherwise the loss to property and life can occur. The soil investigations or analysis determines not only the bearing capacity of the soil, but it also rate of settlement of the soil. This rate determines the rate of the structure stabilization on the soil.

If your computer is running slowly, which of the following is most likely to solve the problem? Scanning, cleaning, and optimizing your hard drive Checking to make sure all of the computer’s cords are plugged in Reentering the serial numbers of the software programs the computer is running Searching the hard drive for missing DLL files

Answers

Answer:

Scanning, cleaning, and optimizing your hard drive

Explanation:

This option would most likely solve the issue of a computer running slowly because there could be viruses, dust, or compatibility issues with your hard drive. These issues would cause your entire computer to slow down.

The final step in developing a film in a darkroom is washing and drying the print.A. TrueB. False

Answers

Answer:True

Explanation:

T/F. tethering may allow an unsecured mobile device to infect other tethered mobile devices or the corporate network.

Answers

True. Tethering can potentially allow an unsecured mobile device to infect other tethered mobile devices or the corporate network.

When a device is tethered, it establishes a connection with another device, usually through Wi-Fi, Bluetooth, or USB. If the tethered device is infected with malware or other malicious software, there is a risk of spreading the infection to other devices on the same network.

For example, if a mobile device is tethered to a corporate network and the mobile device itself is compromised, any malware or malicious activity on the mobile device can potentially spread to the corporate network, compromising its security. Similarly, if multiple mobile devices are tethered to each other, a compromised device can infect other devices within the tethered network.

It is essential to ensure that all devices involved in tethering, especially in a corporate environment, have proper security measures in place to mitigate the risk of infection and unauthorized access to sensitive information.

Learn more about corporate network here:

https://brainly.com/question/31710105

#SPJ11

While you are working on your computer, it shuts down unexpectedly, and you detect a burning smell. When you remove the case cover, you notice a distended capacitor. What can you do to fix this problem

Answers

Answer:

fire

Explanation:

hydrant

Answer:

Replace the motherboard

Explanation:

Refer to Table 8-4. Consider the data above (in billions of dollars) for an economy: Gross domestic product (in billions of dollars) for this economy equals

Answers

If one uses the data above (in billions of dollars), the Gross domestic product (in billions of dollars) for this economy equals  $1,200.

What is the GDP about?

Note that:

GDP (Gross Domestic Product):

Thus it will be :

Consumption + Investment + Government expenditure + (Export - Import)

Which is:

GDP = 800 + 200 + 300 + (100 - 200)

GDP = $1200 billions

See full question below

Consumption expenditures $800

Investment expenditures 200

Government purchases 300

Exports 100

Imports 200

Wages 800

8) Refer to Table above. Consider the data above (in billions of dollars) for an economy: Gross domestic product (in billions of dollars) for this economy equals

A) $2,200.

B) $1,600.

C) $1,400.

D) $1,200.

Learn more about GDP from

https://brainly.com/question/1383956

#SPJ1

What are some uses for a class webpage?

Answers

Answer:

The webpage, either classroom- or grade-level, can be designed to include numerous items that are helpful to parents, community members, and students. It provides a place for parents to go after hours to view information about homework assignments, calendar of events, classroom pictures, study links, and more.

According to the chapter, which term below refers to "your awareness of how you think and how you monitor your own thinking"? (a) Metacognition
(b) The general education classroom
(c)The responsiveness to intervention approach.
(d) Embedded Learning Opportunities

Answers

According to the chapter, Metacognition refers to "your awareness of how you think and how you monitor your own thinking".

The correct answer to the question is option (a).

According to the chapter, the term that refers to "your awareness of how you think and how you monitor your own thinking" is (a) metacognition.

Metacognition is a term used to describe the process of thinking about thinking. It involves being aware of your own thought processes, monitoring your own thinking, and reflecting on your own cognitive processes. Metacognition is an important aspect of learning and is crucial in the development of problem-solving and decision-making skills.

In addition, metacognitive skills are essential for academic success, as they allow students to regulate their own learning and manage their own cognitive processes effectively.

By becoming more aware of their own thinking, students can better identify their strengths and weaknesses, and develop strategies to improve their own learning.

Overall, metacognition is a critical component of learning, and educators should work to develop metacognitive skills in their students to help them become more successful learners.

For more such questions on Metacognition, click on:

https://brainly.com/question/10163007

#SPJ11

Write code using the range function to add up the series 15, 20, 25, 30, ... 50 and print the resulting sum each step along the way.

Expected Output
15
35
60
90
125
165
210
260

Answers

Answer:

# initialize the sum to 0

sum = 0

# loop over the numbers in the series

for i in range(15, 51, 5):

   # add the current number to the sum

   sum += i

   # print the current sum

   print(sum)

Explanation:

The first argument to the range function is the starting number in the series (15), the second argument is the ending number (51), and the third argument is the step size (5). This creates a sequence of numbers starting at 15, increasing by 5 each time, and ending before 51. The for loop iterates over this sequence, adding each number to the sum and printing the current sum.

Ask me any questions you may have, and stay brainly!

To improve readability, what color background should I use
with dark purple text.

Answers

Answer:

umm probably white or any light color

Explanation:

cuz if you put similar colors whether color or the darkness it will be hard to read cuz its similar. ofc if you do a dark color for text you can use a much lighter shade of that color

Other Questions
Discussion Prompt:In this unit, you have read several pieces of literature, including verse and proseversions of Sir Gawain and the Green Knight. How does the image connect toeither version-verse or prose-of Sir Gawain and the Green Knight? Explain theconnection using examples from the version of Sir Gawain and the Green Knightto which you are making a connection. Which sentence is the most precisely written?The woman's red shoes clacked on the marble floor.The shoes were making a lot of noise as she walked.The red shoes were worn by the woman and noisy.The floor had shoes hitting it that made loud noises.I BELIEVE IT'S B.... Find the value of x. How many ATP molecules will be required for conversion of 2-molecules of Lactic acid to Glucose? Select the items that are included in the Treaty of Versailles. Germany was solely responsible for World War Germany was divided into four occupation zonesGermany no longer has possession of colonies or overseas investmentsGermany could have no machinery that was not necessary for its economic growth Germany's navy was reduced in size If R is the midpoint of QS,QR=5x-4 and RS=2x+2,find QS An 11-year-old patient is very upset. Her teeth seem very crooked and of different sizes and her gums are bleeding. She asks if her teeth will be this way forever. She wants her teeth to be nice and straight. What should the dental assistant tell her to help her understand her dental situation? What will be important to stress for her to maintain her oral health? Can someone plz help Working at the right time of the day for me based on my own preferences can allow me to be more productive. A large producer of household products purchases a glyceride used in one of its deodorant soaps from outside of the company. It uses the glyceride at a fairly steady rate of 40 pounds per month, and the company uses a 23 percent annual interest rate to compute holding costs. The glyceride can be purchased from two suppliers, A and B. Supplier A offers the following all- units discount schedule: Supplier A For all units of order size 0 the fiscal year ends december 31 for lake hamilton development. to provide funding for its moonlight bay project, lhd issued 9% bonds with a face amount of $690,000 on november 1, 2024. the bonds sold for $630,804, a price to yield the market rate of 10%. the bonds mature october 31, 2043 (20 years). interest is paid semiannually on april 30 and october 31 and is determined using the effective interest method. required: what amount of interest expense related to the bonds will lhd report in its income statement for the year ending december 31, 2024? what amount(s) related to the bonds will lhd report in its balance sheet at december 31, 2024? what amount of interest expense related to the bonds will lhd report in its income statement for the year ending december 31, 2025? what amount(s) related to the bonds will lhd report in its balance sheet at december 31, 2025?4 Propose an experiment to test the optimal conditions at which pancreatic lipase functions. are these numbers linear or non linearnonlineary= 2x^3y = x+5y=x^2 35x + 5y = 25Y=x^2 / 2. Pls put them in order linear or non linear TLS packets do not even have a row displayed in Wireshark due to the entire thing being encrypted T/F Evaluate 5w-w/x when w=6 and x=2 what happens during primary wastewater treatment? Select ALL the correct answers.How did the owners of the Lowell Mill differ from most employers during this era?They gave their employees twice the average salary.They provided employees with educational opportunities.They hired employees who were over the age of nine.They provided their employees with transportation home.They provided employees with safe boarding houses. microscopic hair-shaped cells are referred to as_________ A jar contains 10 marbles marked with the numbers 1 though 10 you pick a marble at random what is the probability of not picking the marble marked with the number 6 enter your answer as a simplified fraction a crate of mass 50kg is dragged by an engine along a horizontal floor through distance of 6m in 3s. calculate the power of the engine in watts.(g=10ms^-2)