1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
2 years ago
10

Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m

ethod of attack (or combination of attacks) would you use? How does your motivation for hacking impact the type of attack that you employ? Discuss how you might approach hacking and how the motivation for your hacking impacts the methods you would use.
Computers and Technology
1 answer:
liberstina [14]2 years ago
3 0

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

You might be interested in
Write a program that plays the popular scissor-rock-paper game. (A scissor can cut a paper, a rock can break a scissor, and a pa
Andrei [34K]

Answer:

Explanation:

The following program is written in Python and follows all the instructions accordingly to create the rock paper scissor game as requested.

from random import randint

answers = ["Scissors", "Rock", "Paper"]

computer = answers[randint(0, 2)]

continue_loop = False

while continue_loop == False:

   

   player_choice = input("Choose a number, 0 = Scissors, 1 = Rock , 2 = Paper?")

   player_choice = answers[int(player_choice)]

   if player_choice == computer:

       print("Tie!")

   elif player_choice == "Rock":

       if computer == "Paper":

           print("You lose!", computer, "covers", player_choice)

       else:

           print("You win!", player_choice, "smashes", computer)

   elif player_choice == "Paper":

       if computer == "Scissors":

           print("You lose!", computer, "cut", player_choice)

       else:

           print("You win!", player_choice, "covers", computer)

   elif player_choice == "Scissors":

       if computer == "Rock":

           print("You lose...", computer, "smashes", player_choice)

       else:

           print("You win!", player_choice, "cut", computer)

   else:

       print("That's not a valid play. Check your spelling!")

   continue_or_not = input("Would you like to play again? Y/N")

   continue_or_not = continue_or_not.lower()

   if continue_or_not != "y":

       break

   computer = answers[randint(0, 2)]

8 0
3 years ago
01001110 01100101 01110110 01100101 01110010 00100000 01100111 01101111 01101110 01101110 01100001 00100000 01100111 01101001 01
Scorpion4ik [409]

The Binary code translation are: Never gonna give you up\nNever gonna let you down\nNever gonna run around and desert you\nNever gonna make you cry\nNever gonna say goodbye\nNever gonna tell a lie and hurt you\n.

<h3>Binary code translation</h3>

Binary code can be defined as machine language which a computer understand.

This binary code are often used in digital computer and the  data code  mostly use are zero (0) and one (1) and  they help to represent information.

Therefore the Binary code translation are: Never gonna give you up\nNever gonna let you down etc.

Learn more about binary code here:brainly.com/question/9480337

#SPJ1

7 0
2 years ago
What is the output?
Pepsi [2]

Answer:

The answer is false

Explanation:

The string isalpha() returns True if all the characters are letters and the string has at least one character.

7 0
3 years ago
Among the following, which is the best protection against ransomware?
goldfiish [28.3K]

Answer:

A

Explanation:

windows file history

7 0
4 years ago
In windows, certain system configuration information is stored in the ____ files
trasher [3.6K]

home disk drive

or a zipped forder 

3 0
3 years ago
Other questions:
  • Write an expression that whose value is the fifth character of the string name.
    10·1 answer
  • What is displayed on the console when running the following program?
    9·1 answer
  • What does anyone who chooses to use speech recognition software need to do? Create a Guest Account.
    8·1 answer
  • What are the coordinates of the origin point? (Select the best answer.)
    10·1 answer
  • To activate Spelling and Grammar check using the ribbon, navigate first to the _____ tab
    14·2 answers
  • A large software development company employs 100 computer programmers. Of them, 45 areproficient in Java, 30 in C, 20 in Python,
    9·1 answer
  • The production team for a fictional drama is shooting a key scene. One of the actors leaves out part of his scripted dialogue th
    12·2 answers
  • What allows customers to use the Web to find answers to their questions or solutions to their problems?
    5·2 answers
  • Guidelines on how to write a report on how technology has affected office duties
    15·1 answer
  • Q.3.1 Explain why devices on a network need addresses. (5)​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!