1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tomtit [17]
2 years ago
10

In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o

f enterprises and users. How should you differentiate an attack by a script kiddie from that of a gray hat hacker
Computers and Technology
1 answer:
Neporo4naja [7]2 years ago
4 0

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

You might be interested in
Why won't it let me submit my question
iVinArrow [24]

Answer:

what was the question?

Explanation:

8 0
3 years ago
ravi met few peoples in a party and was mixing up well those wearing expensives clothing and fair complexion . which factors are
Lady_Fox [76]

The factor that influenced Ravi's perspective towards the people can be referred to as <u>Visual perspective.</u>

<u></u>

<h3>What do you mean by Visual perspective?</h3>

Visual perception or sight can be defined as the ability to interpret the encircling surroundings via photopic vision, color vision, scotopic vision, and mesopic vision, the usage of light withinside the visible spectrum meditated through items withinside the surroundings.

It also means the ability to see the world through others' perspectives, which takes into account what and how they see it.

Thus, The factor that influenced Ravi's perspective towards the people can be referred to as <u>Visual perspective.</u>

<u></u>

Learn more about Visual perspective:

brainly.com/question/14956318

#SPJ1

<u></u>

6 0
2 years ago
¿En qué situaciones puedo utilizar formato condicional?
pshichka [43]

Answer:

El formato condicional es una herramienta útil para identificar patrones o tendencias en una hoja de cálculo. Por ejemplo, una regla podría ser: si el valor es mayor que 5.000, que la celda sea amarilla. Así, podrás ver de un vistazo las celdas cuyo valor es superior a 5.000. Puedes usarlo para describir graficas cientificas o Datos matematicos.

Explanation:

El formato condicional facilita el proceso de resaltar celdas o rangos de celdas interesantes, destacar valores inusuales y ver datos empleando barras de datos, escalas de colores y conjuntos de iconos que se correspondan con las variaciones específicas de los datos.

6 0
3 years ago
Create a Racket procedure compute_pos that reads numbers from the keyboard until 0 is read, count how many positive numbers are
Artyom0805 [142]

Answer:

import java.util.Scanner;

public class Solution {

   public static void main(String args[]) {

       compute_pos();

     }

     

     public static void compute_pos(){

     Scanner scan = new Scanner(System.in);

     int sum = 0;

     int counter = 0;

     // Prompt the user to enter an input

     System.out.println("Enter your value");

     // user input is assign to the variable value

     int value = scan.nextInt();

     

     while(value != 0){

         if (value > 0){

             sum += value;

             counter++;

         }

         System.out.println("Enter your value");

         value = scan.nextInt();

     }

     // Display the value of sum to the user

     System.out.println("The sum of the positive number is: " + sum);

     // Display the value of counter to the user

     System.out.println("The number of positive number is: " + counter);

   }

}

Explanation:

The first line import the Scanner class which allow the program to read input from the user. The class Solution is then defined. Then the main method which signify the beginning of execution in the program is defined. A method is called inside the main method.

The method compute_pos is defined. Inside the compute_pos method, a scanner object scan is declared to accept input from the user via the keyboard.

The variable sum and counter is declared and assigned to 0.

A prompt is displayed to the user to input a value. The user input is accepted and stored in the variable value.

Then a while loop is use to check the user input if it is not equal to zero. If it is equal to zero, the loop will end. Inside the loop, we first check to see if the user input is greater than 0, if it is, we add it to the variable sum and increase our counter by 1. At the end of the loop, a prompt is again display to accept input from the user.

Outside the loop, we display the sum and counter to the user.

8 0
4 years ago
Why is cpu called the brain of the computer
kogti [31]
~Hello there!

Your question: Why is CPU called the brain of the computer?

Your answer: CPU is called the brain of computer because the CPU carries all the important calculations that helps the computer to process. 

Any queries?

Happy Studying ^=^
6 0
4 years ago
Read 2 more answers
Other questions:
  • Write a function namedadd_complex that adds the correspondingnumbers of its arguments (both complexstructures), then returns the
    5·1 answer
  • What does carefully controlled research on cell phone conversations suggest about hands-free devices?
    7·1 answer
  • In 1948, a Bell Labs researcher named Claude Shannon wrote a technical report in which he proposed that all information media co
    11·1 answer
  • What is the most likely result of a correctly installed processor, but an incorrectly installed cooler?
    6·1 answer
  • Explain how the operating system controls the software and hardware on the computer?
    5·1 answer
  • Which of the following entries into the username and password fields will NOT cause us to gain admin access? You may assume that
    12·1 answer
  • Which of the following operation is not performed by a mouse 1) left click , middle click , right click, double click​
    15·2 answers
  • PLEASE ANSWER ASAP
    5·1 answer
  • What makes manually cleaning data challenging?
    15·1 answer
  • How many pixels are in a picture that is 640 pixels wide and 480 pixels high?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!