1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
2 years ago
8

Select the correct answer.

Computers and Technology
2 answers:
Blababa [14]2 years ago
8 0
It should be A. A whale attack
12345 [234]2 years ago
7 0
A. a whale attack i think
You might be interested in
A drink costs 2 dollars. A taco costs 5 dollars. Given the number of each, compute total cost and assign to totalCost. Ex: 2 dri
evablogger [386]

Answer:

OKKKkkkkkkayyyy

3 0
3 years ago
The direction of a ratchet is reversed by _______________________.
ankoles [38]

Answer:

You can reverse the direction of a ratchet by hitting with an equal or higher amount of force it came at you with.

Explanation:

6 0
2 years ago
Why does a HTML seen to work even when its broken? why does the code sometimes turn pink?
OverLord2011 [107]

the reason HTML seems to work even if it has syntax errors is due to browser having built in ways to parse the code meaning it will still show but most likely look way different then you would want.

the code may turn pink due to syntax errors

5 0
4 years ago
A ________ is a collection of computers connected to one another or to a common connection medium.
RoseWind [281]
Local area network <span>(LAN)</span>
3 0
4 years ago
Read 2 more answers
A _____ is a systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity
Ivan

Answer:

Vulnerability assessment

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

A vulnerability assessment is a systematic and methodical evaluation used by network security experts to determine the exposure of network assets such as routers, switches, computer systems, etc., to attackers, forces of nature, or any other entity that is capable of causing harm i.e potential harms. Thus, vulnerability assessment simply analyzes and evaluate the network assets of an individual or business entity in order to gather information on how exposed these assets are to hackers, potential attackers, or other entities that poses a threat.

4 0
3 years ago
Other questions:
  • An “AI” (artificial intelligence) could be used in:
    10·1 answer
  • Which of the following is a Federal law that provides a definition of the term cyberterrorism and under which young people prima
    7·1 answer
  • What could cause a fixed disk error.
    15·1 answer
  • Documenting Business Requirements helps developers control the scope of the system and prevents users from claiming that the new
    13·1 answer
  • This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defined by
    11·1 answer
  • What device is used to transmit what is effectively a type of Morse code between stations?
    11·1 answer
  • You can use your student ID card to get discounts in all of the following except
    6·2 answers
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • Order the steps to add a recommended chart in excel.
    5·2 answers
  • Fort Nite is the best u can’t say it’s not
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!