1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
2 years ago
10

Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration t

est. What technique has she used
Computers and Technology
1 answer:
ValentinkaMS [17]2 years ago
8 0

Selah infects the ads on a website with a technique called the Watering hole attacks.

<h3> What is Watering hole attacks?</h3>

The  Watering hole attacks is known to be a form of attack that depends on compromising or infecting a website that has or that targeted users who are known to often frequently visit.

So, Selah infects the ads on a website with a technique called the Watering hole attacks.

Learn more about malware from

brainly.com/question/399317

#SPJ1

You might be interested in
Create a Python program by defining a function that calculates the year of birth of a person whose age is known to you.(You may
Alchen [17]

Answer:

  1. import datetime
  2. def get_year_of_birth():
  3.    age = int(input("Enter your age: "))  
  4.    current_year = datetime.datetime.now().year  
  5.    year_of_birth = current_year - age  
  6.    return year_of_birth  
  7. print(get_year_of_birth())

Explanation:

Firstly, we import datetime module as we need it to get the current year (Line 1).

Next, create a function named it as get_year_of_birth (Line 3). Prompt user to input age and assign it to a variable (Line 4). Next, we use now() method from datetime module to get the current date and time and extract the year component (Line 5).  At last, calculate the year of birth by subtracting the current_year with age and return it as output (Line 6-7).

3 0
3 years ago
In your own words, what is pair-programming? What is the role of the driver? What is the role of the navigator? What are some be
KATRIN_1 [288]

<u>Paired programming:</u>

Paired programming is a new technique where one person gets one another to<em> write the code</em>. Here one will write the code and other will start verifying as the type.

So we might think it is waste to employ two person for same task but it is not so. There are many <em>benefits in incorporating this technique</em>. Let us see those benefits one by one.

  • <em>Inter-personal skill gets improved </em>
  • <em>Lower amount of coding mistake </em>
  • <em>Learn from each other </em>
  • <em>Peer review enhance collaboration </em>

Challenges expect to arise during pair-programming

  • Two heads are superior to one. On the off chance that the driver experiences a <em>hitch with the code</em>, there will be two of them who'll take care of the issue.  
  • Builds up your <em>staff's relational aptitudes</em>. Working together on a solitary venture encourages your group to welcome the estimation of <em>correspondence and collaboration.  </em>

Overcome Method

The most ideal approach to move <em>toward blending</em> is to accomplice two software engineers and have them share a PC. The pair ought to have the option to choose how to part the work, and it is prudent that they should <em>switch jobs frequently.</em>

7 0
4 years ago
For each of the descriptions below, perform the following tasks:
ss7ja [257]

ANSWER:

1)i. The relationship is a degree of 2 ( i.e Binary). The cardinality of the relationship is One-to-Many.

ii. The model is from piano description to piano manufacturer.

PIANO:

Model name

Model number

Serial number

Manufacturing completion date

MANUFACTURER:

Ebony and Ivory

2)i. The relationship is a degree of 2 ( i.e Binary). The cardinality of the relationship is Many-to-Many.

ii. The model is from piano description to Technician.

PIANO:

Model name

Model number

Serial number

Manufacturing completion date

TECHNICIAN

Employee number

Specialty

3)i. The relationship is a degree of 2 (i.e Binary). The cardinality of the relationship is Many-to-One.

ii. The model is from Technician to Technician

TECHNICIAN:

Lower rank

TECHNICIAN:

Higher rank

5 0
4 years ago
You are required to justify the need to implement a collapsed core network. Which justification below makes sense for a collapse
baherus [9]

Answer:

number 3

Explanation:

6 0
4 years ago
Ken is a mobile app developer. He is designing a mobile app that offers tips and guidance to people interested in learning jazz
Luden [163]

Answer:

D is the one that makes the most sense

3 0
3 years ago
Read 2 more answers
Other questions:
  • Suppose that cells B1 through B100 of an Excel spreadsheet contain the quantity of units ordered on each of 100 different days.
    13·1 answer
  • What type of operating system runs a dedicated electronic device such as a smart thermostat?
    5·1 answer
  • What conversion factor should be used to convert from meters to Gigameters?
    9·1 answer
  • What is the part of the computer system that receives inputs, directs those inputs to the processor, and redirects the processed
    14·1 answer
  • Data ____________ refers to any technique that recodes the data in a file so that it contains fewer bits.​
    10·1 answer
  • what are the products of light-dependent reactions? Why are they important in lighy independent reactions?​
    6·2 answers
  • What is different between a pc mouse and a real mouse
    12·2 answers
  • If you are interested in working for a specific company, what type of job site should you look at for opening?
    12·1 answer
  • After turning volume all the way up on your computer speaker you still can’t hear any sound. What should be done next
    15·1 answer
  • Explain why it is wise to memorize your social security number.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!