1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Virty [35]
3 years ago
8

The phase of hacking where the attacker creates a profile of the target is known as ________________ and is also referred to as

_______________.
Computers and Technology
1 answer:
tatyana61 [14]3 years ago
4 0
The stage of hacking where the attacker constructs a profile of the target is recognized as Foot-printing and is also referred to as reconnaissance. Reconnaissance is perhaps the extensive phase that is occasionally weeks or months. The black hat uses a diversity of causes to learn as much as likely about the target business and how it functions as well as internet searches, social engineering, dumpster diving, domain name management or search services and non-intrusive network scanning. The undertakings in this phase are not easy to protect against. Facts about an organization find its method to the internet via many routes and employees are often trapped into providing tidbits data which over time, act to complete a complete picture of procedures, organizational arrangement and possible soft spots. 
You might be interested in
a central issue in the microsoft antitrust lawsuit involved microsoft's integration of its internet browser into its windows ope
Tomtit [17]

A central issue in the Microsoft antitrust lawsuit involved Microsoft's integration of its internet browser into its windows operating system, to be sold as one unit is a practice that is known as: C. tying.

<h3>What is an operating system?</h3>

In Computer technology, an operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, in order to manage random access memory (RAM), software programs, computer hardware and all user processes.

Microsoft was involved in an antitrust lawsuit with respect to tying the integration of its internet (web) browser into its windows operating system (OS) such as Windows 7, 8, 10, etc., in order to sell them to end users as a single unit.

Read more on operating system here: brainly.com/question/22811693

#SPJ1

8 0
1 year ago
Give an example of an outdated memory or storage device what do you think they are outdated
andreev551 [17]

Answer:

HDD technology

Explanation:

You will find that there is a big difference between the SSD and the HDD. The SSD lists out the technical advantages as well as the disadvantages related to HDD, and this has led to the wide use of the SSD rather than the HDD, which is supposed by many being an outdated product. You will find that the SSDs last longer, and they are faster. However, the SSD is more prone to damages as compared to HDD. However, SSD looks like being more advanced considering the above-mentioned advantages, and fewer number of disadvantages. And hence, many people shifted to the SSD from HDD. Remember, SSD stands for solid state drives. And HDD means hard disk drive.

8 0
3 years ago
F we are reduced to a set of computer algorithms, how do we differentiate ourselves from our programming or our connectome? is i
Goshia [24]

Answer:

Answer explained below

Explanation:

The surface biopsychology and the relatively new science of neuroinformatics are fascinating areas of study are the human brain is the most complex computer in existence. Understanding how it works has been a scientific endeavor for centuries combining the newest advances in computer programming with biochemistry computer modeling allows researchers to collect data and anticipate what may happen in a live brain helping them test and develop hypotheses that can be used in conjunction with experiments in the lab.

The reconstruction of neuronal morphology for simulation is difficult and time consuming, although recent advances in scientific software has somewhat simplified the process using the geometry preparation toolkit illustrates how the complex morphology of a neuron impacts the function of the cell Researchers are able to see the effects of the channels opening and the calcium being released both graphically and numerically.Adolescence involves sexual maturity in terms of hormones and physical development of the body.

The psychosocial context of adolescents is markedly different to that of children and adults Adolescents begin to assert more autonomous control over their decisions emotions and actions and start to disengage from parental control

  • Microchips are about the size of a grain of rice and coated with biocompatible glass upon implantation by syringe connective tissue should form to prevent migration.
  • The procedure is very low.

The current market for these devices includes livestock and laboratory animal industries though the technology is quite useful some problems have already surfaced although some of them tend to be identified with specific programs individuals or locations they are presented here as generic.he processes and methods that we use help determine the greater outcome of the venture,there is a unique quality about humans and that is the need for routine like animals humans too feel a sense of calm when falling into a pattern we are upended when we move to a new home or community when we transfer to a different school and when we change jobs even those who feel that they do not fit in as a quintessential member of society still experience the effects of routine.

That individual will have their process which contributes to the overall success of the group this also applies to education.One student may be inclined to study for seven hours before an exam and another may only study for two each possesses their routine.

  • Neuroinformatics leads us currently neuroscientists collect complex data in ever-increasing amounts fostering increased specialization with resultant challenges to integrate data between and across levels of interaction control and function the field should enhance its wealth of ever-increasing empirical data accumulated from its many disciplines and experimental approaches
  • The purpose of analyzing brain ultrastructure is to understand the normal synaptic communication pathway of neurons and supporting cellular elements and the alternations of such pathways and cellular elements caused by diseases.

6 0
3 years ago
My 2 in 1 laptop/tablet
katovenus [111]

"My 2 in 1 laptop/tablet  goes black and does this weird glitching thing..."

2-in-1 has a bunch of connections bet the keyboard n screen. its weaker than a laptop cuz' the keyboard is detachable. bad news if u have a flaky connection there.

if its brand new or under warranty, i wuld send it back. good luck!


8 0
3 years ago
Write a report on the effectiveness of using thicker bags. Remember to include the effect on the environment and the economy in
malfutka [58]

The effectiveness of using thicker bags are:

  • It has the lowest environmental impact in terms of any other disposable bag.
  • It can be used three to six more times.
  • It is environmentally sustainable.

<h3>What is the effect of thicker plastic bags have on the environment?</h3>

The use of plastic bags is known to have some form of detrimental effects on the such as animal choking, pollution, and others.

Conclusively, Note that thicker bags needs a lot of plastic to be able to produce it and it goes to waste even if a person do not use it again.

Learn more about environment from

brainly.com/question/17413226

4 0
2 years ago
Other questions:
  • Answer this question please
    6·1 answer
  • What should you do prior to writing your business document?
    11·1 answer
  • Web 2.0 has led to a shift just from consuming content towards what
    6·1 answer
  • Ricardo twists his ankle at work but does not immediately realize that he is injured because his ankle is not sore or swollen, a
    5·1 answer
  • Can an iphone user see when an android user is typing
    10·2 answers
  • Python3
    7·1 answer
  • Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, in
    5·1 answer
  • Do you trust machine learning application?
    10·1 answer
  • The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
    12·1 answer
  • Why is the computer uses binary why not trinary?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!