1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sukhopar [10]
4 years ago
15

Sample answers of What assets were targeted Stuxnet and the team behind the worm?

Computers and Technology
1 answer:
Damm [24]4 years ago
8 0
The assets were programmable logic controllers (PLCs).  Which controlled systems like prison doors and centrifuges for separating nuclear material. 

The "who" is still debated.  Credit (if you use that word) is given to the Equation Group.  But that is still hotly debated as there seems to be a political agenda with the attack and many still believe this was nation-state sponsored.  I can be easy to leave digital fingerprints behind to make it seem like a known hacking team.
You might be interested in
What is the main difference between a struct and a class?
Kay [80]

Explanation:

A class encapsulates methods, while a struct cannot.

4 0
3 years ago
I'm looking for a new laptop for school. Which laptop would be the best. Right now I have a chromebook and it is broken. 
Y_Kistochka [10]
Any HP laptop would be good! What is your price range?
Also, if it is for school, have you considered getting an iPad? It is great for taking notes and looking stuff up and being portable. My friends currently use it
3 0
3 years ago
Read 2 more answers
A web-based application encounters all of the connectivity and compatibility problems that typically arise when different hardwa
andrezito [222]

Answer:

False

Explanation:

A web-based application encounters connectivity and compatibility relate to data server. It does not belong to any hardware environments.

A web based application is accessed over network.They run inside a web browser. Small of program is download to user's desktop, but this processing is done over internet.

6 0
3 years ago
An vector of  int named a that contains exactly five elements has already been declared and initialized. In addition, an  int va
Yakvenalex [24]

Answer:

The statement for the question is following:-

a[j]=a[j+1]*2;

Explanation:

We have to modify the element at the index j.Since the value of j is between 0 to 3 and the vector contains exactly 5 elements.So j will not exceed the size of vector a.

Now what we have to assign the value at index j is the value double at index next to j that is j+1.So the statement will be

a[j]=a[j+1]*2;

3 0
4 years ago
Python
elixir [45]

print("welcome to the bill calculator")

minutes = float(input("number of minutes you used: "))

data = float(input("the amount of data you used in GB: "))

print("your basic plan costs $39.99 per month")

mcost = (minutes - 450) * .45

print("you will be charged " +  str(mcost) + " for the minutes you used")

print("the monthly data fee is $30.00")

dcost = (data - 3) * 10

print("you will be charged " + str(dcost) + " for the extra data you used")

total = mcost + dcost + 69.99

print("your total bill is " + str(total))

the 20 value your teacher gave may be incorrect, bc 4.2-3*10 = 12 not 20, making the total 109.89

4 0
3 years ago
Other questions:
  • The analysis of how people relate to each other is known as?
    6·1 answer
  • What is a detailed and thorough review of the deployed security infrastructure compared with the organization’s security policy
    5·1 answer
  • Jeremy is designing a website for a florist. He intends to discuss the web design with his client. Which tool should Jeremy use
    6·1 answer
  • Complete the sentence. <br><br> ____ Is the study and use of very small technology units
    14·1 answer
  • Budget at completion<br><br> What does this measurement tell you?
    8·1 answer
  • A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rath
    11·1 answer
  • Jenny, a programmer, uses Microsoft Excel 2016 to generate data required for the programs she develops. She uses various functio
    10·1 answer
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
  • Michael’s team is presenting a robot before their examiners. What do they need which is a definitive description of the final pr
    6·1 answer
  • What is the answer to 4.9 Code Practice: Question 2
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!