1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sukhopar [10]
4 years ago
15

Sample answers of What assets were targeted Stuxnet and the team behind the worm?

Computers and Technology
1 answer:
Damm [24]4 years ago
8 0
The assets were programmable logic controllers (PLCs).  Which controlled systems like prison doors and centrifuges for separating nuclear material. 

The "who" is still debated.  Credit (if you use that word) is given to the Equation Group.  But that is still hotly debated as there seems to be a political agenda with the attack and many still believe this was nation-state sponsored.  I can be easy to leave digital fingerprints behind to make it seem like a known hacking team.
You might be interested in
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
CH4 has how many of each type of atom?
quester [9]

Its easy that moderators that see this answer can think that my answer isn't without explanation.

• Type of atom C (Carbon)

C = 1

• Type of atom H (Hydrogen)

H = 4

<em>You</em><em> </em><em>dont</em><em> </em><em>underst</em><em>and</em><em>?</em><em> </em><em>JUST</em><em> </em><em>SEE</em><em> </em><em>THE</em><em> </em><em>FORMULA</em><em> </em><em>C</em><em> </em><em>MEANS </em><em>ONLY </em><em>HAVE </em><em>1</em><em> </em><em>CARBON </em><em>ATOM </em><em>A</em><em>ND</em><em> </em><em>H4</em><em> </em><em>MEANS</em><em> </em><em>4</em><em> </em><em>ATOM</em><em> </em><em>OF</em><em> </em><em>HYDRO</em><em>GEN</em>

<em>oK</em><em>.</em><em> </em><em>have</em><em> </em><em>a</em><em> </em><em>nice</em><em> </em><em>day</em><em> </em><em>hope</em><em> </em><em>you</em><em> </em><em>understands</em>

5 0
3 years ago
Today encoding scheme has taken over ascII by what
harkovskaia [24]
I do not know, i really hope you dont fail!!!!!!!!!
7 0
4 years ago
An interest in supervising other workers would be useful for someone who wanted to become
Paladinen [302]

Answer:

An interest in supervising other workers would be useful for someone who wanted to become a Manager

Explanation:

A manager is person who manages work, people and who is the most responsible person in an organization. A main duty of the Manager is to focus on to allot works to their sub-ordinate, monitor the work done by each and everyone; encourages the employees who are transforming their career very well and showing their good attitude towards their work; analyze how employees cooperate to achieve the target and plan for future targets.

So a Manager monitors or supervises others work.

5 0
4 years ago
Which action should you take when sending a large attachment?
lana66690 [7]
CamScanner app is helpful for that
4 0
4 years ago
Read 2 more answers
Other questions:
  • True or false? the name of a named standard acl is case sensitive.
    6·1 answer
  • Which column and row references are updated when you copy the formula: =F$5+12?
    14·1 answer
  • What are computer virus ? Explain in detail.In your answer include symptoms and prevention (3each)
    10·1 answer
  • Storage device that is installed inside your computer is called?
    7·1 answer
  • You type a web address in your web browser. order the steps, which describe the internet name resolution process for the web add
    7·1 answer
  • Choose all of the items that represent operating systems largely derived from UNIX. GNU/Linux, Mac OS X, IBM, OS/360, BSD, Windo
    12·2 answers
  • Which of the following information should be included in audit documentation? a. Procedures performed. b. Audit evidence examine
    13·1 answer
  • When are bar charts most commonly used
    10·1 answer
  • A project manager types a document and prints it. He is using _____. hardware software hardware and software
    12·2 answers
  • 5.23 LAB: Contains the character
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!