1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naya [18.7K]
4 years ago
15

What port does the DarkComet malware listen on?

Computers and Technology
1 answer:
Agata [3.3K]4 years ago
5 0
 Dark Comet will be listening on port1604
You might be interested in
A device has an IP address of 10.1.10.186 and a subnet mask of 255.255.255.0. What is true about the network on which this devic
lawyer [7]

Answer:

Only the last number of each IP address will be unique

Explanation:

Subnet Mask is used to identify the two parts of the IP address. One is the network part that should be same for one network, and other is host part that will vary with number of computer or devices that are connected to the network.

Subnet mask is 32 bit address that are divided in 4 equal parts of 8 bits. Each 8 bit converted to decimal by varying different bits to generate 256 different decimal number combinations. It means we can vary the address range between 0 to 255. So If any 8 bit portion is 255 that means, in this section we cannot add host address.

<u>For Example</u>

In given case,

Subnet Mask = 255.255.255.0

That means first three portions are fixed and has been allocated for network part.  

The forth portion is 0 that means we can change this portion in IP address up to 255 different addresses.

So the IP address that is given can be vary as:

10.1.10. 186

10.1.10 This portion is network portion, this cannot be vary.

only the number 186 is the unique address that is particularly assigned to the devices and is vary between 0 to 255.

8 0
4 years ago
Anyone on ps4 willing to trade me a fennec or McClaren on rocket league?
Gnom [1K]
Bet bet bet i gotcha— my user is “stinkyminky84” sorry about the name i know ya weird lol.
3 0
3 years ago
Read 2 more answers
What's usually kept in database?
Levart [38]
I think this is the answer. I tried. Databases<span> may be </span>stored<span> on a computer and examined using a programs.</span>
7 0
3 years ago
Read 2 more answers
Can someone please explain binary addition to me? i have a test tomorrow yikes
umka2103 [35]

Answer:

its easy

Explanation:

there are are 5 main rules

in binary there are 2 number 0 and 1

0 + 0 = 0

0 + 1 = 1

1+0=1

1+1=0 carry 1

e . g

1 1 1

1 0 1 0 1 0

+ 1 1 0 0 1 0

-------------------------

1 1 1 1 1 0 0

*in bold are the ones that you need to carry.

in decimal there are 10 possible numbers 0- 9

when you do 1 + 9 it becomes 10, this can be done easily, however if you do 1 + 9 in a table like above, you will get 0 for the first column and you will carry 1 to the next column .

in binary is the same idea but using on 2 numbers 1 and 0

e.g

1

1

+ 9

----------

1 0

*in bold are the ones that you need to carry.

hope it helps and good luck in your exam.

3 0
3 years ago
unscramble the letters to identify which step of the scientific method each statement repesents why is the sliced cheese in the
Rudiy27
Sorry the only word I could get from that is problem, is that possibly the answer?
5 0
3 years ago
Other questions:
  • Branching is so called because <br>​
    5·2 answers
  • Which are characteristics of a good topic sentence?
    9·1 answer
  • how can you repin an image on your Pinterest pin board A. click on the "repin" button B. click on the "add pin" button C. click
    7·2 answers
  • Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty de
    9·1 answer
  • Robert is leading a project online that includes students from different cultures. Two of the students spend most of the time li
    7·1 answer
  • write a script that creates and calls a stored procedure named insert_category. first, code a statement that creates a procedure
    10·1 answer
  • Linux is a kind of software whose code is provided for use, modification, and redistribution. what kind of software is this?
    5·1 answer
  • Worth 30 pts
    9·2 answers
  • If you have an ordered list of all the states in North America, and you want to add a title "States of North America", what tag
    14·1 answer
  • Tech A states that modern vehicles use asbestos as the brake material. Tech B states that asbestos is no longer used in brakes.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!