1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
5

Consider that an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker breaks in

to a network, copies a few files, defaces a Web page, and steals credit card numbers, how many different threat categories does the attack fall into
Computers and Technology
1 answer:
pogonyaev3 years ago
7 0
I think the answer is 5 categories but I am not sure
You might be interested in
Compute the monthly cost of gas.
aalyn [17]

Answer:

Attached excel file containing formula for monthly cost of gas.

Explanation:

To find mileage note down readings at the star of month and at end of month.

Subtract end of month reading from start this will give you number of miles in month. Now as per mentioned in question, divide number of miles by average mpg and multiply by the price of a gallon of gas.

Here is your monthly cost of gas.

Download xlsx
6 0
4 years ago
We made a distinction between the forwarding function and the routing function performed in the network layer. What are the key
VladimirAG [237]

Answer: forwarding: move packets from router's input to appropriate router output

routing: determine route taken by packets from source to destination

Explanation:

The network layer refers to where connections take place in the internet communication process by sending packets of data between different networks.

The distinction between the forwarding function and the routing function performed in the network layer is that the forwarding function move packets from the input of the router to the appropriate router output while the routing function:m helps in knowing the routee taken by packets from the source to destination.

6 0
3 years ago
A survey of results on mobile phone datasets analysis
xxMikexx [17]
PErfect! 100% Absolutely beautiful. 
6 0
3 years ago
What is the storage capacity of floppy disk​
11111nata11111 [884]

Answer:

1.44 MB

Explanation:

Today, the most commonly used floppy disks are 3.5 inches and have the capacity of 800 KB to 2.8 MB (with a standard of 1.44 MB).

Hope this helps!

7 0
3 years ago
An operating system coordinates the BLANK of a computers operation.
devlian [24]
I believe it is D. The Central Processing Unit (CPU) can manage memory and storage. It also makes sure every program has what it needs to keep it up and running. 
8 0
3 years ago
Read 2 more answers
Other questions:
  • Transcoding digital videos does not cause a loss of quality. <br> a. True <br> b. False
    9·1 answer
  • Int alpha [5];
    15·1 answer
  • Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?
    12·1 answer
  • Which of the following is NOT an e-reader you would use as an alternative to carrying around a set of textbooks?
    13·1 answer
  • URGENT!!! Steve wants to change shooting and exposure settings while on his photo shoot. Which camera part will allow him to do
    12·2 answers
  • Using your digital camera, frame a well-lit scene with the following settings:
    7·1 answer
  • Suppose testcircle1 and circle1 in listing 9.1 are in two separate files named testcircle1.java and circle1.java, respectively.
    14·1 answer
  • Chris needs to modify the default bullets that are used in a nonnumbered list in Word.
    6·1 answer
  • Select the correct answer.
    5·1 answer
  • Could anyone help me with this assignment please?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!