1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
3 years ago
7

_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.

Computers and Technology
1 answer:
Sergeu [11.5K]3 years ago
6 0

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

You might be interested in
How to call a void method with no parameters IN JAVA?
natka813 [3]

Explanation:

SanfoundryMenu

Java Program to Illustrate a Method without Parameters and Without Return Type

« PrevNext »

This is a Java Program to Illustrate a Method without Parameters and Without Return Type.

We have made the method to calculate area. We call this method from main method and then enter the radius of the circle as input. Now we calculate area and print the output.

Here is the source code of the Java Program to Illustrate a Method without Parameters and Without Return Type. The Java program is successfully compiled and run on a Windows system. The program output is also shown below

6 0
3 years ago
Mario was surprised that the box that was supposed to tell him how many words he used in his document did not appear after the s
Nookie1986 [14]

Answer:

Click the Display tab

Explanation:

Choose the Word count option to make it visible, within the Display tab dropdown

7 0
3 years ago
Read 2 more answers
Tiny charts embedded in cells that show a visual trend alongside the data are called __________.
forsale [732]
They are called sparklines
5 0
3 years ago
Which standardized framework was developed by NIST to be used as a guidance document designed to help organizations assess and m
MariettaO [177]

The standardized framework developed by NIST to be used as a guidance document is;

NIST Special Publication (SP) 800-37 Risk Management Framework for Federal Information Systems and Organizations:

<h3>Computer Frameworks</h3>

The standardized framework by NIST from the FISMA guideline is the NIST Special Publication (SP) 800-37 Risk Management Framework for Federal Information Systems and Organizations.

Now, this standardized framework is simply a Life Cycle Approach used for Security and Privacy, and also it details the Risk Management Framework (RMF).

Read more about Computer Framework at; brainly.com/question/25236672

3 0
2 years ago
On the Loan worksheet, in cell C9, enter a PMT function to calculate the monthly payment for the Altamonte Springs 2022 faciliti
ycow [4]

Answer:

Microsoft Excel, pmt function.

Explanation:

Microsoft Excel is a spreadsheet application used to manipulate and analyse data. It has several functions and tools to work with. An excel workbook can contain multiple worksheets. It has columns (or field) labelled alphabetically and also numbered rows ( or record).

The PMT function is a financial function used to calculate the periodic payment of loans. It's syntax is;

=PMT(interest rate increase, loan period, loan amount).

For example, if the interest rate increase is annual, and the value is a cell B7, the input would be B7/12. If the value of the loan period and amount are referenced in cells B6 and B5 respectively, the function would be ;

=PMT(B7/12, B6, B5).

But this will give a negative result. For positive result;

=PMT(B7/12, B6, -B5)

Now to make excel pick values from a specified group of cells, they are made absolute by adding the '$' to the columns and rows.

=PMT($B$7/12, $B$6, -$B$5).

The result would positive values spanning to twelve months with interest rate.

3 0
3 years ago
Other questions:
  • Write a function with this prototype:
    8·1 answer
  • For the best night photographs, you’ll need to have a camera with a shutter speed of about 3 to 30 seconds
    13·1 answer
  • The undo function allows the user to cancel up to _____ previous typing actions.
    9·1 answer
  • Write a Java test program, named TestGuitar, to create 3different Guitars representing each representing a unique test case and
    8·1 answer
  • Which branch of science helps avoid or minimize stress related injuries at workplace? _____ is a branch of science that aims to
    15·1 answer
  • When one makes a social media post, what happens on other devices with the same app?
    13·1 answer
  • Analyze the following code. public class Test { public static void main(String[] args) { double radius; final double PI= 3.15169
    14·1 answer
  • What is local technology ? give examples​
    6·1 answer
  • Algorithm to calculate the area of a square.​
    6·1 answer
  • What is the full form of the OS?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!