1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anika [276]
3 years ago
11

You are a disgruntled employee with a master’s degree in computer sciences who was recently laid off from a major technology com

pany, and you want to launch an attack on the company. Where might you go to learn about vulnerabilities that you can exploit for your plan?
a. the company’s website
b. the website of a competitor’s company
c. a coffee shop near your old office
d. the company’s website
e. a blog
Computers and Technology
1 answer:
WARRIOR [948]3 years ago
3 0

Answer:

If you know what you're doing, I'd suggest hacking into the company's website...

Explanation:

You might be interested in
Assume that the variables gpa, deansList and studentName, have been declared and initialized . Write a statement that both adds
Alborosie

Answer:

Following are the statement which is given below:

if (gpa > 3.5)  // check the condition if gpa exceeds 3.5.

{

deansList++;  // increment of 1 in the deansList variable

cout << studentName;  // display the studentName,  

}

Explanation:

The description of the statement

  • In the if statement we check the condition of "gpa" .if  "gpa"  is greater then 3.5 then it executed the statement inside the if block otherwise nothing will be executed.
  • if control moves to the if part it adds to 1 to the deansList.
  • Finally, display the value of studentName.
3 0
3 years ago
But this time use 16 kib pages instead of 4 kib pages. what would be some of the advantages of having a larger page size? what a
uranmaximum [27]

Here are the advantages and disadvantages of larger paper size: 

Advantages: 

Reduces minor page faults. 

Disadvantages: 

There will be a decrease in the number of frames. 

There will be an increase number of page faults. 

<span>Waste of more space with the internal fragmentation.</span>

6 0
3 years ago
Sorting and filtering are two ways to _____ data.
Tamiku [17]
Store data. do you have options?
6 0
3 years ago
Read 2 more answers
How do you find specific words on a web page ...?? I know theres a shortcut for highlighting a specific word on a webpage on fir
aniked [119]
If you are on a desktop computer you can press the top row key "F3" and a little box will pop up and you can type the word you are looking for in there and it will find that word on the page you are on and take you straight to it.
5 0
3 years ago
Assume that word is a variable of type String that has been assigned a value. Assume furthermore that this value always contains
Valentin [98]

Answer:

   String word = "George slew the dragon";

   

   int pos = word.indexOf("dr");    

   String drWord = word.substring(pos, pos+4);

   

   System.out.println(drWord);

Explanation:

Assuming dr is always there, we don't have to check the validity of 'pos'. Normally, you would!

5 0
3 years ago
Read 2 more answers
Other questions:
  • What is the aperture and how does it impact sunrise/sunset photos? What is generally considered an ideal aperture for sunrise/su
    5·2 answers
  • Define networks, marketplaces, and platforms and discuss their differences.
    15·1 answer
  • What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior g
    11·1 answer
  • You are the administrator of the Sybex website. You are working when suddenly web server and network utilization spikes to 100 p
    15·1 answer
  • Limitations of the information systems used by tesco​
    7·1 answer
  • Which processor family is most likely found on recent gaming laptops (Gaming laptops require a lot of computational power)?
    11·1 answer
  • What should be used to keep a tablet dry?
    13·1 answer
  • Karin realized that a song takes up a lot more space on her computer than the lyrics of the song typed out in ms word document .
    12·1 answer
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
  • Classify computer based on signal
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!