1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
3 years ago
12

What is the Kali Linux's kernel? Sorry for english, but help me.

Computers and Technology
1 answer:
fenix001 [56]3 years ago
8 0

Answer:

I don't knwo if thsi is what you mean, but Kali is a Debian-derived Linux distribution

Explanation:

You might be interested in
Provide the definition for each of the following structures and unions:
galben [10]

Answer:

a)

struct inventory  // structure inventory

{

char partName[ 30 ];  // char array

int partNumber;  // variable partNumber

float price;  // FLOAT VARIABLE PRICE

int stock ;  // INT VARIABLE STOCK

int reorder;  // INTEGER VARIABLE RECORDER

};

b)

union data // structure union

{

char c;  // char variable

short s; // short variable

long b; //

long variable float f ;  // float variable

double d ; // double variable

};

c)

struct address  // structure address

{

char streetAddress[ 25 ]; // character array

char city[ 20 ]; // variable char

char  state[ 3 ] ; // state array

char  zipCode[ 6 ] ; // zipcode array

};

d)

structure student  // structure student

{

char firstName[ 15 ]; // array first name

char  lastName[ 15 ] ;  // array last name

struct address * ;  // holding the home address

};

e)

struct test

{

unsigned a:1, b:1, c:1, d:1, e:1, f:1, g:1, h:1, i:1, j:1, k:1, l:1, m:1, n:1, o:1, p:1;

}; // prototype test assign value

Explanation:

Following are the description of the above part

a)

  • By using the struct keyword we declared the structure .In the part (a) we declared the struct  "inventory".In this structure we char array "partName " of size 30 .
  • We holding the 3 int variable "partNumber" , "stock" and "reorder." and 1 float variable i.e "price ".

b)

  • By using the union keyword we declared the union .In the part (b) we created the union .
  • Inside that union we holding different types of datatype that are mention in the question .

C)

  • By using the struct keyword we declared the structure  .In the part (c) we created the structure.
  • Inside that structure we holding array of character of variable "streetAddress","city","state" and "zipcode" by using char array .

d)

  • By using the struct keyword we declared the structure .
  • In this we declared array of "firstname" and "lastname" of char datatype .
  • In the last we create a structure address by using the pointer following by struct address

e)

In the part e we created the test that contain unsigned value of thhe 16 bit and 1 width

8 0
3 years ago
An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
maxonik [38]

The type of attack which has occurred in this scenario is known as credential harvesting.

<h3>What is credential harvesting?</h3>

Credential harvesting is also known as account harvesting and it can be defined as a type of attack that involves the use of the following techniques to illegally obtain large numbers of user credentials (username or password):

  • MITM attacks
  • DNS poisoning
  • Phishing

In conclusion, the type of attack which was used in this scenario is known as credential harvesting.

Read more on phishing here: brainly.com/question/23850673

#SPJ1

3 0
2 years ago
PLEASE HELP ASAP!!! Prompt<br> What is the Bcc address field for?
cluponka [151]

Answer:

For security and privacy reasons, it is best to use the Blind Carbon Copy (BCC) feature when sending an email message to a large number of people. When you place email addresses in the BCC field of a message, those addresses are invisible to the recipients of the email.

Explanation:

8 0
3 years ago
why are microphones or digital cameras unlikely to cause the damage that is found in repetitive strain injury?
sveta [45]
Because these devices do not require the repetitive motion that cause the damages.
5 0
3 years ago
What device connects your computer to a wireless network?
Darina [25.2K]

Answer:

a router

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Application programmers specialize in developing system software such as operating systems, device drivers, security modules, an
    10·1 answer
  • Where may an operating system reside in a mobile device?
    5·1 answer
  • What does it mean for a school to be “accredited”?
    5·1 answer
  • Write a program that will manipulate Rectangle objects for which you will create a Rectangle class.
    5·1 answer
  • Explain what a lookup table is (assembly). Write pseudo code
    13·1 answer
  • In your own words describe the benefits of creating functions in your code
    12·1 answer
  • Will has been asked to recommend a protocol for his company to use for a VPN connection to the cloud service provider that his c
    6·1 answer
  • 1.The ___________ method adds a new element onto the end of the array.
    5·1 answer
  • You learned that you can use the tags to insert a link to another webpage. One problem that webpage developers face is that, aft
    7·1 answer
  • What is range work book​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!