1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leto [7]
3 years ago
6

The purpose of vulnerability scanning is to exercise system protections, particularly human response to attack indications, by u

sing common tools and techniques developed by attackers. True False
Computers and Technology
1 answer:
dezoksy [38]3 years ago
6 0

Answer:

False

Explanation:

The purpose of vulnerability scanning is to identify vulnerabilities and weaknesses on the computer system such as firewalls, routers, switches, servers and applications and they are automated in order to focus on identifying this potential and known vulnerabilities on the network thereby reporting on the security flaws.

You might be interested in
Which of the following does not illustrate an effect of media on human communication?
Lyrx [107]

I'd choose B as the answer.

Our entire social lives these days are mediated and we are now leaving in a mediated era. Social media, for instance, has profoundly influenced in inter-personal communication. Options A and D contributes to the interaction and the fulfillment of peoples’ social needs and social media has become a preferred mode of communication with the rise of digital and mobile technologies. Social media has negatively impacted and reduced face to face interactions of human beings, whether business wise or through personal communication. Option C also illustrates an effect of media on human communication, which only leaves us with option B

3 0
4 years ago
Explica el empleo de cuentas y contraseñas en archivos
RideAnS [48]

Answer:Una contraseña o clave es una forma de autentificación que utiliza información secreta para ... Algunos sistemas almacenan contraseñas como archivos de texto. ... En muchos casos, particularmente con las cuentas de administradores o ... que los usuarios tiendan a olvidar cual es la contraseña actual.

Explanation:

espero te sirva jeje

8 0
3 years ago
In this scenario, two friends are eating dinner at a restaurant. The bill comes in the amount of 47.28 dollars. The friends deci
pickupchik [31]

Answer:

The java program for the given scenario is as follows.

import java.util.*;

import java.lang.*;

public class Main

{

   //variables for bill and tip declared and initialized

   static double bill=47.28, tip=0.15;

   //variables for total bill and share declared

   static double total, share1;

public static void main(String[] args) {

    double total_tip= (bill*tip);

    //total bill computed

    total = bill + total_tip;

    //share of each friend computed

    share1 = total/2;

    System.out.printf("Each person needs to pay: $%.2f", share1);  

}

}

Explanation:

1. The variables to hold the bill and tip percent are declared as double and initialized with the given values.

static double bill=47.28, tip=0.15;

2. The variables to hold the values of total bill amount and total tip are declared as double.

3. All the variables are declared outside main() and at class level, hence declared as static.

4. Inside main(), the values of total tip, total bill and share of each person are computed as shown.

double total_tip= (bill*tip);

total = bill + total_tip;

share1 = total/2;

5. The share of each person is displayed to the user. The value is displayed with only two decimal places which is assured by %.2f format modifier. The number of decimal places required can be changed by changing the number, i.e. 2. This format is used with printf() and not with println() method.

System.out.printf("Each person needs to pay: $%.2f", share1);  

6. The program is not designed to take any user input.

7. The program can be tested for any value of bill and tip percent.

8. The whole code is put inside a class since java is a purely object-oriented language.

9. Only variables can be declared outside method, the logic is put inside a method in a purely object-oriented language.

10. As shown, the logic is put inside the main() method and only variables are declared outside the method.

11. Due to simplicity, the program consists of only one class.

12. The output is attached.

5 0
4 years ago
Read 2 more answers
the function must find the substrings of s that start with a vowel and end with a consonant, then print the alphabetically first
PolarNik [594]

According to the parameters given in the questions above, the alphabetically lowest and highest substrings that start with a vowel and end with a Consonant is given below.

<h3>What is the determined substrings described above?</h3>

The determined substring is given by the following:

def findSubstrings(s):

   sub_strings_list=[]    #the required substrings list

   vowels=['a','e','i','o','u']    #vowels list

   for i in range(0,len(s)):    

       for j in range(i+1,len(s)+1):

           sub_string=s[i:j]    #slicing the original string into substring

           #checking whether the substring starts with a vowel and ends with a consonant

           if(sub_string[0] in vowels and sub_string[-1] not in vowels):    

               if(sub_string not in sub_strings_list):    #checking if the substring is already in the list

                   sub_strings_list.append(sub_string)    #if all conditions are satisfied adding the substring to the list

   sub_strings_list.sort()    #sorting the list alphabetically

   print(sub_strings_list[0])    #printing the first substring in the list

   print(sub_strings_list[-1])    #printing the last substring in the list

s=input()

findSubstrings(s)

Learn more about substrings:
brainly.com/question/21306076
#SPJ4

Full Question:

Consider a string, s — An alphabetically-ordered sequence Of Of s would be {"a", "ab•, "abc • , "bcu, If the sequence is reduced to only those substrings that start with a vowel and end with a consonant, the result is Cab", •abc"}. The alphabetically first element in this reduced list is •ab", and the alphabetically last element is "abc'. As a reminder:

Vowels: a, e, i, o, and u.

Consonants: b, c, d, f, g, h, i, k, l, m, n, p, q, r, s, t, v, w, x, y, and z.

For a given string, determine the alphabetically lowest and highest substrings that start with a vowel and end with a Consonant.

7 0
2 years ago
Developers found a "time of check to time of use" (TOCTTOU) vulnerability in their application. The vulnerability made it possib
earnstyle [38]

This vulnerability above is taking advantage of the race condition process in the application.

<h3>What is race condition? </h3>

This race condition is said to be in the critical section or one that is a part of the program and it is a place where shared memory is accessed and it is concurrently worked on or executed by two or more threads.

Hence,  This vulnerability above is taking advantage of the race condition process in the application.

Learn more about race condition from

brainly.com/question/13445523

#SPJ2

5 0
2 years ago
Other questions:
  • Which view is used to allow a publisher to view facing pages of a publication at the same time?  NormalMaster PageTwo-Page Sprea
    9·1 answer
  • In Rizzati Corp, vice presidents in departments such as engineering, manufacturing, IT, and human resources report directly to t
    15·1 answer
  • Write a C or C program A6p2.c(pp) that accepts one command line argument which is an integer n between 2 and 4 inclusive. Genera
    9·1 answer
  • When you define a table's primary key, the dbms automatically creates a(n) _____ index on the primary key column(s) you declared
    14·1 answer
  • The process of deciding a court case based on the basis of previous decisions is the principle of which of the following?
    10·1 answer
  • Construct a regular expression that recognizes the following language of strings over the alphabet {0 1}:
    10·1 answer
  • Question 6 (2 points)
    11·1 answer
  • Debug the code in the main method of this class, which is intended to initialize an array named arr to hold 3 ints, fill this wi
    15·1 answer
  • A test's directions often clarify any questions a student might have about answering a response question.
    5·2 answers
  • Prepare the truth table for the following boolean expressions: (A+B).(A+C).(B)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!