1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
3 years ago
7

____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to pa

rticipate in an attack.
Computers and Technology
2 answers:
Talja [164]3 years ago
6 0

Answer: Zombies

Explanation: Zombie is a computer device that is responsible for the compromising the system and making it prone to several destruction such as the Trojan horse virus,hackers and other viruses as well. Zombie makes the computer system to get malfunctioned easily ,that is without much security and various malicious functions can be performed.They basically act as the infected computer .

yuradex [85]3 years ago
4 0

Answer:

The options for this question are the following:

A) Drones

B) Helpers

C) Zombies

D) Servants

The correct answer is C) Zombies

Explanation:

In computing, a zombie is a computer connected to the network that has been compromised by a hacker, a computer virus or a Trojan. It can be used to perform various malicious tasks remotely.

Most zombie computer owners are not aware that their system is being used in this way, hence the comparison with the walking dead. In addition, they are used in DDoS attacks coordinated with multiple botnet machines that resemble zombie horde attacks, such as those that appear in horror movies.

You might be interested in
Is Filmora 9 or Final Cut Pro Better for personal use?
padilas [110]
Final Cut Pro is better for personal use
3 0
3 years ago
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
What aspect should you consider before adding pictures to a document? You should structure the first before you search for a rel
suter [353]

Answer:make sure it line up with tour essay

Explanation:

5 0
3 years ago
For this lab, you will write a Java program to prompt the user to enter two integers. Your program will display a series of arit
Mekhanik [1.2K]

Answer:

Following are the program to this question:

import java.util.*;//for user-input value  

public class Project01//Decalring a class Project01

{

public static void main(String asq[])//main method  

{

int ax1,ax2;//Decalring integer variables

Scanner oscr=new Scanner(System.in);//creating Scanner class Object

System.out.print("Enter the First number: ");//print message  

ax1=oscr.nextInt();//input first number

System.out.print("Enter the Second number: ");//print message

ax2=oscr.nextInt();//input second number

System.out.println(ax1+ "+"+ax2+"= "+(ax1+ax2));//use print method to perform the arithmetic operation  

System.out.println(ax1+"-"+ax2+"= "+(ax1-ax2));//use print method to perform the arithmetic operation

System.out.println(ax1+"*"+ax2+"= "+(ax1*ax2));//use print method to perform the arithmetic operation

System.out.println(ax1+"/"+ax2+"= "+(ax1/ax2));///use print method to perform the arithmetic operation

System.out.println(ax1+"%"+ax2+"= "+(ax1%ax2));//use print method to perform the arithmetic operation

System.out.println("The average of your two numbers is: "+(ax1+ax2)/2);//calculating average

}

}

Output:

Please find the attached file.

Explanation:

In the program, inside the class "Project01" and the main method two integer variable "ax1,ax2" is declared that uses the scanner class concept for input the value from the user-end, and in the next step, it uses the print method with the arithmetic operation to perform and prints its calculated value.

7 0
3 years ago
Write MVCTester.java. When the program starts, the initial screen displays a button labeled "add", a blank text area, and a text
Debora [2.8K]

Answer:

Kindly note that, you're to replace "at" with shift 2 as the brainly text editor can't take the symbol

Explanation:

import java.awt.event.*;  

import java.awt.geom.Area;

import javax.swing.*;

class MVCTester implements ActionListener{

JButton b; //button

JTextField t1; //textfiled

JTextArea area; //text area

MVCTester(){

JFrame f=new JFrame("Button Example");

//button

b=new JButton("add");  

b.setBounds(0,0,125,27);  

f.add(b);  

b.addActionListener(this);  

//textfiled

t1=new JTextField();  

t1.setBounds(0,161,125,24);  

f.add(t1);

//textarea

area=new JTextArea();  

area.setBounds(0,28,123,130);  

f.add(area);

area.setColumns (17);

area.setLineWrap (true);

area.setWrapStyleWord (false);

f.setSize(125,225);

f.setLayout(null);  

f.setVisible(true);

}

"at"Override

public void actionPerformed(ActionEvent arg0) {

Control c=new Control(area,t1,b);

}  

}  

class Control {

Control(JTextArea area,JTextField t1,JButton b){

//simple logic getting text of text area adding text of textfiled and setting the text to text area

area.setText(area.getText()+t1.getText()+"\n");

t1.setText("");

}

}

public class Modal{

public static void main(String[] args) {  

MVCTester be=new MVCTester();

}

}

8 0
3 years ago
Read 2 more answers
Other questions:
  • The distance at which wi-fi signals can travel ranges typically between ____ and ____.
    15·1 answer
  • What are the possible sources of the information that defines the functional dependencies that hold among the attributes of a re
    15·1 answer
  • Discuss some design considerations that you should keep in mind when you want to design a professional-looking flyer or newslett
    5·2 answers
  • ____ is an act, directed at Web sites catering to children, that requires site owners to post comprehensive privacy policies and
    5·1 answer
  • The figure below shows a black and white image with a resolution of 720×504. Identify how much memory (in bits) will be occupied
    15·1 answer
  • Which term is used to describe bitmap images
    8·2 answers
  • Mintzberg's classification of organizational structure categorizes the knowledge-based organization where goods and services dep
    5·1 answer
  • Time Conversion C++: Given a time in -hour AM/PM format, convert it to military (24-hour) time.
    9·1 answer
  • The _____ Tag surrounds all content that will be visible on your web page for all to users to see on that website.
    13·1 answer
  • When scriptwriters are writing scripts, why do they have to write them in accordance with industry standards?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!