1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Morgarella [4.7K]
3 years ago
15

What is a malicious actor essentially looking for when attempting a network attack?

Computers and Technology
1 answer:
ahrayia [7]3 years ago
4 0

Answer:

information of personnel

Explanation:

You might be interested in
In networking, bandwidth is the volume of computer data carried via a conductor in a period of time. Which one of these could be
masya89 [10]

Answer:

The answer is "Fiber Optic Cable".

Explanation:

In the given question options are defined, but in these options, there is some error.

The optical fiber cable is also known as internet wiring, which includes fiber strands inside an isolated housing. It is used to transferring data at a very high speed. This cable is developed for long-range data networking, high-performance connectivity, and multimedia, and other choices are wrong that can be described as follows:

  • A modem is used to transmits data over a network, that's why it is wrong.
  • Router is used to transport traffic between your computer and the internet, that's why it is wrong.
7 0
3 years ago
Windows, Apple’s Mac OS, and Unix/Linux are just some of the most common what?
34kurt
Most common PC operating systems
7 0
3 years ago
Read 2 more answers
(iii) ............ characters can be stored in memo field. (a) 50 (b) 64000 (c) 255 (d) 200 ​
Svetlanka [38]

Answer:

(b) 64000

Explanation:

Assuming that the "Memo" being mentioned is a Microsoft Access memo field, it can hold up to 64,000 characters, even in the more recent version of the application where the "Memo" is now know as the "Long Text" field.

According to microsoft.com, "In earlier versions of Access, we used the Memo data type to store large amounts of text... the Long Text field works the same as the Memo field of old... [it] can only display the first 64,000 characters."

<em>Please put "Brainliest" on my answer if it helped you out the most!</em>

<em>(Further Reading) If you're still confused, I suggest you search up the following:</em>

<em>- Microsoft Access Long Text character limit</em>

7 0
2 years ago
Why is there no window on dishwsher
olchik [2.2K]

Because most people really don't want or need to see what's in there.

If you want to, open the door during the cycle. It won't harm anything.

If you're curious to see a dishwasher in action, some appliance showrooms have a display model, where the spray parts and the racks are in an entirely transparent box. They're to show how powerfully and completely the stuff inside will get cleaned, but you can also see how the dishwasher is intended to work, by filling with just a couple of inches of water, and then recirculating it for the duration of the cycle, to loosen the stuff on the dishes.

3 0
3 years ago
Read 2 more answers
A computer never gets tired or bored while working for a long time .. ​
Angelina_Jolie [31]

Answer :Computers never get tired or bored because of doing the same task continuously. They work in the same manner all the time. A computer can store large amount of information in its memory.

Explanation: it is quality which makes the user to be dependent on computer. As we all know, computer systems do repetitive tasks without any boredom, tiredness, or fatigue.

5 0
3 years ago
Other questions:
  • Which Computer career field enables you to create and design interactive multimedia products and service
    5·2 answers
  • 2a
    8·1 answer
  • Assign jsonData with the parsed value of the stringData variable. Then, assign 29 to the points property in jsonData and assign
    13·1 answer
  • Why should computers have a file structure?
    7·2 answers
  • Write a program which populates an array with integer values read from a file. We do not know how many integers are in the file,
    8·1 answer
  • I.d 9934607467<br> p.a.s.s 54321<br><br> P.L.E.A.S.E J.O.I.N. Z.O.0.M. M.E.E.T.I.N.G
    10·1 answer
  • What is machine learning
    9·2 answers
  • File:///media/fuse/drivefs-0142e6928396ed2afff070ead0fbbbcd/root/JerooLessonFourLabA_1.pdf
    6·1 answer
  • Is pseudocode obtained from Algorithm or is Algorithm obtained from pseudocode?
    8·1 answer
  • If any one answered this i will give brilientst what is stimulation program​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!