1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatiyna
3 years ago
11

. One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t

o:
A.
report which device drivers a computer uses

B.
determine which ports are open on a computer

C.
report the status of individual computer users

D.
determine which operating system is running on a computer
Computers and Technology
1 answer:
Komok [63]3 years ago
3 0

Answer: C)report the status of individual computer users

Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.

Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)

You might be interested in
Implementations <br> in c++ programming when finding lcm and gcd in c++​
vazorg [7]

Answer:

#include<iostream>

using namespace std;

int lcm(int m, int n) {

  int a;

  a = (m > n) ? m: n;

  while (true) {

     if (a % m == 0 && a % n == 0)

        return a;

        ++a;

  }

}

int gcd(int m, int n) {

  int r = 0, a, b;

  a = (m > n) ? m : n;

  b = (m < n) ? m : n;

  r = b;

  while (a % b != 0) {

     r = a % b;

     a = b;

     b = r;

  }

  return r;

}

int main(int argc, char **argv) {

  cout << "Enter the two numbers: ";

  int m, n;

  cin >> m >> n;

  cout << "The LCM of two numbers is: " << lcm(m, n) << endl;

  cout << "The GCD of two numbers is: " << gcd(m, n) << endl;  

  return 0;

}

Explanation:

7 0
3 years ago
In Java, a char variable is capable of storing any Unicode character. Write a statement that assigns the Greek letter ^ to a cha
miv72 [106K]

Answer:

public class Main

{

public static void main(String[] args) {

    char greekLetter = '^';

    System.out.println(greekLetter);

}

}

Explanation:

Create a char variable called greekLetter and set it to the ^

Print the greekLetter to the screen

7 0
3 years ago
How many times is the second for loop going to loop in this block of code? Write your answer in numeric form in the box provided
pantera1 [17]

Explanation:

The second for loop does 1 of 4 iterations for every 1 of 5 iterations of the parent loop. meaning it is 4 x 5 which is 20.

8 0
2 years ago
Which technology concept uses computer resources from multiple locations to solve a common problem?
kramer

Answer: Sounds like you are talking about “Distributed memory systems” which use multiple computers to solve a common problem, with computation distributed among the connected computers (nodes) and using message-passing to communicate between the nodes.

8 0
3 years ago
Describe how you can use JavaScript to simulate the behavior of the placeholder attribute in older browsers
kirza4 [7]

JavaScript can be used to simulate the behavior of the placeholder attribute in older browsers by using the placeholder attribute which add a placeholder text as a default value and using a different color to differentiate from a color previously entered.

<h3>How are behavior simulated?</h3>

Normally, a user can simulate the behavior of placeholder text in older browsers by setting the value of the value property.

In conclusion, the JavaScript can be used to simulate the behavior of the placeholder attribute in older browsers by using the placeholder attribute which add a placeholder text as a default value and using a different color to differentiate from a color previously entered.

Raed more about JavaScript

<em>brainly.com/question/16698901</em>

6 0
2 years ago
Other questions:
  • 15. The text of a desktop publishing document is often created using
    6·2 answers
  • Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
    12·1 answer
  • Preesure is drived quantity? why​
    15·2 answers
  • Which of the following commands would I use to begin a new presentation?
    14·1 answer
  • What is an online recommendation engine?
    12·1 answer
  • With a DUI charge on a driver’s record ______________.
    10·1 answer
  • Satellite images are based on data obtained by ____________ (gps/landsat) satellites.
    5·1 answer
  • Which feature of spreadsheet software will make it easier for you to find the average number of calls made per hour for each emp
    15·1 answer
  • Advantages of Linux include_____.
    6·1 answer
  • When a computer is infected by a virus, _______.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!