1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatiyna
3 years ago
11

. One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t

o:
A.
report which device drivers a computer uses

B.
determine which ports are open on a computer

C.
report the status of individual computer users

D.
determine which operating system is running on a computer
Computers and Technology
1 answer:
Komok [63]3 years ago
3 0

Answer: C)report the status of individual computer users

Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.

Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)

You might be interested in
What is custom software
Kobotan [32]
A custom sofware is a computer program or website written <span>specifically for your company,</span>
4 0
3 years ago
Read 2 more answers
A(n) ____ algorithm is a set of specific, sequential steps that describe in natural language exactly what a computer program mus
Paul [167]
<span>The answer is algorithm, because computer programmers need a programming language that's more similar to their native language. They then write specific steps a computer must take to complete the task at hand. Machine code is not easily memorized and is foreign to most people.</span>
8 0
3 years ago
Zahid needs to ensure that the text flows around an image instead of the image being placed on a separate line as the text. Whic
erica [24]

Answer:

I believe the answer is He can't do this on the layout dialog box

Explanation:

You use the format tab for text wrapping.

( Sorry if I'm wrong )

7 0
3 years ago
Read 2 more answers
The best defense against injection attacks is to
Sergeeva-Olga [200]
The best defense against injection attacks is to develop secure habits and adopt policies and procedures that minimize vulnerabilities. Staying aware of the types of attacks you're vulnerable to because of your programming languages, operating systems and database management systems is critical.
5 0
2 years ago
Suppose Animal is an interface that specifies a single method – speak. Now suppose the Dog class implements the Animal interface
Finger [1]

Answer / Explanation

To properly answer this question, let us define some basic terms within the narrative of the question.

This includes:

Speak Method: This is a type of java script or programming language syntax or method. The speak method usually denoted by the symbol () is a form of of Speech combination or the combination of components of different speech or elements to form a whole speech method. it is an interface that  adds an utterance to the utterance queue and  it will be spoken when any other utterances queued before it have been spoken.

Now, referencing the definition of speak method above and relating to the the options given as an output in the codes written in the answer options,

The answer here is (a) that is it will fail to comply which is equivalent to the option of it resulting to a compile time error.

7 0
3 years ago
Other questions:
  • What kind of firewall can block designated types of traffic based on application data contained within packets?
    7·1 answer
  • Proxy is a network computer that can serve as an intermediary for connecting with other computers.
    13·1 answer
  • Hen using presentation software, what do you do when you "compose a slide"?
    5·1 answer
  • You can avoid culture shock by ____________.
    10·2 answers
  • Which of the following is an anxiety disorder
    5·2 answers
  • If an individual receives 1.8 mGy while standing 4 ft from a source of radiation for 2 minutes, which of the following option(s)
    9·1 answer
  • What does IDLE stand for
    11·2 answers
  • Which media vehicle uses the Dreamweaver software for its design? A(n) "blank" uses the Dreamweaver software for its design.
    8·1 answer
  • if anyone is on a Chromebook, do you ever mean to press backspace, then you accidentally press the power button and think "OH CR
    11·2 answers
  • como la ciencia y tecnologia ayudan a reducir la contaminacion del aire que respiramos? Muestra algunos ejemplos
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!