1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
8

Host computer is:

Computers and Technology
1 answer:
N76 [4]3 years ago
8 0

Answer:

A

Explanation:

You might be interested in
1. Mobile devices have a _________ viewport that displays a web page content that fits within a mobile screen.
ale4655 [162]

Answer:

1.Mobile devices have a meta tag viewport that displays a web page content that fits within a mobile screen.

2.  A common technique for mobile websites is to hide navigation menus but to indicate their presence with a(n) hamburger, which is a symbol usually represented as three horizontal lines.​

Explanation:

  • Viewport is defined as a display screen size for websites. Before mobile phones and tablets all the websites were created with fixed  dimensions for screen display. But with the need of android, they were upgraded so that the websites fit themselves automatically on to the screen using a <meta> tag viewport.
  • Hamburger is a icon that leads to the list of different functions of a website or app. They mostly are used in android systems to give a compact view so that navigation menus could be hidden. The icon has a symbol of three horizontal lines one above the other.

I hope it will help you!

8 0
3 years ago
Again, consider what you believe to be the goal of performing a penetration test. Why would you worry about doing any privilege
Strike441 [17]

Answer:

Penetration monitoring is conducted based on the vulnerability evaluation (Were a susceptibility evaluated and mentioned).

Explanation:

Penetration Test

  • Penetration testing is carried out from both within (the network or application) as well as outside that aims to gain access to the system to evaluate if any suspicious activity or improper behavior is likely within the device.
  • When there are some other potential security vulnerabilities, they are all found in the integration check that involves vulnerability assessment for frameworks and checking for network management.
  • Automation of penetration testing is used to make it work better.
  • Penetration monitoring deals with the same risk evaluation correlated with a disadvantage.

Privilege escalation

  • They need to think about known vulnerabilities as the system for network management works conditional on the privilege rates. Such that, increasing user has an article has highlighted and the consumer is only allowed to control or use the resources that should be used appropriately, depending on the level of privilege.
  • If he gets elevated access then it will be a failure to have access control mechanism.

Leaving backdoors

  • The creator uses backdoors to test the system's functionality during the designing processes.
  • The loophole can be a workaround overriding the identification for all users, or a default password.
  • They would need to worry about leaving the backdoor because the backdoor.which is performed either deliberately or involuntarily will circumvent the entire security mechanism.
  • During the intrusion testing process, the both privilege increase and the escape from the gateway can be discovered due to the research being done both inside and outside the device.
  • The tester's testing phase acts as various users so that any destabilization of access may be found.
  • The tester will use all numerous methods to supersede the technique of official approval, but when there are certain backdoors, maybe he can start by pointing that out.

6 0
4 years ago
You just read a restaurant review on the internet of the newest restaurant in town. The writer of the article said the food was
Marizza181 [45]
A. The restaurant review contains data but is not data itself. 
I'm sorry if that's wrong, but that seems right to me. 

6 0
3 years ago
Which of the following tasks are suitable for creating an algorithm? Choose all that apply
Hatshy [7]

A tasks are suitable for creating an algorithm are:

  • giving directions to a location.
  • solving a math problem.
  • tracking money in a bank account.
  • tracking the number of items in inventory.

<h3>What is algorithm?</h3>

An algorithm is known to be a form of a procedure that is often employed in the act of solving a problem or carrying out a computation.

Note that in the case above, A tasks are suitable for creating an algorithm are:

  • giving directions to a location.
  • solving a math problem.
  • tracking money in a bank account.
  • tracking the number of items in inventory.

See options below

giving directions to a location

saving time writing a computer program

solving a math problem

tracking money in a bank account

tracking the number of items in inventory

Learn more about algorithm from

brainly.com/question/24953880

#SPJ1

8 0
2 years ago
How do you think weather can affect sailing?<br><br>What would be good sailing weather?​
N76 [4]

Answer:

Weather can affect sailing because if its raining it can sink it also if theres a storm. Good weather that would be good to sail in is if its a little windy because if its just sunny and not windy it wont move. ps you can copy it if u want idc

6 0
3 years ago
Other questions:
  • Pls help me!!!!!!!!!!!!!
    5·2 answers
  • Is your florida learners license number the same as the actual license number?
    14·2 answers
  • In the Mouse Properties window, you can?
    8·1 answer
  • Does clicking ads and pop ups like the one shown in this image could expose your computer to malware?
    15·1 answer
  • Where can i watch bnha movie 2 online for free, with no sign up or pay?
    6·2 answers
  • PLZZZZ help will give brainlest
    5·1 answer
  • How much would it cost to get the screen replaced on a Moto G7?
    10·1 answer
  • When using the Photo Album dialog box, a picture
    13·2 answers
  • Which three statements are true of lossless compression?
    6·1 answer
  • DEFINE Problem:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!