1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
3 years ago
5

Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network serv

ices, and/or sends attack instructions without entering the office or organization that owns the network. True or False True False
Computers and Technology
1 answer:
Varvara68 [4.7K]3 years ago
5 0

Answer: True

Explanation:

An hacking activity usually deal with the unauthorized access to ones system.

Similarly this technique of Drive by hacking by which the attacker release wireless networks. Then a computer user of an organization finding a wireless network tries to connect to the open network and it is this process when the computer or system user falls easy prey to the hacker. The attacker uses the wireless network as a medium to  intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

It is often accompanied with the SqL injection packets into the network.

This attack is also popular by the name hotspot attack.

You might be interested in
Which one of the following oscilloscope controls is used to move the trace up and down the screen vertically
kakasveta [241]
B. is the answer to this question
3 0
3 years ago
A production house needs an operating system that captures, saves, and generates information within a specific time. Which type
bearhunter [10]
Windows and linux are best in my opinion! Linux is not used by many people but a lot of apps can't be used for linux so best is to use windows. But Mac is not bad too. Hope I helped and have a nice day!
4 0
3 years ago
Which of the following best describes cost-benefit analysis?
d1i1m1o1n [39]

Answer:

A

Explanation:

7 0
3 years ago
Compare the elements of the basic Software Development Life Cycle with 2 other models. How are they similar? How are they differ
Artemon [7]

Answer:

Explanation:

One of the basic notions of the software development process is SDLC models which stands for Software Development Life Cycle models. SDLC – is a continuous process, which starts from the moment, when it’s made a decision to launch the project, and it ends at the moment of its full remove from the exploitation. There is no one single SDLC model. They are divided into main groups, each with its features and weaknesses. The most used, popular and important SDLC models are given below:

1. Waterfall model

2. Iterative model

3. Spiral model

4. V-shaped model

5. Agile model

Stage 1. Planning and requirement analysis

Each software development life cycle model starts with the analysis, in which the stakeholders of the process discuss the requirements for the final product.

Stage 2. Designing project architecture

At the second phase of the software development life cycle, the developers are actually designing the architecture. All the different technical questions that may appear on this stage are discussed by all the stakeholders, including the customer.  

Stage 3. Development and programming

After the requirements approved, the process goes to the next stage – actual development. Programmers start here with the source code writing while keeping in mind previously defined requirements. The programming by itself assumes four stages

• Algorithm development

• Source code writing

• Compilation

• Testing and debugging

Stage 4. Testing

The testing phase includes the debugging process. All the code flaws missed during the development are detected here, documented, and passed back to the developers to fix.  

Stage 5. Deployment

When the program is finalized and has no critical issues – it is time to launch it for the end users.  

SDLC MODELS

Waterfall – is a cascade SDLC model, in which development process looks like the flow, moving step by step through the phases of analysis, projecting, realization, testing, implementation, and support. This SDLC model includes gradual execution of every stage completely. This process is strictly documented and predefined with features expected to every phase of this software development life cycle model.

ADVANTAGES  

Simple to use and understand

DISADVANTAGES

The software is ready only after the last stage is over

ADVANTAGES

Management simplicity thanks to its rigidity: every phase has a defined result and process review

DISADVANTAGES

High risks and uncertainty

Iterative SDLC Model

The Iterative SDLC model does not need the full list of requirements before the project starts. The development process may start with the requirements to the functional part, which can be expanded later.  

ADVANTAGES                                        

Some functions can be quickly be developed at the beginning of the development lifecycle

DISADVANTAGES

Iterative model requires more resources than the waterfall model

The paralleled development can be applied Constant management is required

Spiral SDLC Model

Spiral model – is SDLC model, which combines architecture and prototyping by stages. It is a combination of the Iterative and Waterfall SDLC models with the significant accent on the risk analysis.

4 0
2 years ago
HELP ASAP 40 POINTS & BRAINLIST (ONLY RIGHT ANSWERS) Enrique is trying to decide which college is the best for his career ch
erma4kov [3.2K]

b.Enrique will probably have to pay a high tuition if he doesn’t earn a scholarship or grant.


7 0
3 years ago
Read 2 more answers
Other questions:
  • ​ If a class is reusable, that is to say that it can be used in several different applications, then it has been designed using
    5·1 answer
  • You told your sister about creating bullet points with Word 2013. She calls you and says that she created a list of six bullet p
    11·1 answer
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    11·1 answer
  • Some of the users in your company create and delete so many files that they have problems with fragmented disks. Which of the fo
    5·1 answer
  • To achieve asymptotically optimal performance, a skip list must use promotion probability . true or false and
    14·1 answer
  • Define time management and give two activities that you can do to help manage your tasks, homework, or projects better.
    12·1 answer
  • Complete the statement using the correct term.
    6·1 answer
  • The sequence's insert member function normally puts a new item before the current item. What should insert do if there is no cur
    9·1 answer
  • You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email say
    8·1 answer
  • I WILL MARK BRAINLEST
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!