1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
15

Computer security:

Computers and Technology
1 answer:
Monica [59]3 years ago
7 0

Answer:

A) Direct

Explanation:

if u want to be very specific on what u need to get into then u need to be direct on what u are getting into.

You might be interested in
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
kipiarov [429]

Answer:

D. Hybrid

Explanation:

Hybrid attack is a dictionary attack combined with a brute Force attack, alter the dictionary word by adding numbers at the end of the password, spelling the word backward and slightly misspelling or adding special characters to the word.

Brute Force attack is a password hacking technique that continuously input various values to crack or guess a correct password value.

4 0
4 years ago
Read 2 more answers
Evaluate the expression. Be sure to list a value of appropriate type (e.g., 7.0 rather than 7 for a double, Strings in quotes).
Mashutka [201]
<h2>Answer:</h2>

14.0

<h2>Explanation:</h2>

Using the level of precedence in Java,

From left to right;

(i) the first division operation will be done.

(ii)followed by the second division operation.

(iii)followed by the first multiplication operation.

(iv)followed by the third division operation.

(v)followed by the second multiplication operation.

(vi) followed by the first addition operation.

(vii)lastly followed by the second addition operation.

=================================================

Taking the steps above one after the other;

<em>(i) the first division operation will be done (i.e 19 / 2)</em>

=> Integer division in Java gives an integer result. Therefore, 19 / 2 = 9.5 will give 9.

So,

=><em> </em><u>19 / 2</u> / 2.0 + 2.5 * 6 / 2 + 0.5 * 4

=> 9 / 2.0 + 2.5 * 6 / 2 + 0.5 * 4

<em>(ii)followed by the second division operation. (i.e 9 / 2.0)</em>

=> From the result from step (i), the second division operation is now 9 / 2.0.

=> 9 / 2.0 = 4.5

So,

=> <u>9 / 2.0</u> + 2.5 * 6 / 2 + 0.5 * 4

=> 4.5 + 2.5 * 6 / 2 + 0.5 * 4

<em>(iii)followed by the first multiplication operation. (i.e 2.5 * 6)</em>

=> The first multiplication operation is given by 2.5 * 6

=> 2.5 * 6 = 15.0

So,

=> 4.5 + <u>2.5 * 6</u> / 2 + 0.5 * 4

=> 4.5 + 15.0 / 2 + 0.5 * 4

<em>(iv)followed by the third division operation. (i.e 15.0 / 2)</em>

=> The third division operation is given by 15.0 / 2

=> 15.0 / 2 = 7.5

So,

=> 4.5 + <u>15.0 / 2</u> + 0.5 * 4

=> 4.5 + 7.5 + 0.5 * 4

<em>(v)followed by the second multiplication operation. (i.e 0.5 * 4)</em>

=> The second multiplication operation is given by 0.5 * 4

=> 0.5 * 4 = 2.0

So,

=> 4.5 + 7.5 + <u>0.5 * 4</u>

=> 4.5 + 7.5 + 2.0

<em>(vi) followed by the first addition operation. (i.e 4.5 + 7.5)</em>

=> The first addition operation is given by 4.5 + 7.5

=> 4.5 + 7.5 = 12.0

So,

=> <u>4.5 + 7.5</u> + 2.0

=> 12.0 + 2.0

<em>(vii) lastly followed by the second addition operation. (i.e 12.0 + 2.0)</em>

=> The second addition operation is given by 12.0 + 2.0

=> 12.0 + 2.0 = 14.0

So,

=> <u>12.0 + 2.0</u>

=> 14.0

<em>Therefore, 19 / 2 / 2.0 + 2.5 * 6 / 2 + 0.5 * 4 = 14.0</em>

<h2>Note:</h2>

In Java, the order of precedence for arithmetic operators is;

=> /, * and %

=> followed by + and -

6 0
3 years ago
Which goal of design theory can be described as the proper distribution
muminat
The answer is balance
7 0
3 years ago
In Windows Server 2016, what must be running to allow you to manage a server remotely with PowerShell?
Allisa [31]

Answer:

WinRM

Explanation:

WinRM is Microsoft's implementation of WS-Management in Windows which allows systems to access or exchange management information across a common network.

1. Starts the WinRM service

2. Sets the WinRM service to automatically start during the next boot of computer system

3. Enables all session configurations

4. Changes the security descriptor of all session configurations to allows remote access

5. Enables a firewall exception for WS-management

6 0
3 years ago
Random.choice will choose a number between 1 and 100. True False​
DaniilM [7]

Answer: False.

Explanation: Random.choice can choose between any 2 numbers.

6 0
3 years ago
Other questions:
  • A computer with a domain name is called a
    8·2 answers
  • A polyalphabetic cipher uses many ___
    6·1 answer
  • The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the
    5·1 answer
  • Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 3 8 then the outp
    12·1 answer
  • arlos, an algebra teacher, is creating a series of PowerPoint presentations to use during class lectures. After writing, formatt
    12·2 answers
  • 9. Differentiate between bolding and highlighting<br>text.<br>(2 marks)​
    15·2 answers
  • Write a program to enter a number and test if it is greater than 45.6. If the number entered is greater than 45.6, the program n
    8·1 answer
  • Define a class named person that contains two instance variables of type string that stores the first name and last name of a pe
    14·1 answer
  • A presentation software that is used to organize and present pertinent information using graphics, word processing, outlining, d
    12·1 answer
  • What is the following file format called? inv_nbr, inv_name, inv_cost 876521,battery,45.00
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!