1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrey2020 [161]
3 years ago
11

How do you level up on this thing?

Computers and Technology
1 answer:
Gala2k [10]3 years ago
6 0
You just have to answer a lot of questions, and get voted "Brainliest" by the person who posts the question
You might be interested in
Redesign the cover of science textbook using at least two different graphics​
Tanya [424]

Answer:

what design do you want, also what design am i redesigning.

8 0
2 years ago
from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing
Brums [2.3K]
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
4 0
3 years ago
Which of the following is an accurate statement? When the LOWER function is used in a SELECT clause, it will automatically store
quester [9]

Answer:

Hi there! The answer is C:

Explanation:

The scope of the LOWER function is limited to the select clause it is being used in. Outside of the select statement, the column will be returned as it is currently present in the database. Using the LOWER function will not automatically store data in lower case letters in the database tables. As an exercise, try creating a simple database table called "Employees" with columns "id" and "name". Then input a row using an insert statement with id as 1 and name as "BLAH". Try using the select statement with LOWER function and then without the LOWER statement.

5 0
3 years ago
You are the CEO of a large tech company and have just received an angry email that looks like it came from one of your biggest c
sergejj [24]

Answer: as a whale attack

Explanation:

A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.

Based on the explanation above, the attack called into is a whale attack.

4 0
3 years ago
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
Other questions:
  • Which are the best examples of costs that should be considered when creating a project budget?
    11·1 answer
  • In your own words, describe what Internet Protocols are. Why is it important to have agreed upon protocols?
    6·1 answer
  • Frank develops a questionnaire for his study on Internet dating. One of his questions asks, "How do you feel about Internet dati
    14·2 answers
  • Please help! would appreciate it very much!
    13·1 answer
  • How we know that how many domain exist in window server 2012?
    14·1 answer
  • My question is do you learn how to do a voice over in technology?
    14·1 answer
  • 2.
    11·1 answer
  • Anyone know how to delete it in my laptop
    10·1 answer
  • Fix the code :)
    10·1 answer
  • What are the challenges of Cyber Law???? Needed ASAP ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!