1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andru [333]
4 years ago
11

What do you call when a hacker users multiple guest computers to crack a password?

Computers and Technology
1 answer:
azamat4 years ago
6 0

Answer: Botnet

Explanation:

Botnet is the process when a hacker user uses multiple guest computer to crack a password. Basically, hackers use botnet for performing the distributed denial of services attack in the network.

It also steal the data and allowed attacker to approach its connection and access its device.

Botnet word is the combination of robot and network and botnet can be controlled by using the command and control software.

You might be interested in
Which of the following is NOT true about a USB stick?
SVEN [57.7K]

Answer:

add more context.

Explanation:

add to the question.

8 0
2 years ago
Read 2 more answers
One of the difficult things about working in game design is that while there are many different roles, most of them only match o
Papessa [141]

Answer:

it's false

Explanation:

they don't match to personalities

6 0
3 years ago
In C++ please.
natali 33 [55]

Answer:

Following are the code to this question:

#include <iostream>//defining header file  

using namespace std;    

bool rightTriangle(int s1,int s2,int s3) //defining method rightTriangle  

{

int t1,t2,t3; //defining integer variables

t1 = s1*s1; // multiplying side value and store it into declaring integer  variables

t2 = s2*s2; // multiplying side value and store it into declaring integer variables

t3 = s3*s3;  // multiplying side value and store it into declaring integer variables

if(t3 == t1+t2)//use if block to check Pythagoras theorem

{

return true; //return true

}

else //else block

{

return false; //return false

}

}

bool equalNums(int n1,int n2,int n3,int n4) //defining method equalNums  

{

if(n1==n3 && n2==n4) //defining if block that checks  

{

return true;//return value true  

}

else //else block  

{

return false; //return value false

}

}

int main()//defining main method

{  

int t1=3,t2=4,t3=5,t11=3,t12=4,t13=5; //declaring integer varibles and assign value  

int check=0;   //defining integer varible check that checks values

if(rightTriangle(t1,t2,t3)&&rightTriangle(t11,t12,t13)) //defining codition to check value using and gate

{

if(equalNums(t1,t3,t11,t13) || equalNums(t2,t3,t12,t13)) // defining conditions to check value using or gate

check = 1; //if both conditions are true

}

if(check==1) //if block to check value is equal to 1

{

cout << "Right Congruent Triangles"; //print message

}

else//else block

{

   cout << "Not Right Congruent Triangles";//print message

}

}

Output:

Right Congruent Triangles

Explanation:

  • In the above-given code, a boolean method "rightTriangle" is declared, in which it accepts three integer variable "s1, s2, and s3" as a parameter, inside the method three another variable "t1, t2, and t3" is declared, in which parameter stores its square value.
  • In the next line, a conditional statement is declared that checks the "Pythagoras theorem" value and returns its value.  
  • In the next step, another method "equalNums" is declared, that accepts four integer parameter "n1, n2, n3, and n4", inside the method a conditional statement is used that uses an operator to check n1, n3, and n2, n4 value if it is true it will return true value else it will return false.
  • Inside the main method, integer variable and a check variable is defined that uses the if block to passes the value into the method and checks its return value is equal if all the value is true it will print the message "Right Congruent Triangles" else "Not Right Congruent Triangles".
7 0
3 years ago
How long can a lightning last
Maru [420]
A lightning can last 30 microseconds.
8 0
4 years ago
Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that comp
zepelin [54]

Answer:

Option C.

Explanation:

The company is witnessing a spike in incidents involving malware. The boss is looking for advice on the best way to check that corporate-owned desktops are up-to-date regarding security updates, anti-malware standards and software or application updates. The boss is also worried that somehow the staff-owned gadgets that link to the corporate Local area network use the same level of protection as the devices in the corporation.

So, the user implements security and resources from endpoint management system appliance.

7 0
3 years ago
Other questions:
  • Consider an SRS for a system to manage grades at a typical University:
    14·1 answer
  • Your browsing the Internet and realize your browser is not responding which of the following will allow you to immediately exit
    14·2 answers
  • Discuss four ways you will use to reach all pupils who are living at a disadvantaged area.
    14·1 answer
  • If you’re the victim of cyber bullying behavior, besides contacting your teacher or the school, where else can you go to find in
    13·1 answer
  • Create class SavingsAccount. Use a static variable annualInterestRate to store the annual interest rate for all account holders.
    11·1 answer
  • 1. Write a programme to print the Fees Receipt of English High School Required Inputs Name of the Student Monthly Tuition Fees M
    10·1 answer
  • Write the program to accept the radius of circle and find its diameter coding
    11·1 answer
  • Which is the first computer brought in nepal for the census of 2028 B.S​
    6·1 answer
  • Photographs, illustrations, and videos are increasingly created an and viewed in digital formats. True or False​
    5·2 answers
  • Match each item with a statement below.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!