1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
5

Question 4 of 5

Computers and Technology
2 answers:
ikadub [295]3 years ago
8 0

Answer:

A. Lifelong Learning.

Ostrovityanka [42]3 years ago
6 0
A. Lifelong Learning.
You might be interested in
Look plz help :))))))))))))))))))))
andrey2020 [161]

Answer:

false

Explanation:the answer is false

6 0
3 years ago
A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached
Ivan

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

5 0
3 years ago
What special responsibilities do computer professionals have with respect to understanding and protecting the privacy rights of
Lerok [7]

Explanation:

There are ethical responsibilities that must be linked to the use of technological systems by computer professionals in relation to the protection of the privacy rights of their fellow citizens.

Exercising ethical behavior is essential for computing to be used for its central benefits, which is to make life and tasks simpler and more dynamic, and not for technical knowledge about computer science to be used for personal or other benefits. , therefore, it is ideal that there is ethical responsibility for computer professionals so that ethical decisions are taken so that knowledge is used for the benefit of society and not to commit illegal acts.

7 0
3 years ago
Which of these is most likely to contribute to the long term of a local ecosystem?
maria [59]
I would help but you didn’t say what these is
8 0
2 years ago
How do hardware and software work together to allow a user to perform a function?
qaws [65]

Answer:

jointly

Explanation:

Because Hardware and Soft ware have to JOIN together to make something work

I hope i helped!

4 0
3 years ago
Read 2 more answers
Other questions:
  • You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, includi
    7·1 answer
  • Which data type requires the greatest number of bytes in computer memory? A. character B. integer C. single-precision number D.
    14·1 answer
  • The order of precedence determine
    10·1 answer
  • Use of the Internet for recruiting is: a. popular with job seekers, but not recruiters. b. the most commonly used search tactic
    5·1 answer
  • One of the greatest benefits of dual enrollment courses is that students can receive:
    15·2 answers
  • Write a function that receives three StaticArrays where the elements are already i n sorted order and returns a new Static Array
    11·1 answer
  • What social media profession entails determining how and in what way an organization will create and maintain a social media pre
    7·1 answer
  • The picture above is a description of the C code below. Please modify the C below so that it uses FILE HANDLING (fopen, fputs, f
    5·1 answer
  • In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
    14·1 answer
  • Which of these describes a database? Check all of the boxes that apply.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!