1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastaziya [24]
4 years ago
13

Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?

Computers and Technology
1 answer:
fredd [130]4 years ago
6 0

Answer:

d) buffer overflow

Explanation:

When buffer overflow happens, data gets overwritten by caller data that is not supposed to be overwritten.

If the caller data is carefully crafter instruction code, this would be a way to execute malicious code.

You might be interested in
Truck drivers probably can't see your vehicle if ______________.
Arada [10]
<h2>Answer:</h2>

Truck drivers probably can't see your vehicle if you cannot see them in their side mirror

<h2>Explanation:</h2>

In driving terminology there is a term called the bind spot. Blind spot is the area where the driver is not able to see the vehicle behind him and this area is present just behind the truck and very close to the gates of the car. Since trucks do not have the rare mirror therefore if a car is present in their blind spot they wont be able to see it. The driver behind the truck can spot it if he does not see the truck driver in the side mirror of the truck.

5 0
3 years ago
Read 2 more answers
Can someone please help me! It’s due Thursday!
Eva8 [605]

Answer:

if the input is zero the out put is 1

Explanation:

because if you think about it if the input was 1 the output would be zero

7 0
2 years ago
Lawanda starts a new job today at a company that delivers thousands of packages each day. Identify three ways in which Lawanda's
jek_recluse [69]

Answer:

use your own opinion

Explanation:

7 0
4 years ago
What is peopleware?<br>need help​
Oksana_A [137]

Answer:

Peopleware is a term used to refer to one of the three core aspects of computer technology, the other two being hardware and software.

3 0
3 years ago
What does the motherboard do
almond37 [142]

Answer:

It Connects all the Other Components. Shows how different controllers facilitate different components. ...

Handles Synchronization of Various Tasks. Located on the motherboard is a tiny quartz crystal. ...

Contain the BIOS Chip. This motherboard has 2 BIOS chips. ...

Contains the CMOS Battery and Chip. ...

Handles Hardware Expansion. ...

Controls Power Supply to Components.

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • The main differences between laptops and desktop computers other than size and portability.
    14·1 answer
  • Queue is the LIFO structure.<br><br> o True<br><br> o False
    8·1 answer
  • Paulene is using this table in Word,and she started with the cursor in the box that read “Flavor”. she then hits Alt+End,The the
    7·1 answer
  • Effective feedback should focus on the behavior, not the person.<br><br> True<br> False
    9·2 answers
  • 3. Before you get ready to go diving, you want to explore the area. You see a small snowpack across a small bridge, a short walk
    11·1 answer
  • What conclusion did Freud reach when attempting to understand the connection between psychological and physical problems?
    12·1 answer
  • In the Advent of computer technologies and it's applications, to what extent these technologies have influenced the world.
    11·1 answer
  • Describe two circumstances where access services might get implemented by organizations please.​
    9·1 answer
  • HELPPP
    5·1 answer
  • Write a recursive decent algorithm for a java while statement, a Javas if statement , an logical/mathematical expression based o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!