1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
3 years ago
9

Please explain why an operating system makes a great attack target.​

Computers and Technology
1 answer:
BartSMP [9]3 years ago
8 0
The operating system is the fundamental controller of all system resources
Operating system popularity is one major reason why hackers attack
Window is a big target because it powers the vast majority of the world’s desktop computers and laptops.
To steal personal and protected health information
To steal user credit card numbers and other financial data
To harm the system or disrupt business operations of any organization
To gain competitive edge over opponents
To spoil the reputation of an organization

If you want answer to question 19, put a Thanks and comment that you want answer to question 19
You might be interested in
Can you guys help me with this coding assignments?
kicyunya [14]

Explanation:

x ==50

while x< 100;

x -= 1

8 0
3 years ago
A network administrator enters the command ipv6 router ospf 110 in global configuration mode. What is the result of this command
Zepler [3.9K]

Answer:

The OSPFv3 AS number will be assigned an ID of 110

Explanation:

If we don't have ipv4 addressing previously, we are going to assign the router-id manually.

We are going to receive a message about the assignation manually.

We can assign a router-id with the next line:

#router-id 1.1.1.1

If we already have the ipv4 addressing, the router going to assign the router-id automatically.

4 0
4 years ago
Which character is used to begin a comment?
Aloiza [94]
# is used to begin a comment.
8 0
3 years ago
Core component of the linux operating system is the linux kernel. if you were a linux systems administrator for a company, when
iragen [17]
You would only need to upgrade your kernel via linux if u were a mlg hacker and knoushs how to speakith the englith
5 0
3 years ago
11. What are the two DFS models?12.When you move a file from the Spreadsheets folder to the Corp Documents folder on a Windows S
Vesnalui [34]

Answer/Explanation:

11. Standalone and Domain-based models

12. The moved file takes with it the permission it had in the Spreadsheets folder.

Cheers.

7 0
3 years ago
Other questions:
  • List seven basic internal components found in a computer tower
    13·1 answer
  • Which of the following behaviors is considered ethical? copying another user’s password without permission hacking software to i
    9·2 answers
  • Match each scenario to the absolute value expression that describes it. 1. the distance moved when going backwards five spaces i
    13·2 answers
  • An array is stored in contiguous memory locations. You access the individual array value by using the array name followed by the
    6·1 answer
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    10·1 answer
  • Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit
    7·1 answer
  • What are the two ways to print a document?
    11·1 answer
  • Easy upgrade from windows xp to windows 7
    7·1 answer
  • A student is conducting an experiment in which he adds an inhibitor to an enzyme-catalyzed reaction that contains alkaline phosp
    14·1 answer
  • Which term refers to a shorthand method for identifying network and host bits in an ip address?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!