1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
3 years ago
9

Please explain why an operating system makes a great attack target.​

Computers and Technology
1 answer:
BartSMP [9]3 years ago
8 0
The operating system is the fundamental controller of all system resources
Operating system popularity is one major reason why hackers attack
Window is a big target because it powers the vast majority of the world’s desktop computers and laptops.
To steal personal and protected health information
To steal user credit card numbers and other financial data
To harm the system or disrupt business operations of any organization
To gain competitive edge over opponents
To spoil the reputation of an organization

If you want answer to question 19, put a Thanks and comment that you want answer to question 19
You might be interested in
A navigation device that transfers packets of data between two or more networks is called a _______
Ira Lisetskai [31]
<span>A navigation device that transfers packets of data between two or more networks is called a Router.</span>
5 0
4 years ago
Which of the following is not anadvantage of simulation?
kari74 [83]

Answer: Ability to derive optimal solutions

Explanation:

One of the main disadvantages of simulation is ability to derive optimal solutions. As, the solution does not required to have a closed form and  procedure does not require any weighting and the hard constraint.  Stimulation outcome are not optimal to induced specific response because of the lack of quantitative models.

3 0
3 years ago
Write the following function without using the C++ string class or any functions in the standard library, including strlen(). Yo
dolphi86 [110]

Answer:

The function in C++ is as follows

int chkInd(string str1, string str2){    

int lenstr1=0;

while(str1[lenstr1] != '\0'){  lenstr1++;  }

int index = 0; int retIndex=0;

for(int i=lenstr1-1;i>=0; i--){

   while (str2[index] != '\0'){

       if (str1[i] == str2[index]){

           retIndex=1;

           break;         }

       else{   retIndex=0;      }

  index++;    }

  if (retIndex == 0){   return i;   }else{return -1;}}

}

Explanation:

This defines the function

int chkInd(string str1, string str2){    

First, the length of str1 is initialized to 0

int lenstr1=0;

The following loop then calculates the length of str1

while(str1[lenstr1] != '\0'){  lenstr1++;  }

This initializes the current index and the returned index to 0

int index = 0; int retIndex=0;

This iterates through str1

for(int i=lenstr1-1;i>=0; i--){

This loop is repeated while there are characters in str2

   while (str2[index] != '\0'){

If current element of str2 and str1 are the same

       if (str1[i] == str2[index]){

Set the returned index to 1

           retIndex=1;

Then exit the loop

           break;         }

If otherwise, set the returned index to 0

       else{   retIndex=0;      }

Increase index by 1

  index++;    }

This returns the calculated returned index; if no matching is found, it returns -1

  if (retIndex == 0){   return i;   }else{return -1;}}

}

4 0
3 years ago
The text size can be found in ?
Greeley [361]

Answer:

Microsoft word.

Explanation:

i am very sorry if the answer is wrong

3 0
3 years ago
Solve<br><img src="https://tex.z-dn.net/?f=%20%5Csqrt%7B3%20%2B%20%20%5Csqrt%7B3x%20%2B%202%7D%20%7D%20%20%3D%202" id="TexFormul
asambeis [7]
Here you go, let me know if it’s not clear.

5 0
3 years ago
Other questions:
  • Implement the function unique that takes as a parameter a two-dimensional list and returns a one-dimensional list containing all
    6·1 answer
  • Which other capabilities do many wireless access points have? Choose two answers.
    9·1 answer
  • 19. Squares. Write a program class named SquareDisplay that asks the user for a positive integer no greater than 15. The program
    11·1 answer
  • In molecular biology the "alphabet" of genes consists of four chemicals (called nucleotides) represented by the letters A C G T.
    12·2 answers
  • When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmis
    14·1 answer
  • A(n) ___________________ process is initiated by individuals who are subjected to forensic techniques with the intention of hidi
    6·1 answer
  • Which type of memory helps in reading as well as writing data? With the help of , a computer can read as well as write or modify
    11·3 answers
  • A general-use dimmer switch is required to be counted as ? where installed in a single-gang box on a circuit wired with 12 awg c
    15·1 answer
  • 1. We want to add a button to the tally counter in Section 9.2 that allows an operator to undo an accidental button click. Provi
    8·1 answer
  • Big data are used to _____. Select 3 options.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!