1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
3 years ago
9

Please explain why an operating system makes a great attack target.​

Computers and Technology
1 answer:
BartSMP [9]3 years ago
8 0
The operating system is the fundamental controller of all system resources
Operating system popularity is one major reason why hackers attack
Window is a big target because it powers the vast majority of the world’s desktop computers and laptops.
To steal personal and protected health information
To steal user credit card numbers and other financial data
To harm the system or disrupt business operations of any organization
To gain competitive edge over opponents
To spoil the reputation of an organization

If you want answer to question 19, put a Thanks and comment that you want answer to question 19
You might be interested in
Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
vfiekz [6]

Answer:

Encrypted message: CPONYIERTN

Explanation:

Message = ENCRYPTION

keyword = ONE

keyword ONE is of length 3 so the rows are of length 3

Permutation is given by the alphabetical order of the letters in the keyword ONE. Here E appears first in alphabet, then comes N and in last comes O so the order would be 321.

Now the message ENCRYPTION is written in tabular form with width of the rows defined by a keyword ONE

O     N     E

3      2      1

E      N     C

R      Y     P

T       I     O

N

Now this message is read by the column in alphabetic order of the keyword ONE.

Since alphabetic order of E is 1 so the column under E is read first which has the letters:

CPO

Then column under N is read which has the letters:

NYI

In the last the column under O is read which has the letters:

ERTN

So the encrypted message is:

CPONYIERTN

6 0
3 years ago
man who is colorblind marries a woman who has normal color vision and is not a carrier of color blindness. If this couple has a
kirill115 [55]

Answer:

Each of their sons has around a 0% chance for being color blind.

they will have normal girls but they will be carriers

Explanation:

Since the man is colour blind and he donates the X- Chromosome that is the carrier to the woman, they will give birth to a daughter who is a carrier but not color blind. If the man donates the Y chromosome, then they will give birth to a normal male child who is not color blind neither is he a carrier

4 0
3 years ago
Choose all of the items that represent functions of the operating system kernel.
babunello [35]

Answer: its all of them

Explanation: I took Assignment over this

6 0
3 years ago
Read 2 more answers
What is the Intranet?<br>​
brilliants [131]

Answer:

a local or restricted communications network, especially a private network created using World Wide Web software.

Explanation:

8 0
3 years ago
An engine you're servicing has electronically controlled cooling fans. Cooling fan 1 doesn't work but cooling fan 2 does. Which
Elanso [62]

It might because of many reasons:

  • Fan 1 is not connected to the Program (via Bluetooth, WIFI, or wired)
  • The code made to make Fan 1 start up has a bug or an error
  • Fan 1 has a hardware problem
  • Fan 1 is out of reach for the electronically controller to reach
  • Fan 1 is not connected to a power supply (tho)

<u><em>sorry if my answers don't help solve your problem </em></u>

4 0
3 years ago
Other questions:
  • How many water bottles must be collected to win?
    8·2 answers
  • Which is most harmful computer virus define​
    15·1 answer
  • rray testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cred
    5·1 answer
  • In an MLA style citation for an image, what information should be listed first? A. The name of the creator B. The title of the i
    8·2 answers
  • Write a function definition for a function which takes one parameter and returns twice that parameter
    12·1 answer
  • What are the words that make up a high-level programming language called?
    6·1 answer
  • AJ created a list, and he needs all of the numbers to be in order. Which Python function will allow him to organize his list num
    5·2 answers
  • Assume that x and y are boolean variables and have been properly initialized. !(x || y) || (x || y) The result of evaluating the
    10·1 answer
  • What kinds of new input devices do you think might be invented in 10, 20, or 50 years? How might those devices change the world?
    9·1 answer
  • What does a hanging indent look like?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!