1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
2 years ago
9

Please explain why an operating system makes a great attack target.​

Computers and Technology
1 answer:
BartSMP [9]2 years ago
8 0
The operating system is the fundamental controller of all system resources
Operating system popularity is one major reason why hackers attack
Window is a big target because it powers the vast majority of the world’s desktop computers and laptops.
To steal personal and protected health information
To steal user credit card numbers and other financial data
To harm the system or disrupt business operations of any organization
To gain competitive edge over opponents
To spoil the reputation of an organization

If you want answer to question 19, put a Thanks and comment that you want answer to question 19
You might be interested in
This information is stored in every IP packet to make sure that the packet is eventually discarded if it cannot find the address
Andreas93 [3]

Answer:

TTL

Explanation:

TTL means time -to- live field is a counter that is designed to keep packets from circulating indefinitely in the network case forwarding tables accidentally create cycles. An IP datagram is typically initialized with a TTL of 60 or 64 and the TTL is decremented by one each time it enters a router. If the TTL reaches zero, the router will discard the packet. It is one of the components of the IP datagram

6 0
3 years ago
A red bullet in a microflow indicates: a. that the microflow has been completed b. that the microflow contains errors c. that on
Viefleur [7K]

Answer:

d. an end point of the microflow mendix

Explanation:

In Computer programming, Microflows can be defined as a visual representation of textual program codes based on the Business Process Model and Notation (BPMN), it enables users to express the logic of application.

It is capable of performing various actions such as creating and updating objects, showing pages and making choices.

Microflows cannot be used in offline apps as it basically runs in the runtime server.

A red bullet in a microflow indicates an end point of the microflow mendix.

8 0
2 years ago
What might happen if Python code is not in the correct order? The computer will fix the steps automatically. The computer will f
Vesna [10]

Answer:

The computer will follow the steps, but the program might not work.

Explanation:

4 0
3 years ago
Read 2 more answers
How do power strips work?
lapo4ka [179]
What are power strips please
3 0
3 years ago
Zahid needs to ensure that the text flows around an image instead of the image being placed on a separate line as the text. Whic
erica [24]

Answer:

I believe the answer is He can't do this on the layout dialog box

Explanation:

You use the format tab for text wrapping.

( Sorry if I'm wrong )

7 0
2 years ago
Read 2 more answers
Other questions:
  • How do I download the Microsoft word on my Hp probook
    8·2 answers
  • A custom information field that helps users to find a specific document is called
    8·2 answers
  • Write a program that reads a floating-point number from the user and prints "zero", "positive" or "negative"
    13·1 answer
  • 8.5 question 2 edhesive
    11·1 answer
  • no one can succeed in his or her career without relying on others for help or opportunities. It’s best, though,
    13·1 answer
  • A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it ma
    11·1 answer
  • What educational site could I make a screen capture tutorial on? I need ideas for a school project.
    5·1 answer
  • Write the application of computer in education and communication​
    9·1 answer
  • Here is the model I’m working on and can’t figure it out this model shows the basic process of making a protein what are the str
    14·2 answers
  • The owner creator of a folder/file object has complete access to the object even when no user or group is assigned any access to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!