1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
11

We've managed to get restricted terminal access to a hackers home server which we believe has a secret File

Computers and Technology
2 answers:
daser333 [38]3 years ago
3 0

Answer:

Yes we need to find it and get the secret code hidden within

Explanation:

Normally hackers always keep files unorganized or messy on the files. Main purpose if any outside try to login let them get confused so that hidden code file cannot be founded by outsiders.

 

Moreover, hackers home server will encrypt the secret code hidden so that outside if try to log in even if they find the secret code hidden the end-user has to decrypt and it a tough job to break the code.

If the end user can get the secret code hidden and if it not encrypted then it is good.

andrezito [222]3 years ago
3 0

Answer:

Yes we need to find it and get the secret code hidden within  as you have managed to get restricted terminal access to hackers home server which we believe has a secret file.

You might be interested in
Word wrap is the same as __________ return and means you let the ______________ control when it will go to a new line.
dusya [7]

Word wrap is the same as; Soft Return

Word wrap means that you let the; Computer Control when it will go to a new line

<h3>What is Text Wrapping?</h3>

Text wrapping is simply defined as a process used in MS Word to Wrap a Text around an Image.

Now, the way it is done is by selecting the image you want to wrap text around and then On the Format tab, click the Wrap Text command in the Arrange group, then select the desired text wrapping option to wrap the text.

Finally Word wrap is also same as using soft return and letting the computer control when it goes to the next line.

Read more about text wrapping at; brainly.com/question/5625271

5 0
2 years ago
5 band resistor with two red bands, two gold bands, one purple band?
Mamont248 [21]

According to below picture, two gold bands on a 5 band resistor cannot happen. What is the order of the bands?

8 0
3 years ago
At its time of construction, one of the fastest computers in the world is referred to as a(n) _________________.​
Cerrena [4.2K]
The answer for your problem is "super computer" These types of computers can processes 1 million or more digit numbers in one second. 
4 0
3 years ago
a. The two programs perform the same function. Describe it. b. Which version performs better, and why
Ulleksa [173]

Programs are series of instructions interpreted by a computer

  • The description of the program is to compute the square of the difference between corresponding elements of two arrays
  • The better version of the program is program A.

<h3>How to describe the programs</h3>

From the programs, we have the following highlights

  • The program iterates from 1 to n - 1
  • The iteration calculates the difference between corresponding elements of the arrays
  • The difference is then squared

Hence, the description of the program is to compute the square of the difference between corresponding elements of two arrays

<h3>The better version</h3>

The better version of the program is program A.

This is so, because the program uses fewer instructions for the same task as program B

Read more about programs at:

brainly.com/question/16397886

3 0
3 years ago
1-Which organization produces<br> the NEC?
hammer [34]

Answer.

The National Electrical Code (NEC), or NFPA 70, is a regionally adoptable standard for the safe installation of electrical wiring and equipment in the United States. It is part of the National Fire Code series published by the National Fire Protection Association (NFPA), a private trade association.

Explanation:

4 0
3 years ago
Other questions:
  • Create a class called Animal that accepts two numbers as inputs and assigns them respectively to two instance variables: arms an
    11·1 answer
  • Résumés for teenagers and young adults typically consist of<br> (Apex)
    11·2 answers
  • A __________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers
    10·1 answer
  • While adding information to the employee information database, Neil's computer crashed, and the entire database was erased. Whic
    12·1 answer
  • Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
    15·2 answers
  • In Microsoft Excel, which formula will yield a value of 10? 5x2 5x2*.5+5 =5*1.5 =(100/5*2)*.25
    13·2 answers
  • A photograph with more yellows has which mood
    6·2 answers
  • What role do computer play in law and order​
    6·1 answer
  • HELP PLEASE!!!! If you are continually building, reviewing, correcting a model of your system, and incrementally adding to the s
    9·1 answer
  • Drow flowchart that finds a<br> series between 10, 100<br> fibonanchi
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!