1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
4 years ago
13

When a programmer exploits written code that doesn't check for a defined amount of memory space they are executing which of the

following attacks?
Computers and Technology
1 answer:
bazaltina [42]4 years ago
4 0

Answer:

The correct answer to the following question will be "Buffer overflow".

Explanation:

  • For security policy and computing, the buffer overflow is a phenomenon where the code overwrites the boundaries of the buffer when adding data to the buffer and overwrites neighboring storage positions.
  • A vulnerability of buffer overflow occurs when you offer so much data to a program. Excessive data corrupts memory space in the vicinity and it may change certain data. As a consequence, the program could report a mistake or act differently. These vulnerabilities are often referred to as buffer overrun.
  • If the programmer constructs a compiled code which does not test for a given quantity of system memory, the buffer overflow would strike on it.

Therefore, Buffer overflow is the right answer.

You might be interested in
The program evaluation and review technique (PERT) is __________. a. a network-based technique in which there is a single time e
xenn [34]

Answer:

The correct answer to the following question is "Option b".

Explanation:

PERT is a methodology that organizations follow to evaluate and reflect the behavior within a venture, as well as to demonstrate the flow of occurrences within a project. It is indeed a tool for evaluating it calculating the duration needed to complete a job within and without the timelines.

  • It acts as a strategic method for the study, description, and integration of occurrences also demonstrates the tasks and trade-offs within a project.
  • PERT's primary purpose or objective is to cut costs and time required to execute a project.
3 0
3 years ago
Give short answers.
Mkey [24]

Answer:

H) Well it depends how you put it. I'm Doing virtual School for my education. And it is so easy when we have technology out their to provide the help that we need. So I think it has affected education pretty good. You can Also google the answers.

I) Looking up Answers at home

J) Parents can check up on their child's school work and see if they can help them. Also The law is involved in Education.

K) It depend's on how you put it

Explanation:

Short Answers

6 0
3 years ago
PLEASE HELP ME ASAP!!!!
coldgirl [10]

First party insurance: Loss due to laptop theft, loss due to interruption in business activities due to website failure

Third party insurance: cost of lawsuits filed against the policyholder, fees of a special programmer investigating a cyber fraud, expenses of providing notifications of the cyber attack to clients and employees

8 0
3 years ago
Do most of you agree on a primary interpretation? Why?
Damm [24]

Answer:

yes i do

Explanation:

Primary sources directly address your topic and often provide information that is unavailable elsewhere.

6 0
4 years ago
g Given a 5 by 5 matrix of all positive values, write a program to find and display the greatest product of the 2 adjacent value
Rom4ik [11]

Answer:

Check the explanation

Explanation:

% iterate through each column (outer loop) , then iterate rows-1 (inner loop)

%take product of adjacent rows

mat = input('enter 5 by 5 matrix : ');

[R,C] = size(mat);

max_prod =0;

for c =[1:C]

for r=[1:(R-1)]

temp = mat(r,c)*mat((r+1),c);

if max_prod<temp

max_prod=temp;

end

end

end

fprintf('Greatest product : %i\n', max_prod)

Kindly check the output in the attached image below.

7 0
4 years ago
Other questions:
  • You've been asked to find the average of a range of numbers. Which of the following could you use to find the average of cells A
    9·1 answer
  • A #1 Phillips screwdriver has a shaft diameter of 
    13·1 answer
  • An objective function in linearprogramming is a(n):
    11·1 answer
  • Create a subclass of Person called Lecturer that has 2 variables of its own: employeeNumber and salary. As in the above scenario
    12·1 answer
  • PLEASE HELP!! WILL GIVE BRAINLIEST!!
    14·2 answers
  • Name of the electrical tool and their classification
    10·1 answer
  • Write a function named is_sub_dict that accepts two dictionaries from strings to strings as its parameters and returns True if e
    5·1 answer
  • Why it is not recommended to add sound effect on slide transition? Write at least two reasons.​
    6·1 answer
  • Your task is to build a palindrome from an input string.A palindrome is a word that readsthe same backward or forward. Your code
    12·1 answer
  • When users connect to the network, they use a basic hardware terminal to access a desktop hosted on a virtualization server. wha
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!