1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juliette [100K]
3 years ago
7

I need a 2's partner in rl if you're silver or gold. or any rank to just chill with

Computers and Technology
1 answer:
Semenov [28]3 years ago
5 0

Answer:

I'm a beginner but I go you!

Explanation:

You might be interested in
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
jarptica [38.1K]

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

6 0
3 years ago
1.<br> The correct way to use a seat belt is
Nesterboy [21]

Answer:

4 steps

Explanation:

Step 1: Pull belt across body

Sit in any of your vehicle's seats and secure the three-point harness in its buckle by pulling it across your body.

If the seatbelt is too short, consider an aftermarket restraint and extender. Make sure they meet federal safety standards and are installed professionally.

Step 2: Adjust lower belt

Adjust the lower belt snuggly across your lap and pelvis area – never your stomach.

Pregnant women should wear the lap belt below their belly, not on or above it.

Step 3: Adjust shoulder belt

Adjust the shoulder belt to fit comfortably across the collarbone and chest. It should never rub on your neck or face. Never put the shoulder belt behind your back or under your arm.

Step 4: Check before driving

Check that the belt is secure before driving.

4 0
3 years ago
Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
Paladinen [302]

Using an electronic signature on official documentation best illustrates the process of authentication

Further explanation:

The continuous rise of Electronic signatures has made it easier for people to accept signed documents by email or through electronic devices. One good example of electronic signatures is the implementation of digital signatures which broadly encompasses many types of electronic signatures out there. Digital signatures are unique to each signer and follow a standard authentication protocol called PKI. PKI use mathematical algorithms to generate what are known as private and public keys.

A good example is Bob and Jane. Jane sends an eSignature document using her private keys. Bob receives this document with an attached copy of Jane’s public key. The signature will be considered valid if the public key decrypts the signature correctly.

Learn more about eSignatures and electronic signatures.

brainly.com/question/8776017

#LearnWithBrainly

7 0
4 years ago
When Kim was working in her Microsoft® Excel® spreadsheet, she accidentally placed her book on the spacebar and erased the conte
zaharov [31]

Answer:

The undo tool.

Explanation:

Microsoft Excel is a spreadsheet application developed by Microsoft, it is used for analysing data. It's worksheets are made up of columns and rows or fields and records.

There are different ways of entering data to a cell. Click on the cell and type the data, copy and paste to the target cell, double-click on the cell to correct data and click on a cell and press the spacebar key to clear the data.

Excel records the action of event, so when a mistake is made like deleting a crucial cell data value, the undo tool is used to recover the data, since it holds records of events. The redo tool is the reverse of the undo tool.

5 0
3 years ago
Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer
NikAS [45]

Answer:

The development of computers from the beginning to what we see now is called the computer generations. It is gradual advancement in the technology in the making of the computer.

Explanation:

The generation in computer technology can be defined as the development or the change in the technology in the computer as it was used. There were  five generations of computer development. They were :

1. First Generation computers

   In this generation, vacuum tubes was used in the circuits. It dated from 1946 to 1959.

2. Second Generation computers

  These are transistors based computers. This generation ranges from 1959 to 1965.

3. Third Generation computers  

    This generation computers were Integrated circuit based. The generation stared in 1965 and ended in 1971.

4. Fourth Generation computers

   The computers of this generation used VLSI microprocessor in the circuits. The period of the 4th generation computers are from 1971 to 1980.

5. Fifth Generation computers

   The computers of this generation used ULSI microprocessor in the circuits. The 5th generation computers started from 1980s.

4 0
3 years ago
Other questions:
  • python A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun
    15·2 answers
  • Which of the following statements is false? Question 4 options: By convention class names begin with an uppercase letter, and me
    8·2 answers
  • The domain name service (dns is a distributed database that allows users to communicate with each other computers by:
    7·1 answer
  • Which leader of the Jamestown colony am I?
    15·2 answers
  • Security controls are measures taken to protect systems from attacks on the integrity, confidentiality, and availability of the
    12·1 answer
  • What is the practical application of the information acquired by science.
    15·1 answer
  • What is the major difference between the intranet and extranet?
    11·1 answer
  • HELP PLEASE
    7·1 answer
  • How does the sky change as onegets above Earth’s atmosphere?
    5·1 answer
  • Is anyone excited for the new matrix coming out ?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!