1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antoniya [11.8K]
3 years ago
15

How can you tell if a hacker has administrative access?

Computers and Technology
2 answers:
olga55 [171]3 years ago
8 0
I don't think you can know because if the hacker is smart he or she will know to cover up their tracks
Vinvika [58]3 years ago
5 0

Answer:

A HACKER DELETED MY ACCOUNT

Explanation:

You might be interested in
Vpns create a _____________ to transport information through public communications media.
Oxana [17]

They create a secure tunnel.

3 0
3 years ago
How do you delete answers on Brain.ly?
Svetlanka [38]
Need to go to the settings
8 0
3 years ago
Read 2 more answers
You have compiled a new kernel using rpm. when you reboot, the new kernel is not the default selection on the boot menu. you use
vredina [299]
First, rpm is RedHat Package Manager. Compilation is done with gcc, the GNU C Compiler.

To add that kernel to grub2's menu, as root you'd need to run:

grub2-mkconfig > /boot/grub2/grub.cfg #redirection is favored by Red Hat

Check out the man page @ man grub2-mkconfig
5 0
3 years ago
• What is the difference between primary storage, secondary storage, and off-line storage
sergiy2304 [10]


Primary storage refers to your RAM it is internal storage.

Secondary storage is any storage that is not the primary storage that permanently stores data. Examples are hard drive, tape disk drive, floppy disk drive  and compact disk drive. 

Off-line storage refers to any device that stores data that is not permanently attached to the computer. Example flash drives, The data remains on the storage device and can be connected to a different computer. 

3 0
3 years ago
Please answer immediately!!!
diamong [38]

Answer:

Please check the attachment.

Remember:

All N1, N2, N3N, N4, N5, N6, N7 and each of them are certainly like the server. Also note that Router, repeaters, switch and transmitter are not mentioned in the above diagram. Please assume it in between each location.

Explanation:

Please check the attachment. Also, Remember that Server is at the head office, and rest 7 are the 7 branches. The VOIP, video surveillance, Door security system and the computer networks are being shown in the diagram. And each location has a network of computers joined through VLAN, and each of them are given the IP addresses of Class A, Class B and class C of the iPV4(or IPV6), which can be found by the future network administer, operators through the IP address, that is assigned.  

4 0
3 years ago
Other questions:
  • The producer thread will alternate between sleeping for a random period of time and inserting a random integer into the buffer.
    7·1 answer
  • This is question 2.5 Computer Science and I don't understand what is wrong<br><br>​
    15·1 answer
  • Using a cell phone while operating a motor vehicle is considered distraction because
    8·1 answer
  • State two functions of windows environment​
    9·1 answer
  • Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appro
    9·1 answer
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • Let’s say you’re having trouble locating a file on your computer. Which of the following are good places to look for the file?
    14·1 answer
  • Help me please I’m failing
    11·1 answer
  • Please choose odd one out please tell fast​
    12·1 answer
  • Name 3 things that you use daily that are considered computers?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!