Answer:
b
Explanation:
porque es la única a la cual puedes poner ssi querés sabe neibw idbe
Answer: The library.
There are tons of different ways to access all resources such as online, or through different genres of textbooks.
After a Hacker has selects her target, the thing she scan next on the target's network to see if any are open System Ports.
<h3>How do hackers scan ports?</h3>
In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.
Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.
Learn more about Hacker from
brainly.com/question/23294592
Answer:
Java's bytecode
Explanation:
To execute its operations, java programming languages uses bytecodes.
These bytecodes are literally instructions of a java virtual machine (or JVM). They are generated in form of a class file as soon as the java program is ran and executed. In other words, the java compiler compiles the code and generates the bytecode.
As soon as the bytecode is generated, it can be transferred to a different machine and platform completely and one can run this bytecode on this different machine.