1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
4 years ago
15

A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting th

ese vulnerabilities.A. corporate spyB. ethical cyber criminalC. hacktivistD. white hat hackerE. data harvester
Computers and Technology
1 answer:
Damm [24]4 years ago
4 0

Answer: white hat hacker

Explanation:

Like other forms of hacker, white hat hackers also have wide range of knowledge of breaking into systems, overriding firewalls, bypassing security protocols and can also do all other things hackers do. But what differentiates white hat hackers is the motive behind what they do, in that they carry out all this test not for their personal gain but for the benefit of the owners and also with the approval of the owners. Because after carrying out tests on the ways of exploiting the loop holes in the system they reveal it to the manufacturer or system owners for correction.

You might be interested in
50 points, and brainliest if u get it right!
marshall27 [118]

Answer:

they are games in which payoffs are initially negative for both players and progress

6 0
3 years ago
What type of address uses a number that uniquely identifies each computer?
Anna [14]

Answer:

The awnser is D or IP Address

Explanation:

<h2>BRAINLIEST PLEASE</h2>
8 0
3 years ago
Read 2 more answers
Complete the following statement: Sustainability is: Choose all that apply.This task contains the radio buttons and checkboxes f
const2013 [10]

Answer:

E. Leading the way to a new kind of future for the environment, the economy, and society.

Explanation:

We can look at Sustainability to mean the way of meeting our own needs without compromising the ability of future generations to meet their.

In sustainability the focus is not on the now only, rather it puts into consideration the fate the future generation will face.

Hence, it is Leading the way to a new kind of future for the environment, the economy, and society.

8 0
4 years ago
Consider a multidimensional array A stored in row-major order with 22 rows and 6 columns whose subscripts start at 0. If each el
siniylev [52]

Answer:

Option c is the correct answer for the above question.

Explanation:

  • If the array will store in row-major order, then it will be a store like the first row, then second row and then third row.
  • If the user wants to conclude the address of the A[3,5], then the address of the A[3,5] will be 184.
  • It is because the 3 states the row number and the 5 states the column number.
  • The above question states that every value take 8 bit. and there are 4 rows from 0 to 3 and 6 column (0 to 5) for every row (except the fourth rows because it takes 5 columns from 0 to 4) before the A[3,5].
  • So there are 23 value before A[3,5] which are as-- [00,01,02,03,04,05][10,11,12,13,14,15][20,21,22,23,24,25][30,31,32,33,34].
  • So when every value takes 8 bit then 23 value takes 184 bits(23*8).
  • So the address of A[3,4] is 184.
  • Hence option c is the correct and the other is not because of 184 stated from the c option only.
4 0
3 years ago
What kind of personal information are you comfortable sharing with others online? Why? What steps do you take to control how tha
GaryK [48]

Answer:

this is more of an opinion question regarding what you personally do

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which is the main function of the arithmetic and logic unit (ALU)?
    5·2 answers
  • You administer a Microsoft SQL Server database that supports a banking transaction management application. You need to retrieve
    5·1 answer
  • This is not an appropriate business use for a wiki. editing corporate documents getting customer feedback project management pub
    11·1 answer
  • A Network Systems employee set up a network-wide password system in which other employees log in to access their work. Which tas
    6·2 answers
  • Lester has to create an app that can support offline data and rich media content such as audio and video. In which programming l
    15·1 answer
  • Write a program that creates an integer array with 40 elements in it. Use a for loop to assign values to each element of the arr
    5·1 answer
  • This is your data.
    11·2 answers
  • We _____to separate the code in sub programs from the main code<br><br> Please help!!
    10·2 answers
  • What are the advantages of Radio waves over micro waves?​
    14·1 answer
  • The first time that a particular visitor loads a web site page is called a(n) _____.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!