1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
3 years ago
6

What is a disadvantage of shopping online?A.Harder to compare prices than in storesB.A higher risk of financial data theftC.More

time is spent travelingD.Less choice of products
Computers and Technology
2 answers:
babymother [125]3 years ago
7 0

.A higher risk of financial data theftC

nirvana33 [79]3 years ago
4 0

B. A higher risk of financial data theft

You might be interested in
You should structure the first before you search for a relevant picture.
Zarrin [17]
No, I believe it is "You should use proper grammar when asking a question".
6 0
3 years ago
The attacker sent data that was able to manipulate the return address that is reserved to store expected data
KatRina [158]

Complete Question:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?

Answer:

A buffer overflow.

Explanation:

In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).

In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.

3 0
3 years ago
As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 employees who work fro
Strike441 [17]

Answer:

To provide remote network access to the users to work, the network administrator can use virtual private network (VPN) along with some firewall to protect the system from hackers and other security threats.

Explanation:

Virtual Private Network (VPN) can be used to provide remote access to the users who are currently working from some remote areas. Many companies who have their branches or franchises in different parts of the city uses VPN to connect then all with the company server.

In this way, a firewall has been needed that protect the systems of users as well as company to protect from different security hazards such as hackers, authorization of the users and other security threats.

in this case, 12 em[employees who need remote access to the network can be connected through VPN along with the installation of some suitable firewall.

8 0
4 years ago
The address space 0x0000-0x3FF is assigned to I/O peripherals of a given HCS12 chip. How many K bytes is this? (Points : 2) 2K
UNO [17]

Answer:

D. 1K

Explanation:

The address space 0x0000-0x3FF is of 1KB(One Kilo Byte) since 0x3ff is equal to 1023. therefore 1023=1 KB.

bitwise 0x3ff zeros out the top bits of the number such that the result is always between 0 and 1023. It is essentially the same thing as modulo( num,1024) for positive  values of num.

Hence the answer is D 1K

3 0
3 years ago
Which of the following is considered a period cost in absorption​ costing? A. variable manufacturing overhead costs B. fixed man
sasho [114]
Ccccccccccccccccccccc
5 0
3 years ago
Other questions:
  • Which of the following is the correct syntax for a hyperlink:
    7·1 answer
  • Typically, when an organization purchases Internet access from an Internet Service Provider (ISP), the ISP will grant it
    10·1 answer
  • A restaurant has a case type that allows customer to book the dining room for events. Customers provide basic information includ
    11·1 answer
  • In a non-formatted/standard template, if the number 25 is converted to text format, the
    14·1 answer
  • Write the definition of a function named isSorted that receives three arguments: an array of int , an int that indicates the num
    11·1 answer
  • Identify at least five different Arts, A/V Technology, and Communications careers that you could pursue in your home state, and
    11·1 answer
  • Which of the following characteristics differentiates PCM from BWF audio
    15·2 answers
  • This image shows a web designer’s grids for different pages on a website. The uppermost box on each page is the website’s identi
    15·2 answers
  • Help please answer the question 1 2 3 4 5 6<br><br>help
    12·1 answer
  • You are given an integer N where 0 &lt;= N &lt;= 100, followed by another line of input which has a word W with length L where 1
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!