1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natasha_Volkova [10]
4 years ago
5

Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr

om the clients to perform this testing as part of a paid contract. What type of person is Yuri?
a) Cracker
b) White-hat hacker
c) Black-hat hacker
d) Grey-hat hacker
Computers and Technology
1 answer:
Tatiana [17]4 years ago
8 0

Answer:

b) White-hat hacker

Explanation:

This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out  based on a agreement between the whihte-hat hacker and the client via a contract.  

You might be interested in
All of the following items could be too expensive for someone with only a high school degree to afford except
Papessa [141]
This sounds like a multiple choice answer can I have 4 choices to pick?
7 0
3 years ago
Jessica has pinned her favorite applications as icons on her desktop. She always clicks on these icons to work on them. Which us
Hatshy [7]

Answer:

Graphical User Interface (GUI)

Explanation:

Graphical User Interface clicking on various icons to perform a certain functionality. GUI is a form of user interface that allows users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of text-based user interfaces or command line interface where you would have to type to run the program rather than just click it.

7 0
3 years ago
Given that add, a function that expects two integer parameters and returns their sum, and given that two variables, euro_sales a
Evgesh-ka [11]

Answer:

int eurasia_sales = add(euro_sales,asia_sales);

Explanation:

Kindly find the explanation attached

Download txt
7 0
4 years ago
The ____ command can be used to view the contents of a record when it is anticipated that the record will need to be modified. I
GREYUIT [131]

Answer:

The correct answer is B)

Explanation:

The commit command allows us to:

• Consolidate, confirm

• committing refers to the idea of confirming a set of provisional changes permanently.

• A popular use is at the end of a database transaction.

•

The LOCK TABLE command should be used:

• when a lock of the mode specified in the table can be acquired.

• The command will wait for everything you need to get the lock,

• In case you cannot acquire the lock immediately, the NOWAIT option is specified so that the command cancels the transaction.

6 0
3 years ago
_____________ is the process of inspecting data that has been input to a program to make sure it is valid before it is used in a
Maksim231197 [3]

Answer: E) Input validation

              C) Data validation

Explanation:

  • Input validation is the process of analyzing and testing input's quality and correctness that are being processed at further level in information system.It help in eliminating any type of improper or informal input data from getting supplied to user or program in a system.
  • Input validation is also known as data validation.As the input that is being tested and validated is form of data that is going through cleansing task to remove useless data.
  • According to the question, data and input are being inspected to extract the validity and correctness of it before sending it for computation .Thus , both data and input validation is happening in this case.
  • Other options are incorrect because testing is examining the data.Correction data and input is the step for rectifying the mistakes in data or input.
  • Thus, the correct option is option(C) and (E).

4 0
4 years ago
Other questions:
  • What is the primary purpose for a screen saver in windows?
    8·1 answer
  • Which information technology job has the lowest predicted 10-year growth? computer programmer software developer computer suppor
    13·1 answer
  • Can you give me a long list of anime
    6·2 answers
  • Different video files and ______ can cause compatibility issues to arise between computer systems.
    8·1 answer
  • I NEED IT NOWW
    13·2 answers
  • How does violating the SOLID principles make code hard to test?
    5·1 answer
  • What is the last usable host IP address on the 192.168.32.9/30 network?
    15·1 answer
  • In the program evaluation and review technique (PERT), a delay in ________ will cause the entire project to fall behind. Multipl
    7·1 answer
  • Which of these agents of education empowers the other..........
    15·2 answers
  • Write, compile, and test the MovieQuoteInfo class so that it displays your favorite movie quote, the movie it comes from, the ch
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!