1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
3 years ago
5

In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select

one: a. exit door b. glitch c. bot d. exploit
Computers and Technology
1 answer:
tensa zangetsu [6.8K]3 years ago
4 0

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

You might be interested in
CodeHS Python Rainforest Exercise 5.4.7: Categories
Butoxors [25]

Answer:

List1=[['Physics','Quantum Physics','Theory of Relativity'],['Geometry', 'Plane Geometry', 'Coordinate Geometry']]

i=0

k=0

for i in range(0,2):

   print("Category:"+List1[i][0])

   for k in range(1,3):

       print("\t"+List1[i][k])

   

Explanation:

The program required is mentioned above. And it has limitations, but is good enough to explain the fundamentals required.

6 0
4 years ago
Background Susan finished work on system architecture issues, and her system design specification was approved. Now she is ready
beks73 [17]

Answer:

i think it can be

Explanation:

4 0
4 years ago
A 200-g hockey puck is launched at an initial speed of 16 m/s up a metal ramp that is inclined at a 30° angle. The coefficients
rusak2 [61]

Answer:

h = 8.588 m

Explanation:

Given:

Mass of hockey puck:  m  =  200  g  =  0.2  K g

Angle of incline:  θ  =  30º   (with respect to horizontal)

Coefficient of static and kinetic friction between the puck and ramp:  

μ s  =  0.4   and    μk  =  0.3

initial speed:  

v  =  3.5  m /s

Let  h  be the vertical height reached by the puck, above the ground. This corresponds to a distance of  

d =  h *sin  30º =  2 *h

along the incline. As the puck is moving, only kinetic friction comes into play as it climbs up the incline. Let  N  be the normal reaction exerted by the metal ramp on the ball. Then,

N  =  m*g *cos  θ  =  0.2 *9.8 1*cos  30 º =  1.6991  N

Therefore, kinetic friction acting on the puck is:  

F k  =  μ k *N  =  0.3 *1.6974  =  0.50974 N

From work energy theorem, the change in kinetic energy should equal the work done by friction and gravity. Therefore,

0.5*  0.2 *16²  =  0.50974 *2h + 0.2*9.81*h

⇒  h = 8.588 m

8 0
3 years ago
The incandescent test lamp is used to check for the presence of A. AC current. B. DC voltage. C. DC current.
andriy [413]
Incandescent test lamps are used to check for Alternating Current Voltage and Direct Current Voltage. 

The answer is AC Voltage and DC Voltage. 
5 0
3 years ago
Read 2 more answers
What is the difference between a programming language and natural (every-day) language?
Harlamova29_29 [7]
Natural languages are used for communication between people
6 0
3 years ago
Other questions:
  • After modifying the /etc/default/grub file, what command should be run to rebuild the grub config files?​
    6·1 answer
  • Which of the following are common navigation elements? (Choose all that apply.)
    5·1 answer
  • In a presentation, bullets in a text box will do which of the following?
    13·1 answer
  • What operating system component allows multiple computers to be linked together?
    10·2 answers
  • Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed o
    7·1 answer
  • The Mark Table of Contents Entry option is used for marking nonheading text for the table of contents. the options are manually
    5·2 answers
  • a hacker who plants a rogue wireless access point on a network in order to sniff the traffic on the wired network from outside t
    12·1 answer
  • Jenny, a programmer, uses Microsoft Excel 2016 to generate data required for the programs she develops. She uses various functio
    10·1 answer
  • What command can you use if you accidentally delete a sentence in your document?
    13·2 answers
  • What is one of the benefits of using a library in a program?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!