1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Digiron [165]
4 years ago
7

You wouldn't think a simple shop like Dippy Donuts would be an interesting target for hackers. But look beyond the donuts and yo

u’ll realise that their home delivery site stores the personal information and payment details for hundreds of previous customers. That's why they asked us to review the security on their site, and we found an immediate security hole. Can you find it and sign in to their admin area?
Any help on how to this one? its for girlsgocyberstart, thanks!
Computers and Technology
1 answer:
Veronika [31]4 years ago
5 0

Answer:

Yes, the site can be attacked for data theft. This is done mainly through malware, which is a piece of code, and if the site is small then you can find that piece of code on your own by having a look manually through the complete code, as it can be few hundred lines of code. However, if the code length is more then you can make use of the software like the Codeguard. And that can certainly help you out considerably. Or you can buy the services of top security service providers like Sucuri.

Explanation:

Please check the answer section.

You might be interested in
Which storage is faster than secondary storage​
kozerog [31]

Answer:

RAM provides much faster accessing speed to data than secondary memory. By loading software programs and required files into primary memory(RAM), computer can process data much more quickly. Secondary Memory is slower in data accessing. Typically primary memory is six times faster than the secondary memory.22-Aug-2019

5 0
3 years ago
Read 2 more answers
1. JAVA Create one method to do the following expressions. Given the following declarations, what is the result of each of the e
nordsb [41]
<span>public void myMethod(int w, int y, int z) {
</span>int a, b, c, d, e, f, g, h, i, j, k, l;

<span>a = w * z;
</span>b = w * z + y;
c = w * -z;
d = w * --z + y++;
e = w * z-- + ++y<span> ;
</span>f = w + z * y;
g =  w – y + z;
h = (w + y) * z;
i = y / w;
j = y / z;
k = w % y;
<span>l = y % w;
</span>System.out.println( "%d %d %d %d %d %d %d %d %d %d %d %d", a,b,c,d,e,f,g,h,i,j,k);
}

To use 
myMethod(2, 7, 12);
7 0
4 years ago
The read/write heads of a hard disk gently rest on the hard disk platters in order to read and write the data.
noname [10]
The answer is FALSE because the interior of commercial Hard disk drive is with stack of magnetic disks (platters) containing the user’s data and a rotating arm supporting the magnetic heads. The rotating arm is moved by the torque generated by a voice coil motor (VCM) mounted at one end of the arm. Data read/write operations rely on the capability of the governing unit of the HDD to maintain the magnetic read/write heads as close as possible to center of the desired track. Typically, reliability of data reading and writing is guaranteed when the head is kept within 5% of the track pitch from the track center. This means that the accuracy required for the head positioning is in the range of a few tens of nanometers.
6 0
4 years ago
Could some please answer the question in the pictures? Thank you!! I will also give your brainliest if you give me the right ans
timama [110]

Answer:

1

Explanation:

per page must have 1 body

8 0
3 years ago
In three to five sentences, explain the function of the computer's operating system.
Sati [7]

Answer:

An Operating System (OS) is an interface between a computer user and computer hardware. An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

Explanation:

3 0
3 years ago
Other questions:
  • list the network characteristics of the wireless network(s) in the decode -- SSIDs, channels used, AP names, presence of Bluetoo
    6·1 answer
  • The calls radioed to patrol officers, or assignments given to police patrol units by 911 dispatchers, reveal the types of proble
    9·1 answer
  • The help desk received a call from a user who cannot get any print jobs to print on the locally shared printer. While questionin
    10·2 answers
  • Linux would be a good example of?
    6·1 answer
  • Encapsulation is the process of “packaging” information prior to transmitting it from one location to another. true or false
    14·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    7·1 answer
  • How do you reduce computer screen flicker
    11·1 answer
  • How does a linear algorithm perform compared to a quadratic one on our imaginary race track?
    5·1 answer
  • Of the following field which would be the most appropriate for the primary key in a customer information table?
    5·1 answer
  • Why should we apply print preview before printing the document.​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!