1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Digiron [165]
3 years ago
7

You wouldn't think a simple shop like Dippy Donuts would be an interesting target for hackers. But look beyond the donuts and yo

u’ll realise that their home delivery site stores the personal information and payment details for hundreds of previous customers. That's why they asked us to review the security on their site, and we found an immediate security hole. Can you find it and sign in to their admin area?
Any help on how to this one? its for girlsgocyberstart, thanks!
Computers and Technology
1 answer:
Veronika [31]3 years ago
5 0

Answer:

Yes, the site can be attacked for data theft. This is done mainly through malware, which is a piece of code, and if the site is small then you can find that piece of code on your own by having a look manually through the complete code, as it can be few hundred lines of code. However, if the code length is more then you can make use of the software like the Codeguard. And that can certainly help you out considerably. Or you can buy the services of top security service providers like Sucuri.

Explanation:

Please check the answer section.

You might be interested in
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless c
Lera25 [3.4K]

Answer:

hotspots.

Explanation:

Hotspots is a small geographical location with at least one access point in an outdoor/indoor setting, that provide people with maximum wireless coverage within that area and its mostly uses a wireless local-area network (WLAN) using a router to connect to an Internet service provider.

7 0
3 years ago
Fiona is creating a presentation with PowerPoint Online about how pencils are made. She would like to type an explanation about
777dan777 [17]

Answer:THE ANSWER IS A.

Explanation:I DID IT AND I GOT 100

6 0
2 years ago
How to create json object from variables javascript
tino4ka555 [31]
Not entirely sure what you want to achieve, but consider this program:

var a = 'foo';
var b = 'bar';

var c = { first : a, second : b };

console.log(JSON.stringify(c, null, 4));

A json object c is constructed using the values from variables a and b. Is this what you mean?
8 0
3 years ago
Convert 2910 to binary, hexadecimal and octal. Convert 5810 to binary, hexadecimal and octal. Convert E316 to binary, decimal an
Burka [1]

Answer:

2910 to binary = 101101011110

2910 to hexadecimal = B5E

2910 to octal = 5536

E316 to binary = 1110001100010110

E316 to octal = 161426

E316 to decimal = 58134

5916 to binary = 101100100010110

5916 to decimal = 22806

5916 to octal = 54426

010010102 to decimal = 149

010010102 to octal = 225

010010102 to hexadecimal = 95

FOR 438 and 618, 8 is not a valid digit for octal..

5 0
3 years ago
Juan has performed a search on his inbox and would like to ensure that the results only include those items with
kogti [31]

Answer: Refine

Explanation:

From the question, we are informed that Juan has performed a search on his inbox and would like to ensure that the results only include those items with attachments. The command group that he'll use will be the resume command group.

The refine command group help are one whereby the results include the items that have attachments. Therefore, the answer will be option C "Refine".

5 0
2 years ago
Read 2 more answers
Other questions:
  • To calculate the chapter from which you must solve the programming exercise, divide the integer number representing your student
    10·1 answer
  • The Internet may best be compared to a/an
    8·1 answer
  • The term ________ refers to fluid flow back to the pan to empty or drain a circuit.
    5·1 answer
  • From your computer you are able to establish a telnet connection to a remote host but a traceroute to the host IP address result
    6·1 answer
  • Sandra is having difficulty with her reading assignment because she does not fully understand the language. Which online tool wo
    6·1 answer
  • .In Python, comments begin with the comment marker and continue ______.
    14·1 answer
  • In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a)
    14·1 answer
  • A typical day in programming and software development would involve
    7·1 answer
  • I am doing keyboarding keyboarding is very boring and yeah
    12·2 answers
  • O How basic blocks are identified and how the blocks are used to construct control flow graphs
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!