1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
posledela
3 years ago
9

Retype and run, note incorrect behavior. Then fix errors in the code, which should print num_stars asterisks.

Computers and Technology
1 answer:
Paul [167]3 years ago
8 0

Answer:

the answer is 2.3

Explanation:

You might be interested in
The repeated use of electronic communications, such as chat rooms and email, to seek out, harass, or frighten someone is called
pickupchik [31]

Answer:

CyberStalking

Explanation:

Stalking over the internet carried out . it target individuals or organisation to stalk and harass

5 0
3 years ago
Write down 5 tips that an office can use to be more sustainable and reduce wastage? Write a description of each one and how it r
Evgen [1.6K]

1 Use water cooler

2 Avoid single use drink container for guests

3 Bring lunches in reusable containers

4 Paper waste reduction

take paperless notes

5 Use both sides of paper while printing, coping and writing

8 0
2 years ago
NEED HELP RIGHT NOW!!! Which of the following is the definition of a privacy policy? * 5 points - A legal document that an app o
Marina86 [1]

Answer:

A legal document that an app or a website must provide to describe the rules the company and users must obey when they use the app.

6 0
3 years ago
Jennifer’s company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting
Vsevolod [243]

Answer:

RADIUS

Explanation:

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for users connected to a network service. It can be used to authenticate anyone who is on your network.

RADIUS is a protocol that uses TCP or UDP as transport. RADIUS client is what is used to communicate with RADIUS servers at gateways of the network.

8 0
3 years ago
A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action shoul
sergij07 [2.7K]

An action which this organization should take to find out if systems have been compromised is: C. Look for unauthorized accounts.

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities and compromises in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails a tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the computer system.

In this scenario, we can reasonably infer and logically deduce that an action which this organization or cybersecurity specialist should take to find out if systems have been compromised is to look out for unauthorized accounts.

Read more on penetration test here: brainly.com/question/25813524

#SPJ1

Complete Question:

A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised?

Look for policy changes in Event Viewer.

Scan the systems for viruses.

Look for unauthorized accounts.

Look for usernames that do not have passwords.

7 0
1 year ago
Other questions:
  • _____________ is a service that provides access to hardware resources available over the Internet.
    11·1 answer
  • What is a common method for testing a spot weld?
    13·1 answer
  • Helppppppppppppppppppp
    11·1 answer
  • What is the main characteristic of a Peer-to-Peer (P2P) network?
    8·1 answer
  • Given an initialized String variable outfile, write a statement that declares a PrintWriter reference variable named output and
    12·1 answer
  • Anyone know how to delete that I need ASAP
    13·1 answer
  • Is amazon a e-commerce website <br> o true <br> o false
    8·2 answers
  • You have a small business.Due to the recent pandemic you seem to be losing contacts with your suppliers and customers.You want t
    10·1 answer
  • What two windows security updates do most organizations always patch?
    7·1 answer
  • Match the IP Protections Patent, Copyright and Trademark into the following cases:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!