1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nexus9112 [7]
3 years ago
10

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. black-hat gray-ha

t white-hat green-hat
Computers and Technology
1 answer:
Masteriza [31]3 years ago
3 0
<span>These are white-hat hackers. They are typically hired by the company doing the testing as a way of making sure that there are no bugs or holes in the code or program that could be exploited. The ethical hacker would look for ways to get around these issues and helps the company strengthen their programs or sites.</span>
You might be interested in
If I am working in a document and wish to follow a hyperlink, what should I do?
Ksenya-84 [330]

Answer:

Click on the link or copy and paste it to your browser

Explanation:

7 0
3 years ago
Materials used in front office
mina [271]

Answer:

A Telephone, Printer, Computers, Security Monitor

4 0
3 years ago
When you use a business class with an object data source, the business class Group of answer choices must have attributes that m
DedPeter [7]

Answer: must have public properties that match the names of the bound fields

Explanation:

When a business class is used with an object data source, the business class must have public properties that match the names of the bound fields.

Having an attribute which match the names of the bound fields isn't necessary as well as having a constructor with parameters that match the names of the bound fields

Therefore, the correct option is B.

3 0
3 years ago
Explain the danger leaks pose when operating a tractor.
Romashka [77]
Read and follow procedures as outlined in the operator's manual. By being familiar with the operating features of a tractor, the operator will develop confidence when the tractor is driven under adverse conditions. Learn the location and purpose of all of the guages and controls as well as other indicators. Knowing where the controls are by memory can allow you to react more quickly in an emergency situation. There have been accident situations where individuals have become entangled in machinery or the power takeoff shaft and rescuers or family did not know how to disengage the equipment. Family members should be showed how to shut down equipment or disengage the PTO in case of emergency.
Study the various decals on your equipment. They may point out DANGER, WARNING and CAUTION for various points on the tractor. Have an experienced tractor operator with you as you review the various decals and ask questions!
5 0
3 years ago
A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific
Vera_Pavlovna [14]

Answer:

User application

Explanation:

A user application is a program that is created by using a standard software that is adjusted to the user's needs that can't be fulfilled by an existing system. According to this, the answer is that a user application utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.

7 0
3 years ago
Other questions:
  • Explain one way world war ii?-era advances in computers
    11·1 answer
  • [Submit on zyLabs] Please write a function with one input, a matrix, and one output, a matrix of the same size. The output matri
    10·1 answer
  • C++
    8·1 answer
  • Which bitwise operation has the same effect as multiplying a by 16?
    6·2 answers
  • Do you need internet to play xbox one
    14·1 answer
  • 16. What's the difference between a footnote and endnote?
    11·1 answer
  • Ill give alot of points if you answer: How do I get a 100 dollar ps4
    5·2 answers
  • What is processing unit?​
    7·2 answers
  • Name the contributory components that are considered when determining an E/M code; they are not considered key components:
    15·1 answer
  • list three things that can spoil a printer if they are not of the correct specification and explain what damage may be caused​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!