1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nexus9112 [7]
3 years ago
10

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. black-hat gray-ha

t white-hat green-hat
Computers and Technology
1 answer:
Masteriza [31]3 years ago
3 0
<span>These are white-hat hackers. They are typically hired by the company doing the testing as a way of making sure that there are no bugs or holes in the code or program that could be exploited. The ethical hacker would look for ways to get around these issues and helps the company strengthen their programs or sites.</span>
You might be interested in
Commercial websites have domain names so that users can easily access the web pages by typing the domain names instead of the IP
WINSTONCH [101]

The given statement is true.

<u>Explanation:</u>

IP address is really tough to remember by each and everyone, and even if you misspell one number, then the navigation will not go for the desired website. It is equivalent to remember phone numbers during the earlier days. As said the domain name has 4 parts.

They are,  

  • TLD – Top level domain (eg: .com, .org, .net, etc) .
  • Mid level domain – It is the part that comes after www keyword which is before the Top level domain name.
  • www is the machine name which is common for all the domain. It is a standard that needs to be used.
  • Second level domain .
8 0
3 years ago
Sammy created a new logo for his client enlarged to use on a billboard ad. Now Sammy needs to redo the logo. What should he do t
bazaltina [42]

Answer:

The answer is D. In order to make an advertisement, the photo or photos have to be clear and easy to see. They also have to stay clear when they are enlarged

Explanation:

4 0
3 years ago
Comparing tools made of stone, iron, and bronze: place them in the correct order from least to most durable.
densk [106]

Answer:

stone bronze and iron.

Explanation:

Your welcome! :)

8 0
3 years ago
Brief description email etiquette​
Solnce55 [7]

Answer: See explanation

Explanation:

Email etiquette is defined as the code of conduct which helps to guide the behavior when people send or respond to emails. Some of ail etiquette include:

• Using proper and correct grammar and punctuations.

• Replying quickly too emails.

• Including a clear and direct subject.

• Proofreading of messages.

• Cautious with humour.

• Sending of smaller files and compressing large files.

7 0
3 years ago
Write a method named decimalToBinary that accepts an integer as a parameter and returns an integer whose digits look like that n
zmey [24]

Answer:

In Java:

public static int decimalToBinary(int decimal){

int binary = 0; // initial value

int currUnitPlace = 1; // working location

while(decimal > 0) {

// put remainder in current unit place

binary += currUnitPlace * (decimal%2);

decimal /= 2; // move to next bit

currUnitPlace *= 10; // move unit place

}

return binary;

}

7 0
3 years ago
Other questions:
  • In which slot is a video card most commonly installed within a laptop?
    15·1 answer
  • Which of the following are personal video journal entries posted on the web? Select one: A. Podcasts B. Vlogs C. Blogs D. Newsgr
    14·1 answer
  • 4.2 Code Practice: Question 1
    14·1 answer
  • In MMF2, what does the * symbol mean?
    5·1 answer
  • ELO 3.6 Which type of iSCSI name requires a registered domain name to generate a unique iSCSI identifier?
    12·1 answer
  • 7.3 A hydraulic lift has a mechanical advantage of 6. If the load weighs 780 N, calculate
    13·1 answer
  • Which view allows you to make changes to the content of your presentation?
    13·1 answer
  • Como se llama este icono de word
    9·1 answer
  • Differentiate the term, "bundling," as applied to a Mac/Apple computer and a PC.
    5·1 answer
  • Write an SQL query to list all the records from the member and branch tables.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!