1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
3 years ago
8

Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:

Computers and Technology
1 answer:
Nostrana [21]3 years ago
5 0

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

You might be interested in
You have informed your users that you need to bring the machine down at the end of the day to perform routine maintenance. Howev
PSYCHO15rus [73]

Answer:

shutdown -h +15 It is time for a shutdown!

Explanation:

In a work environment where there is an admin and users connected to the server when the admin wants to Give a 15-minute delay to allow users enough time to save their work data and logout from the system. the command above shuts down after 15 minutes delay and notifies the user with "It is time to shut down!".

8 0
3 years ago
Annie is a nutritionist. She is conducting seminars about following a healthy diet in various offices. Annie adds a picture of f
Novosadov [1.4K]

I believe in this case you would be using Clip Art.

Smart Art is used on words to make graphics usually.

Graphs are not pictures

Shapes are completely different


8 0
3 years ago
Read 2 more answers
Some smartphones use ______ text, where you press one key on the keyboard or keypad for each letter in a word, and software on t
Oksanka [162]

Answer:

The answer is "predictive".

Explanation:

The statement lacks some details, which can be answered by the choice of the question:

A. Presumptive .

B. suggestive .

C. interpretive.

D. predictive.

Predictive text is considered to be auto-correct text as well. It is an input technique, which allows people to type words onto a smartphone throughout the text field. It's focused on both the significance of the words and letters in the message, and certain choices were wrong, which can be defined as follows:

  • Option B and Option D both were wrong because it provides the synonyms of the words.
  • In option C It is wrong because it is a text version.

5 0
3 years ago
It converts Assembly Language into machine language?​
docker41 [41]

Answer:

An assembler.

Explanation:

Input is (as with any programming language) files with lists of instructions (typically assembler mnemonics), output is a binary format representing these instructions in machine language.

6 0
2 years ago
WHAT is an UX designer? an interactive designer ? a front-end developer ? and what they do?
MatroZZZ [7]
Basically, it is an idea that has numerous measurements, and it incorporates a group of various controls, for example, cooperation outline, data construction modeling, visual configuration, convenience, and human-PC connection.

Answer: an interactive designer.


What they do?

It's about improving the experience that individuals have while communicating with your item, and ensuring they find esteem in what you're giving.



3 0
3 years ago
Other questions:
  • Which of the following best reflects why lighting systems are used when filming on location outdoors? (Select all that apply.)
    10·1 answer
  • Hen using presentation software, what do you do when you "compose a slide"?
    5·1 answer
  • How do you ask brainy a question without it not liking the question and saying it hurts their feelings?
    14·1 answer
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • When disabling inherited permissions on an object, what happens if you select Remove all inherited permissions from this object?
    11·1 answer
  • What will be the results of executing the following statements? x.setEditable(true); x.setText("Tiny Tim"); a. The text field x
    7·1 answer
  • _____ is the practice of using the internet to provide healthcare without going to a doctor’s office or hospital.
    15·2 answers
  • Is a dot matrix printer an impact or non-impact printer
    12·2 answers
  • Unscramble the given word and identify the correct statement about it. ATTEPLSR
    10·1 answer
  • The quickest way to change a word is to double
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!