1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naya [18.7K]
3 years ago
6

Perform a Google search, using the Google hacking keywords to locate a page that has the word passwd (note the spelling) on the

page but has the phrase "Index of" in the title. First, what was your search term. Second, what is the first URL in your list of results. Third, what exactly would you use this search to find?
Computers and Technology
1 answer:
Andru [333]3 years ago
4 0

Answer:

Following are the step to this question:

i) search "intitle passwd" in google search engine.

ii) Open first link of the page.

iii) use commands to access data.  

Explanation:

Google Hacking operates as follows of web engines like google and yahoo to find web pages and sensitive information, that are insecure. It builds on the idea that web pages index a large number of public pages and files and make their discovery easy to create the correct query.

  • In which, we search the above-given keyword, that will provide many links.
  • In these links we select the first one and open it, it will provide an index, and search in this we use the search command in the database.
You might be interested in
your own choice Identify an organisation of whether factual of fiction with the following Consideration:The three best os to int
DedPeter [7]

Answer:

sorry dont know

Explanation:

7 0
3 years ago
Manipulate the SQL statement to pull ALL fields and rows from Customers table that have a PostalCode of 44000. TIP: Since Postal
padilas [110]

Answer:

There are two customers in the PostalCode.

SQL statement for select all the fields and the rows from the Customers table where PostalCode is 44000.

SELECT *  FROM Customers  WHERE PostalCode = "44000";

Explanation:

The SELECT statement retrieve zero or more than one row from 1 or more than one the database tables or the database views.  

In most of the applications, the SELECT query is most commonly used for DQL(Data Query Language) command.  

SQL is the declarative programming language and the SELECT statement specifies the result set, but they do not specifies how to calculate it.

6 0
3 years ago
What is the use of comma and semicolon with print statement ?​
Natasha2012 [34]

Answer:

The use of a comma and semicolon with print statement tells the computer that the program or specific line is ending.

Explanation:

So for example, with a python program if you write print("Hello, World"); the semicolon tells the computer that, that command ends at the semicolon.

8 0
3 years ago
Translate each of the following binary representations into its equivalent base ten representation.
Semenov [28]

Answer:

12, 2.375, 0.25, 17

Explanation:

A. 2^3 + 2^2 = 12

B. 2^1 + 2^-2 + 2^-3 = 2.375

C. 2^-2 = 0.25

D. 2^4 + 2^0 = 17

3 0
4 years ago
Write a program that inputs a text file. The program should print the unique words in the file in alphabetical order. Uppercase
satela [25.4K]

Answer:

Read the file and save it to a variable as a string, split the string variable and cast it to a set object using the set function to get the unique words in the file. Then use the max function with the key attribute to use regular expression module "re" to compare the first letter of each item to return in a list comprehension or append to a list.

Explanation:

The open function is used to import a file in python, the split string method splits the string to a list of items and the set function removes any duplicates of a word or item.

Using the for loop statement, iterate over the items and compare and return the items in alphabetical order with the 're' search method getting the item with uppercase letters with higher precedence than lowercase.

5 0
3 years ago
Other questions:
  • You are a network technician for a small corporate network. Today you moved an unused workstation to the IT Administration offic
    12·1 answer
  • Monochrome refers to the use of one color in various shades and tints
    6·1 answer
  • What type of hardward drive not require defragging??
    11·1 answer
  • This diagram shows who is responsible in preventing cyberbullying. A flowchart. Top box is labeled Cyberbullying can be prevente
    14·2 answers
  • Service-oriented architecture (SOA) provides a way for apps on a network to talk to each other using all these ways, EXCEPT ____
    10·1 answer
  • Qué es un bloque de programación?
    5·1 answer
  • Write instruction to recharge mobile phone ​
    5·2 answers
  • Plz help me to learn python and thx
    7·1 answer
  • Which of the statements below are true? Which are false?
    14·1 answer
  • What are the common camera hazards? When might you encounter these hazards in your life, and what do you plan to
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!