1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
3 years ago
9

Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t

o create a command prompt and redirect it to her local computer?
Computers and Technology
1 answer:
VikaD [51]3 years ago
7 0

Answer:

I would say that if she is connected to the server and has grained access to the server, Wendy would have to use the command shortkey win+r (to run) or she could just use the "Type here to search" function.

Then you can type the words "cmd" to bring up the command prompt

Lastly, she would need to use the protocol scp to transfer files. Wendy might need to include a destination for the files to be directed to.

You might be interested in
In one or more complete sentences, explain about vehicle maintenance and vehicle safety
aivan3 [116]
Vehicle maintenance is important because without them the vehicle would not function properly and could be a safety hazard. Vehicle safety is important because without it we could end up seriously injured or even killed, vehicles can be very dangerous if handled irresponsible and the proper safety methods are not used.<span />
5 0
3 years ago
Read 2 more answers
Suppose we can buy a chocolate bar from the vending machine for $1 each. Inside every chocolate bar is a coupon. We can redeem s
Tanya [424]

Answer and Explanation:

Using JavaScript:

/* program should take N input which represents the dollar amount and output how many chocolate bars and how many coupons we have*/

function chocolatebar(dollars){

var dollaramt= dollars;

var i;

for(i=0; i <= dollaramt; i++){

i=i+6

?

Alert ("you have 1 extra chocolate bar");

:

Alert ("keep buying chocolate bars to get more coupons for a bonus chocolate bar")

}

}

*

7 0
3 years ago
Information​ technology, especially the use of​ networks, can help firms lower the cost of​ ________, making it worthwhile for f
aniked [119]

Answer:

MARKET PARTICIPATION.

Explanation:

<em>Because this way the firm size can stay constant or contract even if the company increases its revenues. Information technology helps firms contract in size because it can reduce transactions costs. According to the transaction cost theory, firms and individuals seek to economize on transaction costs, much as they do on prodcution costs. For instance, by using computer links to external suppliers, the Chrylser Corporation can achieve economies by obtaining more than 70 percent of its parts from other companies.</em>

5 0
3 years ago
Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number for which a
myrzilka [38]

Answer: C

Explanation:

I believe this is because you cannot represent the number sixteen with only four binary bits. The highest you can go is 15.

3 0
3 years ago
Q9. Complete the table with the name of the functions
umka21 [38]

Answer:

1. VLOOKUP function.

2. SUMIF function.

3. COUNT function.

4. IF function.

5. HLOOKUP function.

Explanation:

Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents. There are different types of functions used in Microsoft Excel to perform specific tasks and these includes;

1. VLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized vertically. Thus, it's typically used for searching values in a column.

2. SUMIF function: it is an Excel function to sum cells that meet criteria such as text, dates and numbers. This function can be used with the following logical operators; <, >, and =.

3. COUNT function: it's an Excel function to find the total number of entries in a column. For example, to count the number of entries in B1:B15; COUNT(B2:B15).

4. IF function: runs a logical test and returns one value for a TRUE result, and another for a FALSE result. For example, to fail scores that are below 40; IF (A1 < 40, "Fail", "Pass").

5. HLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized horizontally. Thus, it's typically used for searching values in a column.

4 0
3 years ago
Other questions:
  • Data hiding, which means that critical data stored inside the object is protected from code outside the object, is accomplished
    14·2 answers
  • the equation t= 0.25d^1/2 can be used to find the number of seconds, t, that it takes an object to fall a distance of d feet how
    8·1 answer
  • You can create a database using one of the many templates available or by creating a new ______ database.
    9·1 answer
  • What is f(-3) for the function f(a)=-2a2-5a+4?​
    10·1 answer
  • FS and GS are two___________________ in protected mode.
    14·1 answer
  • Is technology a legal discipline or law is a technological artifact.
    6·1 answer
  • Which of the following are examples of software? (Select all that apply)
    9·2 answers
  • A client calls to complain that his computer starts up, but crashes when Windows starts to load. After a brief set of questions,
    13·1 answer
  • (Language: Python) How can you know what value is in a variable by looking at the code?
    14·1 answer
  • Michael is stuck due to an electric shock generated at the fridge. What should you do to save michael?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!