1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
3 years ago
9

Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t

o create a command prompt and redirect it to her local computer?
Computers and Technology
1 answer:
VikaD [51]3 years ago
7 0

Answer:

I would say that if she is connected to the server and has grained access to the server, Wendy would have to use the command shortkey win+r (to run) or she could just use the "Type here to search" function.

Then you can type the words "cmd" to bring up the command prompt

Lastly, she would need to use the protocol scp to transfer files. Wendy might need to include a destination for the files to be directed to.

You might be interested in
What at some advantages of creating a powerpoint?
Umnica [9.8K]
 <span>A power point presentation is designed as a presentation tool for any individual that needs to present information in a basic or through the use of a template and/or animated sequences with the flow of information, whether images, [ or text boxes as well as sound if speakers are present; all of which is used to make it more interesting and convey to people. Power point is used for all types of reasons, either for a selling tool such as sales & marketing; academic presentation of certain tasks and pieces of research, et cetera. it can be exported to a PDF or another format to allow further manipulation; it can be saved as a package onto a CD/DVD if you are submitted the presentation by disc. Depending on the version you use, you can customise the way you can present the information itself. Due to the flexibility of the application, if you are for instance using another graphic application to create images and special effects; you can normally drag and drop the content straight into the program without having to import it through the File menu options of Power Point, but again it depends on the version.</span>
8 0
3 years ago
As part of its commitment to sustainability, a company is looking for a way to track the source of purchased goods and how they
luda_lava [24]

The primary technology that would enable the company to achieve this goal is Blockchain technology

  • Blockchain is commonly defined as an enclosed, encrypted, distributed database that is distributee in a wide range of multiple computers or nodes that are part of a community or system.

  • It is an exciting technologies as it helps to limit the incidence of security breaches by even its own users.

  • With Blockchain, a company can be able to guard against thefts of their products and also monitor them.

From the above we can therefore say that the answer to The primary technology that would enable the company to achieve this goal is Blockchain technology is correct

Learn more from:

brainly.com/question/24875333

6 0
3 years ago
Read 2 more answers
What is the relationship between an object and a class? A. An object is an instance of a class. B. A class is an instance of an
trapecia [35]

Answer:

A. An object is an instance of a class.

Explanation:

ʕ•ᴥ•ʔ

3 0
3 years ago
Why CD-ROM is more reliable than floppy disk?​
irakobra [83]

Answer:

See explanation below.

Explanation:

The CD-ROM is a hard surface. Data is burned into the CD-ROM using a laser. The information in the CD-ROM is pretty stable and usually safe for a long time.

A Floppy Disk is a less hard surface. It is a thin film of magnetic material. Data is stored on the Floppy Disk using a targeted magnetic field. The information can be damaged by getting the disk close to a magnetic source. Even small grains of dust can cause a Floppy Disk to lose data.

This is why a CD-ROM is more reliable than a Floppy Disk.

Hope this helps! Have an Awesome Day!! :-)

3 0
3 years ago
What does a compiler do, and why is it necessary when using higher-level languages?
UkoKoshka [18]

Answer:

A compiler converts human readable instructions into machine code (machine readable instructions). Without it, a computer will not be able to understand the code that was written and execute it. Since higher programmer languages are easier for humans to read and write and effective compiler is needed. This has to do with how the compiler does much of the work when it comes to programming.

A great example is a drag and drop programming language. The compiler does all the work in the background before the machine can actually execute the code, but the language itself is incredibly easy to read and write by human standards. Without the compiler, it would be impossible for the machine to execute any code.

Explanation:

High Level programming languages like Python has a system that turns our easy to read human code into something the computer can actually read. Python for example, doesn't compile the code as it was design to do it as it runs.

Low level programming languages like Objective C uses a compiler to change the human readable code to machine code. You can tell a compiler was used when there is a 2nd file, one that can't be read by humans. This is the compiled code that the machine actually runs.

8 0
4 years ago
Other questions:
  • What network monitoring technology enables a switch to copy and forward traffic sent and received on multiple interfaces out ano
    9·1 answer
  • What is the name of the formal procedure scientists use to study the world around them?
    14·2 answers
  • VURULU<br> The default style in Word is called the
    6·1 answer
  • What is one reason that writing effective messages is so important
    11·2 answers
  • PLEASE HELP FAST
    5·1 answer
  • Look at (d), is it accurate? ​
    9·2 answers
  • Where does an antivirus run suspicious applications?
    12·1 answer
  • In order to convert your project to a mobile platform, you need to do all of the following except:
    14·1 answer
  • What is the best use of network in homes
    15·2 answers
  • Write a recursive decent algorithm for a java while statement, a Javas if statement , an logical/mathematical expression based o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!