1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
3 years ago
15

50 Points Will Give brainliest Help (right answers only please)

Computers and Technology
2 answers:
monitta3 years ago
7 0

It is indeed the boss... I know you already said that's corect, but now I can get points! :P

gulaghasi [49]3 years ago
6 0

Answer:

The boss, since it’s none of her business that Delilah’s appointment was for mental health, and asking for a doctor’s note after the fact is harassment, and docking her pay might be illegal.

That's what I think (I hope I'm right).

You might be interested in
What is cache memory?Mention its importance. ​
Rus_ich [418]

Explanation:

collection of items of the same type stored in a hidden or inaccessible place.

3 0
3 years ago
What is booting as used in computers?​
Sliva [168]

Answer:

the startup process

Explanation:

5 0
3 years ago
Read 2 more answers
Different network scenarios require the
Vladimir [108]

Answer:

a) Viruses

Explanation:

Vulnerability assessment is performed by variety of tools and these can be protocol analyzer, vulnerability scanner, Honeypots, port scanners, honey nets and banner grabbing tools.

Port scanners : they are used to scan the ports which can be exploited by attackers. Most of TCP/IP applications communicate using different ports and attackers can exploit these ports if they are found vulnerable. for example : ports like 80 and 443 are commonly used for HTTP and SSL communication. 22 is used for SSH and if they are open to world then it will allow attackers to use those to get the entry into the system.

Protocol Analyzers : They are used to analyze the packet captures. tools like wireshark, tshark, these tools will help user to decode HTTP/SSL/HTTPS/FTP/RSTP or any application protocols communication. this will help user to understand any unwanted or non-anticipated traffic.

Vulnerability Scanners : They are used to detect the vulnerabilities in the network or systems. these will help administrators to get the alerts whenever there are unanticipated activity. It will have two types of scanners one is active scanner and other is passive scanner. Active scanners will keep on sending probes at the fixed time slots and passibe scanners will be in listening mode all the time. These scanners will alert when a new nodes comes up or goes down or if any system gets compromised.

Honeypots and Honey nets : They are devices or softwares which are having limited security. These devices are made vulnerable purposefully so that attackers can try and attack.  This will help softwares to detect the attackers when they try to exploit these open vulnerabilities. They are deceptions created with purpose.

Banner grabbing Tools : These are tools which will capture the banner information like HTTP protocol version, underlying operating system, open ssl versions being used, server software and similar information. these are important as it will open up potential vulnerabilities in the underlying software. for ex : SSLv3 has a vulnerability known to world and can be exploited by anyone.

4 0
3 years ago
A constructor is just a special type of ______________ that instantiates an object from the class.
Dmitry_Shevchenko [17]

A constructor exists just a special type of subroutine that instantiates an object from the class.

<h3>What  is constructor?</h3>

A constructor exists as a special kind of subroutine in a class. It maintains the same name as the name of the class, and it has no return type, not even void. A constructor exists called with the new operator in order to create a new object.

A constructor exists as a special process of a class or structure in object-oriented programming that initializes a newly constructed object of that type. Whenever an object exists created, the constructor is called automatically. A constructor in Java exists as a special method that is utilized to initialize objects. The constructor exists called when an object of a class is created.

A subroutine exists as a sequence of program instructions that serves a specific task, packaged as a unit. This unit can then be utilized in programs wherever that separate task should be performed.

Hence,  A constructor exists just a special type of subroutine that instantiates an object from the class.

To learn more about constructor refer to:

brainly.com/question/13267121

#SPJ4

8 0
1 year ago
If a person is proactive, they do NOT have to be defensive.<br> True<br> False
Thepotemich [5.8K]
The answer is true for this question
6 0
3 years ago
Read 2 more answers
Other questions:
  • What is the software called that allows the user to create, access, and manage a database? question 8 options:
    10·1 answer
  • Which windows tools would you use to browse the files system on a hard drive?
    6·2 answers
  • An interface is a class that contains only the method headings and each method heading is terminated with a semicolon. True Fals
    7·1 answer
  • Which wildcard characters will return a single character when using the Find dialog box?
    6·2 answers
  • If we can lock a file, we can solve the race condition problem by locking a file during the check-and-use window, because no oth
    14·1 answer
  • What are the characteristics of good blogs?
    8·1 answer
  • Please answer the following essay question:
    13·1 answer
  • What are the advantages of customer relationship managment​
    10·1 answer
  • JUST NEED TO KNOW WHO ALL DOSE EDGINUITY
    12·2 answers
  • Why does the peot use a simular pharase at the beggining of each stanza
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!