1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tcecarenko [31]
3 years ago
14

Cuál es la diferencia entre hackeo y crackeo

Computers and Technology
1 answer:
Sauron [17]3 years ago
3 0

Answer: El hackeo es el proceso de intrusión en los sistemas informáticos sin autorización para acceder a ellos, con buenos o malos propósitos, el cracking es la misma práctica aunque con intención delictiva.

You might be interested in
A binary search algorithm is written (as in the modules, for example) which searches a pre-sorted array for some user-defined va
Mazyrski [523]

Answer:

c) it will always return with an answer of 7 or fewer comparisons of data.

Explanation:

As maximum number of comparison in worst case for sorted binary search is log₂n, here n = 100, so maximum search is at least 6.6 which is approximately 7.

4 0
3 years ago
What name is used to denote a common field that exists between two tables, but is also the primary key for one of the tables??"
Diano4ka-milaya [45]

Answer:

b. foreign key

Explanation:

In the database world, a foreign key is a field on one table and a primary key for another table. The purpose of a foreign key is to provide linkages between two or more tables. Given two tables A and B, and making A the point of reference, a primary key is a field that is unique in A while a foreign key is unique in B.

On another hand, a composite primary key is a combination of two or more fields/columns on database table that can be used to uniquely identify each row in the table.

In the database lingua, what we have is a unique key not a distinct key, though the two words are similar in meaning.

A duplicate key is used when an information may be repeatedly entered on a table.

So the correct option is a foreign key.

4 0
3 years ago
An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of ite
hjlf

Answer:

2 times as many items can be uniquely identified

Explanation:

Option 'C' is the answer. because

if we use 6 bit binary sequence

then

No. of Unique address will be = 2 ^ 6  = 64

as we increase the bit by 1. Now total bits are 7.

so

No. of Unique address for 7 bit Sequence = 2 ^ 7  = 128

So,

128 is double of 64, that is 2 times greater value than 64.

6 0
3 years ago
In what order does the Cascade look at factors to determine which CSS rule to follow?
Vinil7 [7]

Answer:

In other words, the CSS rules can "cascade" in their order of precedence. Where the rules are located is one factor in the order of precedence. The location order of precedence is: browser default rules, external style sheet rules, embedded styles, and inline style rules.

5 0
3 years ago
1
Vitek1552 [10]

Answer:

A

Explanation:

.

.stack 4096

ExitProcess PROTO, dwExitCode:DWORD

.data

Sun=0

Mon=1

Tue=2

Wed=3

Thu=4

Fri=5

Sat=6

warray BYTE Sun, Mon, Tue, Wed, Thu, Fri, Sat

INVOKE ExitProcess, 0

7 0
3 years ago
Other questions:
  • Write a program that loops one thousand times. add all the even numbers and display the results. add all the odd numbers and dis
    13·1 answer
  • A directional antenna issues wireless signals along a(n) ____ direction.
    9·1 answer
  • When planning the structure of a spreadsheet, columns are for _______ items and rows are for _______ items.
    5·2 answers
  • Katarina is deciding whether to buy a desktop or a laptop computer. What will most likely help Katarina make her decision?
    10·2 answers
  • What is the first and last value of i to be displayed by the following code snippet? int n = 20; for (int i = 0; i <= n; i++)
    10·1 answer
  • The algorithm ____ is used to find the elements in one range of elements that do not appear in another range of elements.
    5·1 answer
  • Rule number one for handling an emergency is to _____. A. buy a new vehicle B. call law enforcement C. remain calm D. restart th
    6·2 answers
  • Pls answer 10 points ​
    10·2 answers
  • A computer is defined by 4 specific criteri. Select all 4.*
    10·1 answer
  • You can open a movie maker project file any time in a media player. (1 point) true false
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!