1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
2 years ago
14

HELP ASAP PLZZZZZ

Computers and Technology
1 answer:
musickatia [10]2 years ago
3 0

Answer:

third one

Explanation:

You might be interested in
Who is he can anyone help me​
34kurt
This person is Elon Musk, the owner of Tesla :)
5 0
2 years ago
Read 2 more answers
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
2 years ago
3. Coaxial/telephone cable sends<br> during the data transmission<br> signal
Vlad1618 [11]

Answer:

high frequency signal.

3 0
2 years ago
?an ip address reservation is made by creating an association between an ip address and what type of client identifier?
victus00 [196]
The ethernet address, a.k.a. mac address. That way, a DHCP server can give the same IP address to a returning client.
3 0
3 years ago
How will you keep the buzz going post-hackathon?
Anna71 [15]

Answer:

it would be nice if you gave some form of info here

Explanation:

in other words without information no help aka I'm slow and just need points

8 0
1 year ago
Other questions:
  • Will upvote all answers
    7·1 answer
  • What is encyclopedia. Com considered to be?
    14·1 answer
  • In most software packages, the function key F1 is used to run the _____program.
    10·1 answer
  • When projecting a presentation on a large screen, what should your minimum font size be?
    6·2 answers
  • In a gear system, when you gain torque you lose what?
    11·1 answer
  • In two to three sentences, describe one advanced search strategy and how it is useful.
    13·1 answer
  • In the table below, identify the data type that would be most suitable for the second field.
    10·2 answers
  • Write a python statement that print the number 1000
    6·1 answer
  • Write a python program to change variable value of your previous result percentage to your current percentage of mid-term
    13·1 answer
  • View One | View All
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!