1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
3 years ago
7

One popular hacking tool is key-logging software. a. True b. False

Computers and Technology
1 answer:
Tamiku [17]3 years ago
7 0
True. It would reveal to an attacker sensitive information the victim types in, such as passwords and credit-card numbers.
You might be interested in
What would be the result of running the command chown :root file1.txt
REY [17]

Answer:

b. This would set the group ownership of file1 to root.

Explanation:

Linux allows user to have his own files and regulate the ability of other users to access them. The <em>chown</em> command allows you to use the appropriate utility to change the owner of a file or directory.

The basic command syntax is as follows:

# chown [options] <owner name: owner group name> <file or directory name>

For example, if you want to give a user <em>root</em> opportunity to use the <em>file1.txt</em> file as he wishes, you can use the following command:

# chown root file1.txt

In addition to changing the owner of a file, the group of its owners or both can be changed at the same time. Use a colon to separate the username and user group name (without the space character):

# chown user2:group2 file1.txt

As a result, the user with the name <em>user2</em> will become the owner of the <em>file1.txt</em> and its group will become <em>group2</em>.

In your case omitting username

# chown :root file1.txt

will change owner group only.

8 0
4 years ago
Which of the following activities is primarily an employer’s responsibility to help prevent workplace violence?
Lera25 [3.4K]
I believe that's b, i'm not 100% sure though
5 0
3 years ago
Read 2 more answers
_________ is the process of scanning the network to find out which Internet Protocol (IP) addresses are attached to potentially
andre [41]

Answer:

Host discovery

Explanation:

Hot discovery is one of the preliminary stages of network reconnaissance, it begins with different IP addresses that belongs to a particular network and adopts various methods to scan and know if a host is at the IP address. Host discovery is also known as ping scan when a sonar analogy is used.

Host discovery helps to scan the particular type of host on one's network.

5 0
3 years ago
Which options are qualities of all good requirements documents?
kolezko [41]
Consistent
feasible
scholarly
verifiable
8 0
3 years ago
2.4 Code Practice: Question 1 write the code to input a number and print the square root. Use the absolute value function to mak
Alekssandra [29.7K]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

//main function

int main()

{

   // variable

  int n;

  cout<<"enter a number:";

  // read the input

  cin>>n;

  // find the square root of the absolute value

  float square_root=sqrt(abs(n));

  // print the square_root

  cout<<"square root of "<<n<<" is: "<<square_root<<endl;

   return 0;

}

Explanation:

Read a number from user and assign it to "n".Then find its absolute value with abs() function.Then calculate the square root of the absolute value with sqrt() function.Print the square root of the number.

Output:

enter a number:-17

square root of -17 is: 4.12311

5 0
3 years ago
Read 2 more answers
Other questions:
  • How do you create a logo on Adobe illustrator
    8·1 answer
  • What is an example of a functional organizational structure?
    10·2 answers
  • in access, entering the search criteria "B?" would yield which of the following results? a. bentonville b. be c. brimingham d. b
    14·1 answer
  • Value or power of a network grows exponentially as a function of the number of network members. this is known as ________ law.
    8·1 answer
  • What can be defined as in information technology environment?
    14·2 answers
  • You are not sure if a certain word has an"e"at the end<br>​
    11·1 answer
  • What is the purpose of the domain name system
    15·2 answers
  • If you got band from a local library, what would be the reason for it besides shouting and talking? You're answer has to fit you
    15·2 answers
  • What does this icon mean? <br> Plz hurry it’s for a school quiz you will get a brainly
    10·1 answer
  • Need help ASAP <br><br> Thankss + BRAINLIST only for correct answers
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!