1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
12

Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services

are running determine what exploits have been committed determine what systems are up and running
Computers and Technology
1 answer:
Rufina [12.5K]3 years ago
3 0

Answer:

Network footprinting is used to ______________________.

test for vulnerabilities.

Explanation:

Network footprinting is the technique that reveals system vulnerabilities and how the vulnerabilities can be exploited.  Hackers use footprinting to determine the location and objective of a network.  The discovery of this specific information about the organization can lead to the hacking of the network.  Network footprinting relies on loopholes to create vulnerabilities in a network and plans for cyberattack.

You might be interested in
PLZZZZ I NEED THE ANSWER NOW PLZZZZ!!!!!!!!!!!!!!!!!!!!!!!!! Which one of the following is considered a peripheral? A Software B
kaheart [24]

D is the answer  motherboard is correct

3 0
3 years ago
the corrective actions you need to perform on a computer in case it functions in an unexpected manner is called what
Vadim26 [7]
These actions are called troubleshooting. One of the first ones would be to save your work, if you can, close all open programs and then shut down your computer (not restart). Wait a couple if minutes, start and see if the problem has been alleviated.
5 0
4 years ago
Write a method named circleArea that accepts the radius of a circle as a parameter (as a real number) and returns the area of a
lions [1.4K]

Answer:

  public static double circleArea(double radius){

       double area = 3.142*Math.pow(radius,2);

       return area;

   }

Explanation:

Find the complete program in java that prompts the user to enter a value for radius, stores it in a variable, calls the method circleArea() and passes the value for the radius, then displays the area.

import java.util.Scanner;

public class CocaColaVendingTest {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Please enter the value for radius");

       double r = in.nextDouble();

       //Calling the method circleArea()

       double calcArea = circleArea(r);

       System.out.println("The Area is: "+calcArea);

   }

   public static double circleArea(double radius){

       double area = 3.142*Math.pow(radius,2);

       return area;

   }

}

6 0
3 years ago
) Write the JS code to load the 3rd party script before ready event triggers and after successful load show your name on the bro
Vlad1618 [11]

Answer:

Following are the code to this question:

var id= document.createElement('script');//defining id varaible that uses the createElement method  

ld.src = "https://code.jquery.com/jquery-3.5.1.min.js";//defining id varaible with src that holds the source link

alert("The loaded Script is: ");//defining alert box that print Script loaded.

Explanation:

In the above-given code, an id variable is defined that uses the createElement method, which helps to create the specified name with the Element Node, and in the next line, it uses the src with the id variable, that store the link, it also helps to loads the 3rd party script, which is displayed in an alert msg box.

8 0
4 years ago
Consider the following class definitions.public class Bike{private int numWheels = 2;// No constructor defined}public class EBik
nadya68 [22]

Answer:

The answer is "Option A".

Explanation:

Please find the complete program in the attached file.

The given program includes a super-class Bike having a private integer numWheels parameter. The class EBike inherits the class Bike, EBike comprises one parameter function Object() which utilizes its variable number of the private integer Battery level of the battery parameter and the wrong choice can be defined as follows:

In choice B, it is wrong since there is no constructor with a single argument in the Bike class.

In choice C, it is wrong since there no need to call the base class constructor with the super keyword.

In choice, D is wrong because there no need to create a constructor of the base class.

In choice, E is wrong because it does not require the second EBike constructor parameter.

4 0
3 years ago
Other questions:
  • What feature should an administrator use to meet these requirements?
    8·1 answer
  • _______ are created under ________, similar to how you create individual files within a broader file folder
    9·2 answers
  • How do I change my keyboard's debounce time?
    15·2 answers
  • You are using a new release of an application software package. You think that you have discovered a bug. Outline the approach t
    14·1 answer
  • Write a program that calculates the occupancy rate for each floor of a hotel. The program should start by asking for the number
    10·1 answer
  • Why should ERP architecture include a discussion on organizational structure, business processes, and people, instead of just in
    5·1 answer
  • What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typic
    14·1 answer
  • How do i make a profile picture <br> REALLY URGENT I NEED IT NOW!!!
    8·2 answers
  • A line graph is a great tool for showing changes over time. Why is a line graph better than other graphs at showing this type of
    6·1 answer
  • Execute and explain this program using // in Layman's language. Thank you!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!