1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
3 years ago
7

Select the correct answer.

Computers and Technology
1 answer:
nevsk [136]3 years ago
3 0
The answer is B or D

You might be interested in
A security administrator has replaced the firewall and notices a number of dropped connections. After looking at the data the se
Nata [24]

Answer:

The correct answer is Option(A) i.e., An SQL injection attack is being

attempted.

Explanation:

In this given question some information is missing and is not the complete question. The missing is given as :

SELECT * FROM and ‘1’ = ‘1’

Which of the following can the security administrator determine from this?

A. The SQL injection attacked is being attempted.

B. An Legitimated connections is being dropped.

C. The network scan are being done by the system.

D. An attack of XSS is being attempted.

Now, coming to the answer "The security administration sees that an SQL injection is attempted while it notices a lot of connection dropped and has replaced with the firewall and will be the possible issue flagged on it, SQL injection is a type of injection that possibly executes harmful or malicious statements and effects any website or web application".

Hence the correct answer is Option A.

5 0
3 years ago
Which tool uses images and other visual elements to provide artistic
timofeeve [1]

Two of the tool that uses images as well as other visual elements are;

Adobe Illustrator and Adobe Photoshop.

<h3>What are tools for designing?</h3>

Designing tools are the software that is been use to provide artistic inspiration  and used for different purpose of design.

These tools are very interesting and they provide artistic inspiration to programmers who are designing a program.

Learn more about tools at:

brainly.com/question/11013757

3 0
3 years ago
____ is any technology that aids in gathering information about a person or organization without their knowledge.
DanielleElmas [232]

Answer:

Spyware

Explanation:

In most cases, a spywares are unwanted software enters into your computer or other devices and steal sensitive information, your internet usage data, and other information. Spyware is considered a malware type and a malicious one that is aimed at damaging a device or gaining control and access without the knowledge of the owner.

4 0
3 years ago
Write a paper of at least 300 words that includes:
Marina86 [1]

Answer:Let’s start with a review of the essential steps in the career planning process.

Career Planning

Shepard and Mani define career planning “as an ongoing process through which an individual sets career goals and identifies the means to achieve them” (2013, p. 14). It is through career planning that a person evaluates abilities and interests, assesses values and personality, considers alternative career opportunities, establishes career goals, and plans practical developmental activities.

Career planning requires individuals to understand themselves and their values, interests, and skills. It is also an ongoing process, one that must be repeated with changes in employment and life circumstances. As you gain more experience and knowledge, the process will begin anew.

This section reviews the five essential steps of career planning, which are based on our research and input from industry experts:

Conduct a self-assessment

Research the labour market

Create your career search toolkit

Put your career campaign into action

Engage in networking

Let’s start at step one.

Step One: Conduct a Self-Assessment

Self knowledge is the key to choosing a career. It can be overwhelming to begin the process of self-assessment. However, if done well at the start, the likelihood of securing work that has meaning, purpose, and fulfillment is far greater. Understanding your preferences, knowing your strengths, and honestly facing the areas you need to develop are the first steps for effective self-assessment.

Explanation:

7 0
3 years ago
With an Internet connection, you can view, modify and delete files stored in your
Soloha48 [4]

Answer:

Computer

Explanation:

Files stored in the "cloud" are stored remotely in some file system in one or more data centers. To access these files from any device you need to have an internet connection. Technically speaking, you can Create, Read, Update and Delete(C.R.U.D) anything stored in any cloud from any internet connected device as long as you have the permission to do so.

4 0
3 years ago
Other questions:
  • Operating system software allows you to use your fingers, a mouse or other pointing device to select screen controls, such as bu
    5·2 answers
  • Which of the following statements is true?
    10·1 answer
  • pWhat macOS system application tracks each block on a volume to determine which blocks are in use and which ones are available t
    14·1 answer
  • A user on a home network needs to boost the signal of the wireless router. What should the user purchase to accomplish this?
    14·1 answer
  • In reference to computer communications, what does the term noise mean?
    8·2 answers
  • One of the greatest benefits of dual enrollment courses is that students can receive:
    15·2 answers
  • Select the correct answer.
    13·2 answers
  • design a relational database in EER for bike helmets and their reviews. a bike helmet has a name and color attributes. a bike co
    12·1 answer
  • What is shotgun microphone?
    7·1 answer
  • Computers that communicate over a network must follow certain ___ to ensure that the transmission is sent properly and understoo
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!