1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zanzabum
3 years ago
7

Please help ASAP!

Computers and Technology
2 answers:
AysviL [449]3 years ago
4 0

Answer:

GIVE this man Brainliest!

Explanation:

soldier1979 [14.2K]3 years ago
3 0
The answer to that would be D 120,120 pls ease mark me bralieat I had work hard on this one
You might be interested in
The attacker sent data that was able to manipulate the return address that is reserved to store expected data
KatRina [158]

Complete Question:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?

Answer:

A buffer overflow.

Explanation:

In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).

In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.

3 0
3 years ago
The technology Herman Hollerith created in the 1880s began the modern-day data processing function in computers.
adell [148]

Answer:

Punch Card Machine

Explanation:

The punch cards or the punched cards are also termed as the Hollerith cards or we also know them as the IBM cards. And they happen to be the paper cards where holes can be punched with the help of the hands or with the help of the machine for representing the computer instructions or data. And these were used on quite a large scale for inputting the data when we talk of the early computers. And this technology was developed by the Herman Hollerith.

7 0
4 years ago
Consider a tcp connection between host b and server
katrin2010 [14]
TCP stands for Transmission Control Protocol for Communication of the Internet.  It is used to  interconnect network devices on the Internet and it is a connection oriented protocol which means that the connection between the devices (in our case host b and sever C) is established and maintained until they finish to exchange messages. Source port number specifies the <span>application or services on host b and destination port number on host c. 
a. </span><span>The source and destination port numbers for the segments traveling from host c to host b are : source: 443 , destination: 2345.
b. From the destination port number (443) we can deduce that the server c that it is a web server. Port 443 is the standard port number for website which use SSL</span><span>(</span>Secure Sockets Layer<span>) .SSL is the standard security technology for establishing an encrypted link between a web server and a browser. </span>
7 0
3 years ago
In a ________ system configuration, separate information systems are designed and managed by each foreign unit.
jeyben [28]

Answer:

In a <u><em>decentralized</em></u> system configuration, separate information systems are designed and managed by each foreign unit.

Explanation:

hopes this help (:

4 0
2 years ago
1. Write the full forms of the following.
motikmotik

Answer:

  1. Language of Graphic Oriented
  2. Initial Public Offering
  3. Control Unit
  4. Central Processing Unit

  • False
  • True
  • False
  • True

  1. Versatility
  2. Smartphone
  3. All of the above
6 0
3 years ago
Read 2 more answers
Other questions:
  • Given non-negative integers x and n, x taken to the nth power can be defined as: x to the 0th power is 1 x to the nth power can
    7·1 answer
  • When registering a new domain name, either the registrar's servers or self-owned servers can be used as name servers. What funct
    15·1 answer
  • What is most likely kept in as database
    15·1 answer
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • Let’s say you are given a number, a, and you want to find its square root. One way to do that is to start with a very rough gues
    15·1 answer
  • While using a word processor to create a project report, Ashley includes the subject, title, and the author's name in the report
    7·1 answer
  • This shows you where text will appear as you type.
    14·1 answer
  • Which programming paradigm does the programming language JavaScript follow?
    14·1 answer
  • Consider that a man is watching a picture of a Black Horse. He receives an external stimulus from input channel. Man gains some
    14·1 answer
  • 14. How do digital libraries address the problem of digital exclusion?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!