1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slega [8]
3 years ago
5

. What process skill would a scientist use to find the length of a line

Computers and Technology
1 answer:
Brilliant_brown [7]3 years ago
7 0

Answer:

Explanation:

A ruler

;););););););););););););););)

You might be interested in
Linda subscribes to a cloud service. The service provider hosts the cloud infrastructure and delivers computing resources over t
siniylev [52]

Answer

Public cloud

Explanation

A cloud service is any service that is made available to users who are on demand via internet from the cloud computing service providers.  These service providers have servers in their company premises where they offer the services from.

A public cloud is a type of computing in which a service provider makes resources available to the public via the internet. The service provider hosts the cloud infrastructure and delivers computing resources over the Internet Resources vary by provider but may include storage capabilities, applications or virtual machines.


3 0
3 years ago
Again, consider what you believe to be the goal of performing a penetration test. Why would you worry about doing any privilege
Strike441 [17]

Answer:

Penetration monitoring is conducted based on the vulnerability evaluation (Were a susceptibility evaluated and mentioned).

Explanation:

Penetration Test

  • Penetration testing is carried out from both within (the network or application) as well as outside that aims to gain access to the system to evaluate if any suspicious activity or improper behavior is likely within the device.
  • When there are some other potential security vulnerabilities, they are all found in the integration check that involves vulnerability assessment for frameworks and checking for network management.
  • Automation of penetration testing is used to make it work better.
  • Penetration monitoring deals with the same risk evaluation correlated with a disadvantage.

Privilege escalation

  • They need to think about known vulnerabilities as the system for network management works conditional on the privilege rates. Such that, increasing user has an article has highlighted and the consumer is only allowed to control or use the resources that should be used appropriately, depending on the level of privilege.
  • If he gets elevated access then it will be a failure to have access control mechanism.

Leaving backdoors

  • The creator uses backdoors to test the system's functionality during the designing processes.
  • The loophole can be a workaround overriding the identification for all users, or a default password.
  • They would need to worry about leaving the backdoor because the backdoor.which is performed either deliberately or involuntarily will circumvent the entire security mechanism.
  • During the intrusion testing process, the both privilege increase and the escape from the gateway can be discovered due to the research being done both inside and outside the device.
  • The tester's testing phase acts as various users so that any destabilization of access may be found.
  • The tester will use all numerous methods to supersede the technique of official approval, but when there are certain backdoors, maybe he can start by pointing that out.

6 0
3 years ago
(a) List 5 keys we can type with our left hand fingers
ehidna [41]

Answer:

A) <em><u>a,s,d,f, and either g or caps lock</u></em>

B) <u><em>l,k,j,h, and, ;</em></u>

Explanation:

3 0
3 years ago
one data is in memory the computer interpets and executeinstructions to process the data into informationA. TrueB. False
lidiya [134]

Answer:

Option A is the correct answer for the above question.

Explanation:

  • The computer is a system that processes the data to produce information. For any computer system when the data is processed then it will form the information.
  • The user gives some instruction to process that can also be called the program. Then the computer takes the instruction and processes the data on behalf of the instruction and for the information because in any system when data is processed it can form the information.
  • The above question says that the computer follows the instruction to process the data to produce the information which is correct as described above. Hence True is the correct answer to the above question.
4 0
3 years ago
Does a 21.6v battery work with a 24 volt controller
Mila [183]
Yes but you will need more than one battery
3 0
3 years ago
Other questions:
  • 23. For the 16-bit binary number 1001 0101 1100 0011, show the effect of: a. A right shift of 4 bits with zero fill. b. A right
    13·2 answers
  • What is the main storage location of a computer
    13·1 answer
  • In what areas is leslie's underspending hurting her
    10·1 answer
  • Which sign or symbol will you use to lock cells for absolute cell reference
    5·1 answer
  • Which cost of purchasing a franchise would you still have if you start your own business​
    12·1 answer
  • Question 1 Multiple Choice Worth 5 points)
    10·1 answer
  • How long does it take to be placed in a class on flvs?
    14·1 answer
  • What should you do to organize a large amount of data??
    10·1 answer
  • int temp; temp = 180; if ( temp &gt; 90 ) { System.out.println( "This porridge is too hot." ); // cool down temp = temp – ( temp
    9·1 answer
  • The data source in the document which has the information common to all documents. True or false 
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!