1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jobisdone [24]
3 years ago
14

Please help me ASAP!

Computers and Technology
2 answers:
zimovet [89]3 years ago
7 0
The person previous to my response is correct. The answer is security hacker. In the description it specifically states that her job involves hacking into the companies system.
VARVARA [1.3K]3 years ago
6 0

Answer:

security hacker

Explanation:

security hackers are people who hack software to check for vulnerabilities. most of the time security hackers are white hat hackers who work to perform penetration tests to see if a software is secure.

tell me if this is wrong :)

You might be interested in
Authorized agent Confidentiality Integrity Encryption 6:53 PM ______ means that only people with the right permission can access
mojhsa [17]

Answer:

The answer is "Confidentiality"

Explanation:

Confidentiality alludes to shielding data from being gotten to by unapproved parties. All in all, solitary the individuals who are approved to do so can access delicate information. Imagine your bank records, You ought to have the option to get to them obviously, and representatives at the bank who are assisting you with an exchange ought to have the option to get to them, yet nobody else ought to. An inability to keep up Confidentiality implies that somebody who shouldn't have access has figured out how to get it, through deliberate act or coincidentally. Such a disappointment of Confidentiality, normally known as a breach  can't be helped. When the secret has been uncovered, it is highly unlikely to un-uncover it.

Assuming your bank records are posted on a public site, everybody can realize your bank account number, balance, and so forth, and that data can't be eradicated from their brains, papers, PCs, and different spots. Virtually all the significant security occurrences reported in the media today include loss of Confidentiality.

Thus, in summary, a breach of Confidentiality implies that somebody accesses data who shouldn't be permitted to.

6 0
3 years ago
Although it is not a term Excel uses, how do most people think of Excel?
kobusy [5.1K]

They think of it as a spreadsheet

5 0
3 years ago
Software that people commonly use in the workplace to make their lives easier is called
Bogdan [553]
It is either System Software or Productivity Software.

Hope this helps!
3 0
3 years ago
Tecty Motors Pvt. Ltd. has recently deployed RFID technology in the vehicles which allows the car owner to unlock the car with t
loris [4]

Answer:

The answer is B.

Explanation:

Radio Frequency Identification (RFID) is a technology that uses radio waves to  secure objects, pair devices, tag them etc. and it is made up of a transmitter which emits radio waves and a receiver.

The example given in the question where Jamie listens to the communication between the RFID tag and the devide of the user and copies the information to later use it to gain access to the vehicle is an example of a replay attack.

Also called "eavesdropping & replay", the first part is the listening to the conversation to steal the data and the replay part is where he uses the information to gain access.

I hope this answer helps.

7 0
3 years ago
Which Outlook view should Shane access to schedule a meeting with another individual inside his organization?
AnnyKZ [126]

Answer: the answer is option D.

Explanation:

Firstly, Shane must choose the option "Calendar". In there, she will have to select the time in which she would like to schedule the meeting (by doing double click on the selected time slot).

Secondly, the "Appointment" window will open. In there, Shane will have to complete "Subject" (Rationale of the meeting - e.g. "Performance Review discussion"), "Location" (where would the meeting be held - e.g. Room 5.1, 5th floor), select start time and end time. Within the meeting body, she would be able to detail the high level agenda that the meeting will be carrying on.

Thridly, she will chose the icon "Invite Attendees" and will have to enter the contact's e-mail.

Finally, in order to make sure that the person is available for the selected time, it's always recommended to press the button "Schedulling Assistant" and review if the requested individual has his agenda clear (available) for the meeting.

3 0
3 years ago
Other questions:
  • In Python, what kind of error is returned by the following code? (e.g. NameError, ValueError, IOError, etc.) def my_func(n1, n2)
    8·1 answer
  • Which view shows how the document will look when printed?
    11·1 answer
  • What appears in the document after you have inserted a video?
    14·2 answers
  • What Windows Server 2016 feature implements software-defined storage and is intended to make storage more versatile by making it
    11·1 answer
  • Write a program that scores a blackjack hand. In blackjack, a player receives from two to five cards. (The player decides how ma
    5·1 answer
  • If K is a foreign key in relation R1, then
    10·1 answer
  • One advantage of using personal computers for Internet access is that they have relatively large screens for viewing Internet co
    7·2 answers
  • Public class Student {
    14·1 answer
  • Who plays Pokemon Go if you do put your code in your answer so I can friend you.<br><br><br> o_o
    5·2 answers
  • What types of activities are ideal for a robot to perform?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!