1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NemiM [27]
3 years ago
6

URGENT HELPP WILL MARK BRAINLIST

Computers and Technology
1 answer:
Semenov [28]3 years ago
3 0

Answer:

1. (1) Travel guide, (2) Study notes for students , (3) Some creative ideas that I want to share with others

2. (1) he or she would have some work related to the website I have created, (2) he or she would be interested in knowing about something which would be available in my created website

3. I want to learn how to add photos in the html pages

You might be interested in
. List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
Flura [38]

In cyber security, an exploit is a way attackers take advantage of certain vulnerabilities and gain malicious access to systems. There are very many types of exploits that exist in the cyber security world. However, I will mention those ones most commonly used.

DoS attacks – The denial of service attacks is very common. Hackers will gain access to servers and send so many packet requests at the same time. The servers become overwhelmed due to too much memory allocation and the huge amount of traffic ends up crashing the servers.

Unauthorized access – When an attacker has an illegal access to host machines

<u>Application Exploitation</u>

Code injection – This exploit can be used to maliciously inject invalid code into an application program or software and as a result change how the program behaves.

Cross-site scripting – Enable hackers inject malicious scripts on a website of a client. Once they have gained access, they will escalate their privileges and have more access to the site.

Clickjacking – A type of attack that tricks unknown victims into clicking links of a web page they believe are legitimate and end up revealing confidential information of themselves.

6 0
3 years ago
2. Why is there no country code for the USA?
babymother [125]

Answer:

there is a contrary

Explanation:

+1

4 0
3 years ago
Read 2 more answers
Which role is delegated to personnel of the IT department and is responsible for maintaining the integrity and security of the d
enyata [817]

Correct question.

Which role is delegated to personnel of the IT department and how is responsible for maintaining the integrity and security of the data?

Answer:

<u>data custodian</u>

<u>Explanation:</u>

Remember, every organization generates data, and large organizations generate even larger data.

Hence, the role of a data custodian in an organization requires He implements measures to protect the organization's data, store and backup the data, as well as granting access to the data to authorized persons when needed.

3 0
3 years ago
Which app is not a free app that your Microsoft account gives you access to
Ilya [14]

I believe the answer is Microsoft Office, Correct me if I'm wrong.

Really hope this helps!

5 0
3 years ago
The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately. editreg.
kenny6666 [7]
Regedit is the Answer
3 0
3 years ago
Other questions:
  • The EPA requires the use of precise forms called ?
    14·1 answer
  • Maria is comparing her history project's second-place award to her classmate's first-place award. She starts planning how to win
    6·2 answers
  • Multiple systems try to send data at the same time. The electrical impulses sent across the cable interfere with each other. Wha
    15·1 answer
  • Instructions:Type the correct answer in the box. Spell all words correctly.
    14·2 answers
  • Research at least two articles on the topic of managerial issues of a networked organization. Write a brief synthesis and summar
    8·1 answer
  • What allows a person to interact with web browser software?
    13·2 answers
  • A proprietary operating system designed for mobile devices, with associated libraries, user interface, frameworks and reference
    9·1 answer
  • List and describe the tools for all the main stages of app/application development.
    11·1 answer
  • To defragment a disk means to ____. slow it down, diagnose problems with it, reorganize it, repair it
    8·1 answer
  • You have to calculate the total amount you spent at the mall today. Which function should you use to do so?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!