1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
13

Please hellppp,is a yr 9 question

Computers and Technology
1 answer:
stealth61 [152]3 years ago
7 0

Answer:

See picture below.

You might be interested in
Gary says, "Ports are where data enter a network before reaching a gateway. The data travel via transmission media." Explain why
Romashka [77]

Answer:

He is wrong, it is the communication endpoint.

4 0
4 years ago
Read 2 more answers
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
Katarina is deciding whether to buy a desktop or a laptop computer. What will most likely help Katarina make her decision?
Gnesinka [82]
Laptops are portable decides , while desktops remain in one plcae
4 0
3 years ago
Read 2 more answers
The internet is an example of
DochEvi [55]
A large multi user program
6 0
3 years ago
Read 2 more answers
In the following project, you will edit a worksheet that will be used to summarize the operations costs for the Public Works Dep
yan [13]

Answer:cgtd

Explanation:

3 0
3 years ago
Other questions:
  • Which statement about trees is false?
    12·1 answer
  • Jabez needs to alert through an SMS text message those corporate users who have a specific brand and type of mobile device regar
    13·1 answer
  • Which of the following is NOT true about high-level programming<br> languages?
    9·2 answers
  • You are a police officer trying to crack a case. You want to check whether an important file is in the evidence room. Files have
    5·2 answers
  • Formulas within table cells always begin with
    5·1 answer
  • You started writing a paper yesterday. You worked on it again today. After a few hours, you realized that you have introduced so
    15·2 answers
  • A browser is a program that allow
    11·1 answer
  • In python, sorry if it’s blurry
    13·2 answers
  • When you download a file from the internet where should you go to find it?.
    14·1 answer
  • scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!