1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ulleksa [173]
3 years ago
9

Anyone bug bounty hunter ?​

Computers and Technology
1 answer:
Pachacha [2.7K]3 years ago
5 0

Answer:

your question is full of doubted

You might be interested in
___ a Word object in an Excel worksheet to activate the Word features. A. Ctrl-click. B. Shift-click C. Double-click D. Click
givi [52]
D.....................
8 0
3 years ago
Read 2 more answers
A Trojan horse:
Elis [28]

Answer:

The answer is "option D"

Explanation:

Trojan horse is a software, that is installed on a system and appears benign, but in actual it is the addition of malicious which unexpected modifications in config files and unusual activity even when the computer is idle are strong signs that a Trojan exists on a system. and other options are not correct that can be described as follows:

  • In option A, It is a malware that is also known as Trojan.
  • In option B, It is malware, not a virus but the malware includes viruses.
  • In option C, It doesn't install spyware on the user's computer.
  • In option E, It doesn't use for enterprise networks to penetrate.
4 0
3 years ago
Which are the two alternatives for pasting copied data in a target cell or a group of cells ?
dlinn [17]
First, you click and drag the letters/images you wanna copy, you do Ctrl + C then you clikc another cell until you get the flashing line, do Ctrl + V and there you go
4 0
4 years ago
Read 2 more answers
If a database table is to hold data on 52 students it must have 52?
Marina CMI [18]

Answer:

yes

Explanation:

6 0
3 years ago
Which presidential race has been called “the dirtiest in American history”
sdas [7]
The election of 1828, <span>President John Quincy Adams, and Andrew Jackson,</span>
3 0
4 years ago
Other questions:
  • The total cost of a DUI could be as high as----- dollars?<br> a100<br> b500<br> c1000<br> d8000
    15·2 answers
  • What is the answer to this?
    12·1 answer
  • A bakery sells three types of muffins whose prices are as follows: 1- blueberry muffin, $2.98 2- chocolate chip muffin, $4.50 an
    6·1 answer
  • How do you do these two questions? The first might have multiple answers and the second will have only one answer.
    14·1 answer
  • The at command is used to _______________.
    15·1 answer
  • What is the latest date you can file the FAFSA if you're planning to start
    6·2 answers
  • At the beginning of Section 5.2, it is stated that multiprogramming and multiprocessing present the same problems, with respect
    8·1 answer
  • Which of the following protocols help IP in multicast service?
    9·2 answers
  • What is the function of the operating system of a computer?
    14·1 answer
  • The ________ encloses and protects the power supply, motherboard, processor, and memory of a computer. drive bay solid-state sto
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!