1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
3 years ago
8

After hacking into atm systems remotely using a laptop, What attacker worked with the atm manufacturers to resolve the identifie

d security vulnerabilities
Computers and Technology
1 answer:
Aneli [31]3 years ago
3 0

grey hat hackers are those after hacking into ATM systems remotely using a laptop, works with the ATM manufacturers to resolve the identified security vulnerabilities

  • A grey hat hacker is simply known as an hacker that falls between the range of black and white hacker. They are known to illegally break into systems so as to show off their skills to the administrator of the system they penetrated or to seek to sell their services in repairing security breaches.

  • In the ATM case, they attacked it and then also want the ATM manufacturer to use their service.

Conclusively we can therefore say that the hacker was a gray hat hacker.

Learn more from

brainly.com/question/15899195

You might be interested in
"A switch passes data based on the MAC address."A. TrueB. False
Maru [420]

Answer:

A. Ture

The switch keep track where computers are connected to bus based on there on there MAC address and only forward traffic if computers that communicate are in another zone in this case on other side devices on an ethernet network will not detect or notice the network switches for computers the switches are transparent

8 0
3 years ago
write the structure of an email message ques.2 what do you mean by search engine? write its component .ques. 3 what are the adva
loris [4]

Answer:

1.....There is a standard structure for emails. Email contents are primarily classified as two, the header and the body. We are going to see the contents come under the two subparts. The email header gives us common details about the message such as the unique identity of the message.

Explanation:

2......a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.

its components are ....

A search engine normally consists of four components e.g. search interface, crawler (also known as a spider or bot),indexer, and database.

3.....Advantages Of eLearning

It is a very efficient way of delivering courses online. Due to its convenience and flexibility, the resources are available from anywhere and at any time. Everyone, who are part time students or are working full time, can take advantage of web-based learning.

hope this will help you ..

please like and mark as brilliant.

4 0
3 years ago
The class attribute
Elodia [21]

the answer is d plz let me know if i got it right

6 0
3 years ago
compare the two methods of creating table in ms access ( Datasheet view and Design view) which one wouldyou prefer to use to rec
Snezhnost [94]

The main difference between the datasheet view and the design view is in the datasheet view, we can only view and do minor changes but in the design view, we can edit the table and modify it.

<h3>What is MS Access?</h3>

MS Access is a service of Microsoft, that is used in the sector of business and other companies, to store and manage data.

Datasheet view and design view are the two types of tables in ms access, the design view has more functions, you can change and edit the table.

Thus, the primary distinction between the datasheet view and the design view is that while we can examine and make some minor adjustments in the datasheet view, we can edit and amend the table in the design view.

Learn more about MS Access, here:

brainly.com/question/17135884

#SPJ1

5 0
2 years ago
Question 1 (1 point)
lisov135 [29]

Answer:

  1. costumes
  2. systematic thinking
  3. sensing
  4. motion
  5. cap block
  6. stack block
  7. computational thinking
  8. programming
  9. computational thinking

Brainlist Pls!

8 0
3 years ago
Other questions:
  • Annabeth has been using a public cloud to store and access her documents. Which drawback of a public cloud should she be aware o
    11·1 answer
  • ​What file system below does not support encryption, file based compression, and disk quotas, but does support extremely large v
    10·1 answer
  • The ___ value is the number of time units a programmed timer is programmed to count before timed contacts change state.
    8·1 answer
  • (TCO 4) What will the following program segment display? int funny = 7, serious = 15; funny = serious % 2; if (funny != 1) { fun
    14·2 answers
  • Which of these statements about symmetric key encryption is true? The file is encrypted with a private key and can be decrypted
    14·1 answer
  • In the space provided, analyze the pros and cons of becoming a member of an artistic guild. Your answer should be at least 150 w
    12·1 answer
  • What is payload?
    8·1 answer
  • Plsss help me plsssssss
    11·1 answer
  • Match the protocols to their use. HTTP POP3 SMTP FTP You check email in your inbox. arrowRight You send an email to a friend. ar
    14·1 answer
  • __' the low level language? a.machine and assembly c.3G and 4G d.machine and 4gl​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!