1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adoni [48]
3 years ago
6

What type of attack can a firewall not protect against? A. Port scanning B. Database dump C. Insider threat D. Ping sweep

Computers and Technology
1 answer:
olga nikolaevna [1]3 years ago
4 0

Answer:

C. Insider threat

Explanation:

an insider threat is a threat that comes from within the network, not outside of the network. firewalls protect from outside threats.

You might be interested in
Mention how to install antivirus software in your computer, either by following the instructions given on installation CDs or we
Tema [17]

Answer:

ionow please help me

Explanation:

5 0
3 years ago
When a CPU executes each instruction in a program, it uses a process known as the __________.
lapo4ka [179]

Answer:

The answer is "fetch-decode-execute cycle"

Explanation:

The FDE cycle stands for Fetch-Decode-Execute cycle, It is a computing operation, in which a CPU process, to retrieves the system in its order memory form, it also decides that what instruction is supposed to do, and executes certain activities.  In this process, the operating system loads the files and the program on a disc to the main memory (RAM).

8 0
4 years ago
How would you determine if your earned credits would transfer to a regionally accredited school?
rodikova [14]

Answer:

D hope this helped - Willow

8 0
3 years ago
Read 2 more answers
Write a program that prompts the user to enter a month (1-12) and year, then displays the number of days in the month. For examp
uysha [10]

Answer:

In Java

import java.util.Scanner;

public class Main {

public static void main(String[] args) {

    int mnth, yr;

 Scanner input = new Scanner(System.in);

 System.out.print("Month: ");  mnth = input.nextInt();

 System.out.print("Year: ");  yr = input.nextInt();

 boolean lpYear = (yr % 4 == 0 && yr % 100 != 0) || (yr % 400 == 0);

 if(mnth == 1 || mnth == 3 || mnth == 5 || mnth== 7 || mnth == 8 || mnth == 10 || mnth == 12){

     System.out.print("31 days");  }

 else if(mnth == 2){

     System.out.print(((lpYear) ? "29 days" : "28 days"));  }

else if(mnth == 9 || mnth == 6 || mnth == 4 || mnth== 11){

     System.out.print("30 days");  }

 else{      System.out.print("Invalid");  }

}

}

Explanation:

See attachment for complete program where comments were used as explanation.

Download txt
3 0
3 years ago
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
3 years ago
Other questions:
  • A digital footprint is all of the information on-line about a person posted by that person or others, ____________. intentionall
    14·1 answer
  • If you want to access your files anywhere from almost any connected device, you should store your files on your ________.
    9·1 answer
  • What is used in computers to communicate with wireless keyboards, mice, and printers?
    8·1 answer
  • Examples of language translator
    12·2 answers
  • Which of these is NOT a reason why you would print handouts of your presentation?
    14·1 answer
  • Which of the following keys open the spelling and Grammer dialog box
    6·1 answer
  • ¿Por qué en Colombia la mayoría de las empresas no son automatizadas (manejadas por computadoras y robots?
    15·1 answer
  • Why do we need to know the different Networking Devices?​
    10·1 answer
  • Join the class <br> The class code is hello112
    5·2 answers
  • Jorge, a sports statistician for soccer, has kept track of how many shots-on-goal each player on a team made in each game. This
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!