Ramsay is a miscreant who has sent a keylogger spyware to his friend's computer. What is the likely consequence of this?

OA. Trojan horses will gain entry in his friend's system.

OB.

Viruses will be automatically removed from his friend's system.

Ос.

He can trace the keystrokes used by his friend to log into his account, and then hack it.

OD.

A demilitarized zone will be created in his friend's system.

Answers

Answer 1

Answer:

C. He can trace the keystrokes used by his friend to log into his account, and then hack it.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device. A keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In this scenario, Ramsay sent a keylogger spyware to his friend's computer. Thus, the likely consequence of this is that he can trace the keystrokes used by his friend to log into his account, and then hack it.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky etc.


Related Questions

In PowerPoint _____ management is extremely important and you must keep track of what links, files, and programs are placed in which folders.

Answers

Answer: File

Explanation:

In PowerPoint _file_ management is extremely important and you must keep track of what links, files, and programs are placed in which folders.

File Management is extremely important because it is necessary for effective system administration.

A good file management system in powerpoint makes compactness, data retrieval and editing achieveable.

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes

Answers

Answer:

Robocopy

Explanation:

The newer and most used command to accomplish this is Robocopy. This code does exactly what is described in the question, it copies the entire structure of the volume in question but still maintains all of its permissions and attributes. It also allows you to copy large datasets at an extremely fast speed, roughly 150 MB/sec. Robocopy can even resume interrupted file transfers without loss of data.

The following example demonstrates a program that uses 3 levels of nested dictionaries to create a simple music library. The following program uses nested dictionaries to store a small music library. Extend the program such that a user can add artists, albums, and songs to the library. First, add a command that adds an artist name to the music dictionary. Then add commands for adding albums and songs. Take care to check that an artist exists in the dictionary before adding an album, and that an album exists before adding a song.

music = {
'Pink Floyd': {
'The Dark Side of the Moon': {
'songs': [ 'Speak to Me', 'Breathe', 'On the Run', 'Money'],
'year': 1973,
'platinum': True
},
'The Wall': {
'songs': [ 'Another Brick in the Wall', 'Mother', 'Hey you'],
'year': 1979,
'platinum': True
}
},
'Justin Bieber': {
'My World':{
'songs': ['One Time', 'Bigger', 'Love Me'],
'year': 2010,
'platinum': True
}
}
}

#complete/edit code given below:

# Get user input

# While user input != 'exit'
# ...

Answers

Answer:

def add_album(artist,album):

   song_list = input("enter the list of song titles separated by comma: ").split(",")

   print(song_list)

   year = int(input("enter release year: "))

   is_platinum = bool(input("Is it platinum? True/False"))

   music[artist][album] = {}

   music[artist][album]['songs'] = song_list

   music[artist][album]['year'] = year

   music[artist][album]['platinum'] = is_platinum

def add_artist():

   artist = input("enter name of artist: ")

   if music.get(artist, "no") == "no":

       music[artist] = {}

       

   else:

       print("artist already exist in dictionary.")

   is_album = input("add album? ")

   if is_album == "yes":

       album_name = input("Enter album name: ")

       add_album(artist,album_name)

           

for _ in iter(dict, 0):

   is_exist = input("Do you want to end the program? yes/no: ")

   if is_exist == "yes":

       break

   elif is_exist == "no":

       is_art = input("Add artist? ")

       if is_art == "yes":

           add_artist()

       else:

           print("enter  yes/no")

   else:

       print("make a decision, yes/no")

Explanation:

The python program defines an "add_artist" and "add_album" function that references the dictionary "music". The functions prompt for user inputs of the artist name, album, year, and platinum record.

The functions use the bracket notation to access and update the dictionary in the memory.

_________ is a variety of mechanisms used to assure the integrity of a data unit or stream of data units.

Answers

Answer:

Data integrity.

Explanation:

Data integrity is a variety of mechanisms used to assure the integrity of a data unit or stream of data units.

In Computer programming, integrity constraints can be defined as a set of standard rules that ensures quality information and database are maintained.

Basically, there are four (4) types of integrity constraints and these are;

1. Key constraints.

2. Domain constraints.

3. Entity integrity constraints.

4. Referential integrity constraints.

For example, when a foreign key in Table A points to the primary key of Table B, according to the referential integrity constraints, all the value of the foreign key in Table A must be null or match the primary key in Table B.

Hence, any integrity constraint ensures that the relationship between the data in a table is consistent and valid.

Access will place ________ around a text string within a query criteria that will limit the results to their exact specifications.

Answers

Answer: quotation marks (")

Explanation:

Quotation marks are put around a text string within a query criteria so that the results of the specifications are limited. We should note that the criteria is defined as the conditions which the users can set inside the query in order for them to get the records that they want to return.

ANSWER QUICKLY PLEASE

Fill in the blank to complete the sentence.
Binary Digit 1 0 0 0 0 0 1 1
Decimal Equivalent of Place Value 128 64 32 16 8 ? 2 1

A high level language like Python is converted to bytecode, and then binary when the program is executed. The missing place value is this binary number is _____

Answers

Explanation:

I don't know what is the question.

? should have the value of 4

binary digit 10000011 is equal to 128 plus 2 plus 1 = 131 in decimal

Binary Digit 1 0 0 0 0 0 1 1 Decimal Equivalent of Place Value 128 64 32 16 8 4 2 1. A high level language like Python is converted to byte code, and then binary when the program is executed. The missing place value is this binary number is 131 in decimal.

What is Binary digit?

The term “binary” refers to the smallest and minimum two-digit number stored on a computer device. The smallest binary codes are zero (0) and one (1). The use of storing numbers easily. The computer only understands the binary language. The binary is converted into the number system as a human language.

The Binary digit is 1 0 0 0 0 0 1 1

1 × [tex]2^{0}[/tex]  = 1 × 0 = 1

1 × [tex]2^{1}[/tex]  = 1 × 2 = 2

0 × [tex]2^{2}[/tex] = 0 × 4 = 0

0 × [tex]2^{3}[/tex] = 0 × 8=  0

0 × [tex]2^{4}[/tex] = 0 × 16 = 0

0 × [tex]2^{5}[/tex] = 0 × 32 = 0

0 × [tex]2^{6}[/tex] = 0 × 64 = 0

1 × [tex]2^{7}[/tex] = 1 × 128 = 128

1 + 2 + 128 = 131 in decimal

(1 0 0 0 0 0 1 1) = (131)

Hence, the significance of the Binary digit is aforementioned.

Learn more about on Binary digit, here:

https://brainly.com/question/11110720

#SPJ5

g Let m be a positive integer with n -bit binary representation: What are the smallest and largest values that m could have?

Answers

Answer:

The smallest value that m could have is 0, while the largest is [tex]2^n - 1[/tex]

Explanation:

For numbers with n bits, we have that:

The minimum possible value is 0.

The maximum possible value is [tex]2^n - 1[/tex]

So, in this question, since the number m has n bits:

The smallest value that m could have is 0, while the largest is [tex]2^n - 1[/tex]

Which of the following is not true?A. An organization may express its cybersecurity state through a Current Profile to report results or to compare with acquisition requirements.B. Only critical infrastructure agencies may establish a Target Profile that can be used among their constituents as an initial baseline Profile to build their tailored Target Profiles.C. An organization may utilize a Target Profile to express cybersecurity risk management requirements to an external service provider (for example, a cloud provider to which it is exporting data).D. A critical infrastructure owner/operator, having identified an external partner on whom that infrastructure depends, may use a Target Profile to convey required categories and subcategories.

Answers

Answer: B. Only critical infrastructure agencies may establish a Target Profile that can be used among their constituents as an initial baseline Profile to build their tailored Target Profiles.

Explanation:

Of the options given in the question, the option that is false is option B "requirements.B. Only critical infrastructure agencies may establish a Target Profile that can be used among their constituents as an initial baseline Profile to build their tailored Target Profiles".

This is not true as the establishment of a target profile is not meant for the critical infrastructure agencies alone. Other infrastructural agencies or companies can also establish the target profile.

talon is a new game designer working on an exciting and innovative game idea, but its time to examine the idea for technical feasibility. what ? could Talon ask to determine the technical feasibility


a. Are there people who would buy your game? Are stores willing to sell it?


b. can this idea be technically achieved? Wil it work the limitations of hardware and programming resources?


c. Does the game do something new that will pique people interests?


d. Am i having tons of fun while playing this game?

Answers

A Because if no one will sell it, it will be pointless so if people sell it and buy it, it will be best so A

Are there people who would buy your game? Are stores willing to sell it? Talon asks to determine the technical feasibility Thus, option A is correct.

What is Technical feasibility?

Technical feasibility assesses the expert program's complexities and frequently entails figuring out whether it is able to use cutting-edge methods and instruments.

The analysis examines the viability of a project's four components: Scientific: A list of the necessary hardware, software, and manpower to render their function. Finance: A projection of the development's total cost and predicted return.

The time has come to assess the project's technological viability. Talon is a new coder who is working on an interesting and original gaming idea. Because it will be useless if no one buys it and no one sells it.

Therefore, option A is the correct option.

Learn more about Technical feasibility, here:

https://brainly.com/question/14208774

#SPJ2

Two time series techniques that are appropriate when the data display a strong upward or downward trend are ___________ and ___________. Group of answer choices

Answers

Answer:

adjusted exponential smoothing; linear regression.

Explanation:

A time series can be defined as a technique used in statistical analysis and it involves indexing sets of data elements in a timely or successive order i.e sequentially.

Two time series techniques that are appropriate when the data display a strong upward or downward trend are adjusted exponential smoothing and linear regression.

An adjusted exponential smoothing is a statistical technique used for forecasting through the calculation of the weighted average of an actual value.

In Python, when converting a string value into a numeric value that is a positive or negative whole number, the int() function is used.


True

False

Answers

Answer:

True

Explanation:

The Int  Variable can handle Positive and Negative Numbers, it just can't handle decimal numbers.

The statement "In Python, when converting a string value into a numeric value that is a positive or negative whole number, the int() function is used" is true.

What is python?

Python is a popular computer programming language used to create software and websites, automate processes, and analyze data. Python is a general-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

Python is a great programming language for experienced developers as well. It's one of the most widely used programming languages in the world, maybe as a result of how simple it is for novices to learn. Python is one of the most approachable programming languages due of its simple syntax and lack of complexity.

Therefore, the statement is true.

To learn more about python, refer to the link:

https://brainly.com/question/18502436

#SPJ5

What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud computing, high-definition mobile TV, and mobile 3-D TV

Answers

Answer:

4G/5G.

Explanation:

The broadband cellular network technology that mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud computing, high-definition mobile TV, and mobile 3-D TV is 4G/5G.

4G technology refers to the fourth generation broadband cellular network technology that is typically used for cellular communications on mobile phones and it is considered to have an internet speed that is ten times faster than what is obtainable on the third generation (3G) broadband technology.

Similarly, 5G is the fifth generation broadband cellular network technology that succeeded 4G and it offers higher quality in terms of performance, reliability, availability and efficiency.

As a result of the speed and high quality specifications of the 4G/5G broadband cellular network technology, they are widely used for various communications systems.

A software company used to run an algorithm sequentially on one server. As more users start using their app, the company decided to rewrite the program to be parallel. It is now run on four separate servers instead of one Thanks to the use of a parallel algorithm, the same process that used to take 40 minutes to run now only requires 20 minutes. The company is considering purchasing additional computers to decrease the time the program runs even further. Which of the following best describes the impacts of running the parallel algorithm on an even larger number of computers.

a. The algorithm will likely require more time since it is now being run sequentially on more computers.
b. The algorithm will likely require the same amount of time to run because it is processing the same amount of data.
c. The algorithm will likely require less time to run though the improvements in efficiency will not be as significant as before.
d. The algorithm is unlikely to still run since parallel algorithms are not designed to scale to additional computers

Answers

Answer:

a. The algorithm will likely require more time since it is now being run sequentially on more computers.

Explanation:

Algorithm is a software which enables the users to solve complex problems with input of commands. The software runs the command inserted and then output is generate. The algorithms can be run parallel and sequentially on more computers.

Write an application that displays the strings in the provided array alphabetically in ascending order.

Answers

Answer:

Explanation:

The following code is written in Python and it is a very simple function/program that takes in an array of strings as a parameter called names. This array is then passed the built-in sort function which automatically sorts it in ascending alphabetical order. Finally, the print method is called on the names array to print all of its elements out.

def sort_strings(names):

   names.sort()

   print(names)

In case of a suspected data breach, what course of action should a chief information security officer (CISO) take

Answers

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

In a study to add a new feature to a software program, the programmer introduced two categories, men and women, in the survey she conducted. Is the study observational or experimental

Answers

Answer:

Observational

Explanation:

In an observational study, the researcher simply conducts the observation of certain factors without intervening. This is unlike an experimental study where the researcher introduces controls in the research so as to compare the changes between the treated and the untreated groups.

The study above is an observational study because only two groups were surveyed and no control was used in the experiment to compare changes.

Describe the facility that allows multiple types of operating systems to run in a virtualized environment with varying types of hardware.  Include why this is so difficult and what challenges are overcome.

Answers

Answer:

Server virtualization

Explanation:

The facility or technology which enables multiple types of operating systems to be run together in a virtualized environment with varying types of hardware is called server virtualization.

Just as the name suggests, it involves a server (ie a computer that serves or allows the exchange of data between computers) allowing several different Operating systems (OS) to have their own different configurations.

The fact that the various operating systems will need their individual system configuration presents difficulties and challenges. Also, as the partitioning of the hardware resources has to be done, the server computer memory may become overused.

Can 10 people please answer these questions for my survey.

What’s your age?

How many siblings do you have?

How many hours did you sleep yesterday?

How many quizzes did you complete last week?

Answers

13, 1, maybe like 5, and maybe around 1-2

Answer:

17ys

12s

8h

0q

Explanation:

Modify your previous exercise to determine if the user can ride a rollercoaster. To ride the rollercoaster, you must be at least 42 inches tall. You must also be at least 9 years old. Ask the user how tall and how old they are. Use ONE if-else to determine if the user can ride the rollercoaster. Note how much cleaner this is and how much less repetition this method has.

Answers

Answer:

In Python:

age = int(input("How old are you? "))

height = float(input("How tall are you (inches)? "))

if age>=9 and height >= 42:

    print("You can ride the roller coaster")

else:

    print("You ca'nt ride the roller coaster")

Explanation:

The code segment of the "previous exercise" is not given; so, I rewrite the program from scratch using python.

And using the solution I provided, you'll have an idea of how to write the expected code If the "previous exercise" is not written in python,

This line prompts user for age

age = int(input("How old are you? "))

This line prompts user for height

height = float(input("How tall are you (inches)? "))

This checks if user is at least 9 years old and at least 42 inches tall

if age>=9 and height >= 42:

If true, the user gets to ride the roller coaster

    print("You can ride the roller coaster")

else:

If otherwise, the user will not ride the roller coaster

    print("You ca'nt ride the roller coaster")

My pc suddenly freezes and i can't open any apps or task manager. Apps do not open at all and if i restart from the start it gets stuck on restart forever. I have to force restart my pc a couple of times before it is back to normal. What is wrong?

Answers

Answer:

Explanation:

You might need a new computer or a new mother board

the cause of french revolution and anayze the reason for significane out come

Answers

Answer:

The French Revolution, which occurred from 1789 to 1799, was a time in French history when republicans overthrew the monarchy and the Roman Catholic Church went through a period of fundamental restructuring in France. While France swapped back and forth between republic, empire and kingship for 75 years following the fall of the First Republic into the hands of Napoleon Bonaparte, the revolution nevertheless marked the end of the ancient regime and put its followers in the shadows of the imagination of the French people.

The French Revolution began as a protest by the aristocrats against Louis XVI, the king of France and his absolute monarchy, and evolved as a major revolution that changed Europe's history and outlook.

A group called the Girondins, from the Bordeaux area, came to power but was opposed by the Jacobins group. The Jacobins were replaced by the Directoire, a middle-class group that had merged with the Girondins, and a new moderate government was formed. They came to power in 1794 but by 1799 they were considered corrupt and Napoleon took over. Napoleon came to the power with the support of the army and ruled as a tyrant. It was the need for stability and the disposition of the corrupt revolution that made the people willing to accept Napoleon even though he was a dictator. Napoleon brought a new order but many old institutions were also re-established.

In a systems development life cycle (SDLC) model, the purpose of the _____ is to create a physical model that will satisfy all documented requirements for the system.

Answers

Answer:

systems design phase.

Explanation:

In a systems development life cycle (SDLC) model, the purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system.

This ultimately implies that, that system design involves determining the overall system architecture, which is typically comprised of hardware, end users, physical processing components, software, and the communication channel that will effectively and efficiently satisfy the essential requirements of the system.

The system inputs and outputs will be designed along with a plan of the way the system's features will be navigated.

Basically, system design is divided into two groups;

I. Logical design.

II. Physical design.

The design of service systems is the process involved in planning, creating infrastructure, building communication, organizing staffs and standardization of a system so as to improve its quality and business relationships between the service provider and its clients. A characteristic that can be used to guide the design of service systems is to ensure services cannot be inventoried.

What is true about the process of converting analog data into digital data?

a

To make the digital version be a more accurate representation of the analog data, the process should use fewer bits to represent each sample.

b

The digital version is a representation of the analog data but cannot include all of the details.

c

A longer interval between measured samples means more details will be captured in the conversion from analog to digital

d

The digital version contains all of the details of the analog data, as long as enough storage capacity is available.

Answers

Answer:

b. The digital version is a representation of the analog data but cannot include all of the details.

Explanation:

Analog data are continuous infinite stream of data but since the computer has finite memory, these data could only be represented on the computer by converting them to finite data. This process is called analog to digital conversion.

The following are some of the things that should be noted when doing this conversion:

1. Since the digital version is a finite representation of the analog which is infinite, it (the digital version) cannot include all of the details in the analog.

2. For the digital version to be a more accurate version of the analog data it represents, as much bit as possible should be used to represent each sample.

3. Short intervals between measured samples means more details will be captured in the conversion from analog to digital.

Analog to digital conversion of data simply involves the converting an infinite stream of data into a Finite version of the same data.

Digital data are Finite representation of the infinite data typical of analog representation. Hence, a Finite sequence, will not habor all the data or information contained in an analog record.

Therefore, the digital data representation will only be a Finite representation of the analog data and will not contain all of the details.

Learn more :https://brainly.com/question/17557558

anybody got a quisten

Answers

Answer:

no why?

Explanation:

a. Convert decimal 37 to binary
b. Convert decimal 37 to hex decimal (Hint begin from binary above)
c. Convert binary 10111100111 to hexadecimal
d. Convert hexadecimal A1C to binary

Answers

Answer:

100101

25

5E7

101000011100

Explanation:

Maria wants to create a simple logo for her new flower shop. She would like to use the computer to create this logo. Maria should use a machine diagramming software CAD ​

Answers

Answer:

graphics software

Explanation:

Maria should use a graphics software

Encryption is an important topic in math and computer science. It keeps your personal information safe online.

a. True
b. False

Answers

Thus is true
Encryption helps to keep data virtually safe

If you often purchase items at the same e-tailer and do not have to type in your username and/or password, this probably means

Answers

Answer:

Explanation:

This probably means that your browser has saved your username and password into the browser's password manager. This usually occurs the first time you enter your username and password into a new website. The browser will detect this and request to save this information into the password manager. If you agree to do so it will save it and automatically enter this information when opening the site in the future.

If you often purchase items at the same e-tailer and do not have to type in your username and/or password, this probably means your username/password was stored as a COOKIE.

Cookies are small pieces of text (e.g., username/password, website logins, shopping carts, etc) used to identify a computer when using a computer network.

Cookies are useful to save you from having to type your own username or password every time.

However, these cookies may represent a vulnerability to privacy, although they cannot be used for obtaining personal information from your device.

In conclusion, if you often purchase items at the same e-tailer and do not have to type in your username and/or password, this probably means your username/password was stored as a COOKIE.

Learn more in:

https://brainly.com/question/1308950

Open & Place is used to insert the image in the same file. is it true or false?

Answers

it is true because it’s just the way i insert an image on a file i don’t know what other way to explain it

Which programming language uses objects? C++ ALGOL Pascal BASIC

Answers

Answer:

C++

Explanation:

I am a c++ dev

Answer:

its A

C++

Explanation:

Youre amazing

Other Questions
A polynomial function has a root of 7 with multiplicity 2, a root of 1 with multiplicity 1, a root of 2 with multiplicity 4, and a root of 4 with multiplicity 1. If the function has a positive leading coefficient and is of even degree, which statement about the graph is true? A. The graph of the function is positive on (2, 4). B. The graph of the function is negative on (4,infinity). C. The graph of the function is positive on (-infinity, 7). D. The graph of the function is negative on (7, 1). find the length of rsI will give branilest 815 gal/h = _______________qt/sec If you have 3.62 moles of Tin (Sn), how many grams do you have? a.031 grams b118.711 grams c32.79 grams d429.73 grams Emma is conducting an investigation to compare several physical properties of samples of two different kinds of rocks. When she measured and compared the masses of the two rocks, she found that rock 1 had a greater mass than rock 2. Which of the following is the best prediction of how another property of the rocks will compare? A. The density of rock 1 will be the same as the density of rock 2 B. The weight of rock will be the greater than the weight of rock 2 C. The volume of rock 1 will be less than the volume of rock 2 D. The state of matter of rock 1 will be different than that of rock 2 What percentage of the land in Australia is used for agriculture? A. 10% B. 25% C. 55% D. 70% Please select the best answer from the choices provided A B C D Write down the different types of resources and how it affects the development process? Which machine can create images of atoms? what can already be done to bio genetically grow tissue and organs, and what remains to be accomplished Which electron configuration could represent the electrons in a sodium atom in an excited state?(1) 2-8(2) 2-8-17(3) 2-7-1(4) 2-7-2 share 242 in the ratio 1:2:3:5 Why do you think it is important for the Constitution be from the people? What is the result when you multiply the product of two nonzero numbers by the product of their reciprocals? Find the measure of 2BDC:B22D68978112158 need help ASAPPP!!! The question is in the photo!!! Callie got a raise. Her initial salary was $37,000. If her new salary is $ 38,295, by what percent did her salary increase? Do you feel like this is an accurate modern-day portrayal of the Lotus Eaters? Why or Why not? A number decreased by 7 and then divided by 5 is 13 Fruit production in anthophytes develops from: a. a female reproductive structure b. a male reproductive structure c. both male and female reproductive structures d. photosynthetic signals A 9800 N car traveling at 22 m/s strikes a concrete bridge support and comes to a complete halt in 0.5 sec. Calculate the impulse of the force.