On the last day at their job, a disgruntled employee accesses a company server
and deletes an entire library of internal projects. What is this an example of?
O Attack vector
O Ransomware
O Nation State Actor
O Penetration Testing
O I don't know this yet.
Submit answer

Answers

Answer 1
Nation state actor. I believe is the answer

Related Questions

When should students in a study session use flash cards to quiz one another?

while reviewing
while drilling
while discussing
while preparing`

Answers

When drilling, students in a study session use flashcards to quiz one another. thus, Option B is the correct statement.

What do you mean by drill and practice?

The term drill and practice can be described as a way of practice characterized by systematic repetition of concepts, examples, and exercise problems.

Drill and exercise is a disciplined and repetitious exercise, used as an average of coaching and perfecting an ability or procedure.

Thus, When drilling, students in a study session use flashcards to quiz one another. Option B is the correct statement.

Learn more about drill and practice:

https://brainly.com/question/27587324

#SPJ1

What is spy wear on a desk top computer

Answers

Answer:

Spyware is when a hacker gathers confidential information and data by logging the user's key presses (keylogging) etc and uses it for fraud or identity theft. That's also why touchscreens are safer than keyboards.

Explanation:


What are the functions of information technology?

Answers

There are six basic functions of IT.

1. Capture: Compiling detailed records of activities.

2. Processing: Converting, analyzing, computing and synthesizing all forms of data and information.

3. Generation: Organizing information into a useful form.

4. Storage: Retaining information for further use.

5. Retrieval: Locating and copying stored data or information for further processing or for transmission to another user.

6. Transmission: Distributing information over a communication network.

write an algorithm to find the area of a circle of radius r

Answers

Answer:

e=mc^2

Explanation:

Two negative reviews and no positive reviews is enough to consider the website to have a negative reputation.

Answers

Two negative reviews and no positive reviews is enough to consider the website to have a negative reputation: False.

What is reputation?

In Computer technology, reputation can be defined as a metric which is used to determine the quality of a particular website, especially based on the opinions and ratings by its end users.

In this context, we can infer that two negative reviews and no positive reviews isn't an enough metric to consider a website as having a negative reputation.

Read more on negative reputation here: https://brainly.com/question/2343924

#SPJ1

Enter a formula in cell E4 to calculate how long each item has been on sale. This is calculated by subtracting the launch date in cell D4 from the Data Updated date in cell C20. To show the time in years, divide that result by 365. Use an absolute reference to the date in cell C20. Copy the formula from cell E4 to cells E5:E14.

Answers

The formula is given below:

(C20-E4)/365

where 365 is the no of the days.

In a spreadsheet application, an absolute cell reference is a cell reference that doesn't change even if the spreadsheet's size or shape changes, or if the reference is copied or relocated to a different cell or page. When making references to constant values in a spreadsheet, absolute cell references are crucial.

Learn more about cells here https://brainly.com/question/25879801

#SPJ10

What are key objectives of DevOps at Accenture?

Answers

The key objectives of DevOps at Accenture is simply to deliver services faster, with higher quality and with security built in.

What are DevOps?

DevOps can be defined as a set of tools, processes, practices, and a cultural philosophy that are combined so as to help in automating and integrating the processes that exist between software development and information technology (IT) teams.

This ultimately implies that, the key objectives of DevOps is focused on the ability of Accenture to deliver software applications and services at high velocity, with higher quality and with security built in.

Read more on DevOps here: https://brainly.com/question/24306632

#SPJ1

What does an else statement do?
A. gives an alternative to the test conditions
B. always executes
C. nothing

Answers

Answer:

A

Explanation:

If the first condition are not true then it executes else, but if the first condition is true then it ignores the else statement

True or false, cases must use curly braces like other test condition statements
A. true
B. false

Answers

Answer:

False

Explanation:

You can use curly braces to scope everything that's inside of the case body, but they are not necessary.

There are cases where you will need explicit bodies for cases:

If you have two different cases that both contain a variable called 'x', you will need to scope one or both of the cases.

What is scoping?

Scoping in a language defines where variables can be accessed, or referenced.

int i = 0;

// First scope

{

int x = i + 10;

}

// Second scope

{

int j = x + 2;

}

Console.WriteLine(j);

There are a few errors in this code.

In the second scope, we try to use the variable 'x' which was defined in the first scope, but we can't find that variable because it is defined in a scope that cannot be reached by the second scope. The same goes with the Console.WriteLine(j); line, we try to access a variable that is not defined in the current scope, and is instead defined in a nested scope.

In most languages, scoping is essentially a stack, where the lower nested scopes can access variables defined in the previous scope, but not the other way around.

So now you know a little bit about scopes; when to use them in case bodies, and that you do not have to use a body for a case if it's not necessary.

Why is it important not to leave your personal information on a public computer?
A. Other people need a clean computer to use.
B. Someone can steal the information and hurt you.
C. It makes it hard for the next person to log in.
D. It's rude and someone else has to clean up after you

Answers

Answer:

B. Someone can steal the information and hurt you.

Explanation:

People can hack into your accounts using your informations and spread hurtful things that can make people hurt. The people will think that you posted this (even if you didn't) and blame you.

Discuss the relationship amongst the following basic file elements: • Field. • Record. • File. • Database. • Directory.​

Answers

Answer:

describe two events from the life of the prophet that illustrate the way he treated non muslims3+15-75+375.

Explanation:

53+15-75+3756,1803+15-75+375describe two events from the life of the prophet that illustrate the way he treated non muslims

Watch any film of the silent era. Choose a short film from any genre that is less than 30 minutes long. Write a review of your experience of watching this film. Make comparisons with a modern film of the same genre that you have recently watched.

Answers

 A review of your experience of watching this film. Make comparisons with a modern film of the same genre that you have recently watched The Consistency of the Silent Era Technique in The Artist.

What have been a number of the principal silent movie genres?

Many early silent movies have been both dramas, epics, romances, or comedies (frequently slapstick). One-reelers (10-12 minutes) quickly gave manner to four-reel feature-period movies.

From the factor of visible method seems there are a few which can be ordinary of the silent film technology this is appearing players, kind of shot, modifying transitions, intertitles and sound strategies together with using track at some stage in the movie.

Read more about the comparisons :

https://brainly.com/question/25261401

#SPJ1

Which benefit does serverless compute provide?

Answers

Answer: this’s an architecture where code execution is fully managed by a cloud provider, instead of the traditional method of developing applications and deploying them on servers

what's an example of radical technological change

Answers

Some radical technology changes are:

3D printing - from the Thing-O-Matic less than 10 years ago to now - people are 3D printing houses (with a concrete admixture), cakes and food items, steel objects with additive welding nozzles… SpaceX even 3D prints some of their rocket engine parts!

Please hit the thanks button :)

Answer:

An example of radical technological change is a metromile which is a US car insurance company.

I hope it helps you.

Can someone please tell me how to do this step by step?

ASAP

Answers

The steps that are required to customize elements of a Word document and its formatting to be consistent with other magazine articles are listed below.

How to customize elements and format a document?

In Microsoft Word 2019, the steps that are required to customize elements of a Word document and its formatting to be consistent with other magazine articles include the following:

You should apply a style set.You should change the color of an underline.You should use the Thesaurus.You should change the character spacing, change the font color and update a style.You should apply a character style.You should change the font case.You should insert a Quick Part.You should insert a table of contents.You should change the table of content (TOC) level.You should apply a style.You should update the table of contents.

In conclusion, the end user should update the table of contents as the last step, so as to reflect the change to his or her Word document.

Read more on Microsoft Word here: https://brainly.com/question/25813601

#SPJ1

Complete Question:

As the owner of On Board, a small business that provides orientation services to international students, you are writing an article about starting a business that will be published in an online magazine for recent college graduates. You need to customize elements of the document and its formatting to be consistent with other magazine articles. What are the steps?

1. The letters that appear after the dot after a file name are called the:
file name code.
file extension.
file descriptor.
file locator.

Answers

Answer:

Files Extension.

Explanation:

The letters that follow the period at the end of a file name are the file's extension. This enables the computer to know what application it should use to read the file.

1.Microsoft Word is a/an ........​

Answers

Answer:

company I believe

Explanation:

I believe

Answer:

It is a word processing software

Explanation:

Hope this helps

Give me an answer. How to hack somebody click 'disabled​​​​​​​' to my office wifi? I can't use it no longer.​​​​

Answers

How to hack somone is illegal but for study purposes there is yt tutorials that I recommend You watch because hacking is not simple and it requires a pc or laptop There is multiple ways to hack somone as well A commAn way for hacking is to self fake links

Which loop structure always uses a semicolon after the test condition?
A. for
B. do-while
C. while

Answers

Answer:

I would have to go with A

Explanation:

It could be B, but I'm going with A because of the fact that right after the condition, there is a semicolon, whereas for the do-while loop, the semicolon comes after the )

Syntax:

// For loop

for (int i = 0; i < 10; i++)

{

// Body

}

// Do-while

int i = 0;

do

{

i++;

// Other code

} while(i < 9); // We do i < 9, because by the time we get to the condition, i = 10, because the increment happens before the condition is checked

Answer:

do-while

Explanation:

syntax:

do {

//the statements;

} while(the condition is true);

In the other two types of loops, you can put a semicolon after the condition, but it signifies the end of the statement (e.g.  for loop, it will mean end of for statement and it's body will have no meaning)

Write a program that first reads a list of 5 integers from input. Then, read another value from the input, and output all integers less than or equal to that last value.

Ex: If the input is:

50 60 140 200 75 100
the output is:

50 60 75
For coding simplicity, follow every output value by a space, including the last one. Then, output a newline.

Such functionality is common on sites like Amazon, where a user can filter results. coral language, please

Answers

Answer:

take user input element of list and print element of list whose value  are less than equal to last value of list

Image 1: Input

def output_ints_less_than_or_equal_to_threshold(user_values, upper_threshold):

      print("The integers that are less than or equal to", upper_threshold, "are:")

      for value in user_values:

             if value < upper_threshold:

                    print(value)

def get_user_values():

      n = int(input("Enter the number of integers in your list: ");

      1st = []

      print("Enter the", n, "integers:");

      for i in range(n):

             1st.append(int(input)

      return ist

if _name__ == '_main_':

userValues = get_user_values();

upperThreshold = int(userValues[-11), output ints less than or equal to threshold(userValues, upperThreshold)

Image 1: Output

Enter the number of integers in your list: 3 Enter the 3 integers:

10

50

20

The integers that are less than or equal to 20 are:

10

Using the knowledge in python it is possible to write a code that uses the given values ​​to write its divisors.

Writing code in python:

integer i

integer threshold

integer array(5) data

for i = 0; i < data.size; i = i + 1

  data[50, 60, 140, 200, 75, 100] = Get next input

threshold = Get next input

for i = 0; i < data.size; i = i + 1

  if data[50, 60, 140, 200, 75, 100]

 

See more about python at brainly.com/question/18502436

#SPJ1

This program will output a right triangle based on user specified height triangleHeight and symbol triangleChar. It is strongly suggested to use the for loop for this solution.

(1) The given program outputs a fixed-height triangle using a * character. Modify the given program to output a right triangle that instead uses the user-specified triangleChar character.


(2) Modify the program to use a nested loop to output a right triangle of height triangleHeight. The first line will have one user-specified character, such as % or *. Each subsequent line will have one additional user-specified character until the number in the triangle's base reaches triangleHeight. Output a space after each user-specified character, including after the line's last user-specified character.


Example output for triangleChar = % and triangleHeight = 5:


Enter a character:

%

Enter triangle height:

5


%

% %

% % %

% % % %

% % % % %


#include

< stdio.h >


int main(void) {

char triangleChar;

int triangleHeight;


printf("Enter a character:\n");

scanf("%c", &triangleChar);


printf("Enter triangle height:\n");

scanf("%d", &triangleHeight);

printf("\n");


printf("* \n");

printf("* * \n");

printf("* * * \n");


return 0;

}

Answers

The program illustrates the use of loops;

Loops are program statements that are used to perform repetition

The complete program

The modified program in C, is as follows:

#include<stdio.h>

int main(void) {

   char triangleChar; int triangleHeight;

   printf("Enter a character: ");    scanf("%c", &triangleChar);

   printf("Enter triangle height: ");    scanf("%d", &triangleHeight);

   for (int i = 0; i<triangleHeight; i++){

       printf("\n");

       for(int j = 0;j<=i;j++){

           printf("%c",triangleChar);

       }

   }

   return 0;

}

Read more about loops at:https://brainly.com/question/24833629

#SPJ1

I have been stuck on this lab this is my program.

Given four values representing counts of quarters, dimes, nickels and pennies, output the total amount as dollars and cents.

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print(f'Amount: ${dollars:.2f}')

My program:
quarters = int(input("Quarters: "))

dimes = int(input("Dimes: "))

nickels= int(input("Nickels: "))

pennies= int(input("Pennies: "))

dollars = (quarters * 0.25 + dimes * 0.10 + nickels * 0.05 + pennies * 0.01)

print("Amount: ${:.2f}".format(dollars))


not sure why my answer is for wrong.

my output is: (with input)
1

2

3

4

Quarters: Dimes: Nickels: Pennies: Amount: $1.41

expected out put is : Amount: $1.41

What about my code adds the extra part to my answer?

Answers

They are using the knowledge of computational language in python to write the values ​​of the coins and the total we find that

Writing code in python      

quarters = int(input())

dimes = int(input())

nickels = int(input())

pennies = int(input())

cents = (quarters*25 + dimes*10 + nickels*5 + pennies)

#convert cents to dollars

# 1 dollar = 100 cents

# n cents = n/100 dollars

dollars = cents / 100.00

#Print the amount in dollars upto two decimal places

print("Amount: $"+"{:.2f}".format(dollars))

See more about python at brainly.com/question/18502436

#SPJ1

analyse how the reduction in size and the profitability of computer have influence their usage​

Answers

HOPE ITS HELP

IN THE PICTURE

Demonstrate an understanding of the use of preventive procedures

Answers

Thre are 3 types of prevention Primary prevention, secondary invention, and tertiary invention.

What do you mean by prevention?

The process of stopping anything from happening by being prepared and getting rid of it quickly. prophylaxis. the control of illness. save.

Three different kinds of preventative initiatives:

Primary prevention entails taking action before negative health impacts arise.Screening to find diseases as soon as possible is secondary prevention.Managing disease after diagnosis in order to slow down or stop it is known as tertiary prevention.

Learn more about Preventive procedures:

https://brainly.com/question/7183215

#SPJ1

Which of the following is an antivirus software?
McAfee
Mozilla Firefox
Windows Firewall
Y2K

Answers

Answer:

McAfee

Explanation:

An antivirus is a standalone software that protects other software. On the other hand, a Firewall is capable of preserving both software and hardware on the network.

The antivirus software is McAfee. The correct option is A.

What is antivirus software?

An antivirus program detects and removes viruses and other types of malicious software from your computer or laptop.

Malicious software, also known as malware, is code that can harm your computers and laptops, as well as the data they contain.

Antivirus software is needed even though if persons are using a Mac or a Windows device, both of which encompasses some level of virus protection.

Install third-party antivirus software for total protection, including endpoint protection and response, as well as protection against malware and potentially unwanted programs.

Antivirus software scans your files and incoming email for viruses and deletes any that are found. McAfee, Norton, and Kapersky are examples of anti-virus software.

Thus, the correct option is A.

For more details regarding antivirus software, visit:

https://brainly.com/question/23845318

#SPJ2

Briefly explain purpose of input device​

Answers

Answer:

Mouse, Keyboard, Headphones, Mouse dongle.

Explanation:

Input Device Definition: A piece of equipment/hardware which helps us enter data into a computer is called an input device. For example keyboard, mouse, etc.

Answer:

Input devices are those devices connected to the computer which are used to enter the data. Input can be in the form of text, graphics and sound. There are different types of input devices for different types of inputs.

Explanation:Today, input devices are important because they are what allows you to interact with and add new information to a computer. For example, if a computer had no input devices, it could run by itself but there would be no way to change its settings, fix errors, or other various user interactions. Also, if you wanted to add new information to the computer (e.g., text, command, document, picture, etc.), you wouldn't be able to do so without an input device.

If x=5 and y=3 will this condition execute? if(x > y)
A. yes
B. no

Answers

Yes
Because the x bigger than the y
A. yes

because 5 > 3 is a true value, therefore if(True) will execute

What do conditions do for programs?
A. faster processing
B. adds versatility
C. crashes them

Answers

Answer:

add versatility thank you

explain why you would use the soft on/off jumper when working on ATX system

Answers

Explanation:

Soft power prevents a user from turning off a system before the operating system has been shut down. It enables the PC to use power-saving modes that put the system to sleep and then wake it up when you press a key, move a mouse, or receive an e-mail (or other network traffic).

How can MS Word aid healthcare professionals with virtual communication?

Answers

MS Word aid healthcare professionals with virtual communication by the Handled properly, phrase processing promises massive benefits: stepped forward collections, improved coins flow, decreased paperwork, and improved donations to healthcare foundations.

What do nurses use Microsoft Word for?

Personnel control data (demographic and expert information of nursing staff), Resource control/evaluation monitoring for reviews on budgeting DRGs, time beyond regulation usage, affected person care hours, deliver gadget projections, and staffing hours, and.

The Microsoft Office System, coupled with accessories supplied via way of means of partners, promises a portal answer that may offer clinicians and researchers immediate get admission to to the data they need, which includes the present-day scientific magazine articles, drug reference data and affected person handouts.

Read more about the word:

https://brainly.com/question/190029

#SPJ1

Other Questions
Which type of context should he consider to better understand this story among students who drink, what percentage typically have not drank in the last month? The graph of the cube root parent function y = RootIndex 3 StartRoot x EndRoot is translated to form f(x) shown on the graph.On a coordinate plane, a cube root function goes through (negative 7, 0), has an inflection point at (negative 6, 1), and goes through (2, 3).Which equation represents f(x)?f(x) = RootIndex 3 StartRoot x + 6 EndRoot + 1f(x) = RootIndex 3 StartRoot x minus 6 EndRoot + 1f(x) = RootIndex 3 StartRoot x + 6 EndRoot minus 1f(x) = RootIndex 3 StartRoot x minus 6 EndRoot minus 1 Which countries were part of frances expansion into southeast asia in the 1900s? check all that apply. china vietnam laos japan cambodia sri lanka What types of animals are prosimians? Given the sequence in the table, which of the following represents the sum for term 5 through term 11 in sigma notation? (1 point)a an1 22 103 50 Giraffe Jack is 19 feet tall, and Ostrich Jim is 9 feet tall. A) What percent of Jack's height is Jim's height? B)What percent of Jim's height is Jack's height? What was one effect that joining the warsaw pact had on the nations of eastern europe?. Lines l and m are parallel and intersect transversal p, as shown in the diagram below.What is the value of n?A 6B 10C 20D 24 Primary differences in style of Beethoven and Bach As one approaches the equator, the angle of incidence ____ and the atmosphere attenuation ______ How did the balance of power in Europe shift as a result of World War 1? Which strategy is based on the knowledge that several urgent health-related challenges, such as inequities, chronic disease, and skyrocketing costs, are often complex, multidimensional, and connected to one another g(x) f(x) = 6x 3 cosine function with y intercept at 0, negative 3 h(x) = 2 cos(x + ) 1 Using complete sentences, explain which function has the greatest y-intercept. (10 points)full step by step process please. A patient suffers from altered speech and behavior, and often does not show emotion. Which type of schizophrenia exhibits these symptoms?disorganized schizophreniaundifferentiated schizophreniaparanoid schizophreniacatatonic schizophrenia Spontaneous genetic mutations are one cause of cancer. They can happen at any time for various reasons such as exposure to certain carcinogens. Researchers are working to understand more about what causes them. If X is how many mutations there are in a person's body at time Y, X is a ________ random variable. A small mass of m = 187 g hangs from a string of length l = 1.21 m.Calculate the initial speed v the mass m should be given at the bottom, so that the string reaches a maximum angle of = 36.5? Find the LinReg line of best fit for this data set. {(5, 6.3), (4, 5.6), (3, 4.8), (2, 3.1), (1, 2.5), (0, 1.0), (1, 1.4)} Increasing or Decreasing the Money SupplyComplete the table in question 7.7. The Fed has three tools it can use to influence the money supply. In the following table, list the threetools and then explain how the Fed uses each tool to increase or decrease the money supply.Fed toolTo increase the money supply,the FedTo decrease the money supply.the FedA help with both please :)