Which of the following would a cyber criminal most likely do once they gained access to a user id and password

Answers

Answer 1

Answer:

do something wrong as you


Related Questions

Question 1
1 pts
The pressure of the electrons in a wire is measured in units called
volts
amperes
watts
ohms
The largely instinct 3.5 inch floppy disc uses which connector

Answers

Answer:

Option A, Volts

Explanation:

Volts  is the unit of pressure of the electrons in a wire. One Volt is the required pressure to allow flow of one unit of current in a circuit against a resistance of one ohm.

Hence, option A is correct

outline four advantages of digital
cameras over analogue cameras​

Answers

Answer:

Explanation:

A digital camera refers to a camera whereby the photographs are being captured in digital memory. An analogue camera refers to the traditional camera that typically sends video over cable.

The advantages of digital cameras over analogue cameras include:

1. Massive Storage Space:

There is a large storage space for photos and thus helps to prevent limitations to film. There are memory cards that can store several images.

2. Multiple functions:

The digital camera performs several functions like face detection, night and motion detection This makes capturing of images more fun and brings about better images.

3. Video Camera:

Digital cameras can also capture moving pictures while analog camera typically captures images that are still. Digital camera is vital as it can be used for live streaming.

4. Smaller and Lighter:

Digital cameras are usually smaller and lighter which makes them more portable and easy to carry about.

From the philosophical standpoint, especially in the discussion of moral philosophy or ethics, why do we consider “murder” or “killing” wrong or bad?

Answers

Explanation:

Morality is a set of values ​​and habits that a society acquires over time and can be categorized as good and bad values, right and wrong, justice and crime. Ethics is defined as the study of morals, the practical application of moral behaviors defined by society.

Therefore, the concept of "murder" or "killing" is seen as an immoral act by the vast majority of society around the world, strengthened by the set of moral conduct common to all human beings, which are the Articles on the Universal Declaration of Human Rights. Human Rights, which is an official document of the UN, which contains several universair and analytical rules on the rights of every individual, such as the right to life, security, freedom, etc.

Write a SELECT statement that displays each product purchased, the category of the product, the number of each product purchased, the maximum discount of each product, and the total price from all orders of the item for each product purchased. Include a final row that gives the same information over all products (a single row that provides cumulative information from all your rows). For the Maximum Discount and Order Total columns, round the values so that they only have two decimal spaces. Your result

Answers

Answer:

y6ou dont have mind

Explanation:

What is the difference between an information system and a computer application?

Answers

Answer:

An information system is a set of interrelated computer components that collects, processes, stores and provides output of the information for business purposes

A computer application is a computer software program that executes on a computer device to carry out a specific function or set of related functions.

9. Lael wants to determine several totals and averages for active students. In cell Q8, enter a formula using the COUNTIF function and structured references to count the number of students who have been elected to offices in student organizations.

Answers

Let understand that a spreadsheet perform function such as getting the sum, subtraction, averages, counting of numbers on the sheet rows and columns.

Also, the image to the question have been attached as picture.

Here, Lael wants to count the number of students who have been elected to offices in student organizations.

Lael will used the COUNTIF Function in the Spreadsheet to achieve the count because function helps to count cells that contain numbers.

In conclusion, the formulae that Lael should use on the Spreadsheet to count the number of students who are elected is "Q8 = COUNTIF(M2:M31, "Elected")"

Learn more about Excel function here

brainly.com/question/24826456/

PLEASE HELP!!!
Question 6:
A retailer of computers maintains a record containing the following information for every individual
computer sold
• Manufacturer name
• Model number
• Physical memory size
• Processor name
• Date of sale
• Price sold for
Using only the database, which of the following CANNOT be determined?
The average price of a computer was sold by the retailer
In which months less than 100 computers were sold
o Which models of computer stocked by the retailer have not had a single sale
The most popular model of computer sold by the retailer

Answers

I think A since I don’t think it would matter who sells to the consumer but the amount sorry if I’m wrong
price sold i know it because i did it

Now, we’re ready to program! Leave the visualizer and go back to https://repl.it/ to write your program. Here is the pseudocode for your program: Define a function called “even_checker” that will do the following things: Iterate over a list. Check to see whether the values in the list are even. Print the even values. Create a list with ten numbers in it. (Some of your numbers should be odd, and some should be even.) Call the function on your list. When you have tested your program, take a screenshot of it and its output to turn in. If your program does not work properly, also include a paragraph explaining what you did to troubleshoot it.

Answers

Answer:

here

Explanation:

Answer:did you get the answer right or wrong?

Explanation:

Which of the follwing are examples of meta-reasoning?
A. She has been gone long so she must have gone far.
B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.
C. I am getting tired so I am probably not thinking clearly.
D. I am getting tired so I will probably take a nap.

Answers

Answer: B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.

C. I am getting tired so I am probably not thinking clearly

Explanation:

Meta-Reasoning simply refers to the processes which monitor how our reasoning progresses and our problem-solving activities and the time and the effort dedicated to such activities are regulated.

From the options given, the examples of meta reasoning are:

B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.

C. I am getting tired so I am probably not thinking clearly

explain the procedure you will undertake to create a new partition​

Answers

Ans: To create and format a new partition (volume) Right-click an unallocated region on your hard disk, and then select New Simple Volume. In the New Simple Volume Wizard, select Next. Enter the size of the volume you want to create in megabytes (MB) or accept the maximum default size, and then select Next.

An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans files and directories on the system on a regular basis and notifies the administrator of any changes. It uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. It must be configured with a list of files and directories to check and what changes, if any, are permissible to each. It can allow, for example, log files to have new entries appended, but not for existing entries to be changed. What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely, which files may change more often and how, and which change frequently and hence cannot be checked. Hence consider the amount of work in both the configuration of the program and on the system administrator monitoring the responses generated.

Answers

Answer:

The main problem with such a tool would be resource usage

Explanation:

The main problem with such a tool would be resource usage. Such a tool would need a large amount of CPU power in order to check all of the files on the system thoroughly and at a fast enough speed to finish the process before the next cycle starts. Such a program would also have to allocate a large amount of hard drive space since it would need to temporarily save the original versions of these files in order to compare the current file to the original version and determine whether it changed or not. Depending the amount of files in the system the work on configuring the program may be very extensive since each individual file needs to be analyzed to determine whether or not they need to be verified by the program or not. Monitoring responses may not be so time consuming since the program should only warn about changes that have occurred which may be only 10% of the files on a daily basis or less.

Write the Java classes for the following classes. Make sure each includes 1. instance variables 2. constructor 3. copy constructor Submit a PDF with the code The classes are as follows: Character has-a name : String has-a health : integer has-a (Many) weapons : ArrayList has-a parent : Character has-a level : Level (this should not be a deep copy) Level has-a name : String has-a levelNumber : int has-a previousLevel : Level has-a nextLevel : Level Weapon has-a name : String has-a strength : double Monster is-a Character has-a angryness : double has-a weakness : Weakness Weakness has-a name : String has-a description: String has-a amount : int

Answers

Answer:

Explanation:

The following code is written in Java. It is attached as a PDF as requested and contains all of the classes, with the instance variables as described. Each variable has a setter/getter method and each class has a constructor. The image attached is a glimpse of the code.

Do you think renewable energy can power the world? If so, why?

Answers

Answer:

yes

Explanation:

Because it is a new safer and more energy efficient way of producing energy

How was the first computer reprogrammed

Answers

Answer:

the first programs were meticulously written in raw machine code, and everything was built up from there. The idea is called bootstrapping. ... Eventually, someone wrote the first simple assembler in machine code.

Explanation:

what materials can I find at home and make a cell phone tower​

Answers

Answer:

you cant

Explanation:

You simply cant make a tower from materials found in a household

Consider the following code snippet:
public static void print(E[] a)
{
for (int i = 0; i < a.length; i++)
{
System.out.println(a[i] + " ");
}
}
int[] a = {3,6,5,7,8,9,2,3};
print(makeArray(a));
Assume that the method call to print(makeArray(a)) works correctly by printing the int array a. Which of the following headers for the makeArray method will make this possible?
I public static Integer[] makeArray(int[] a)
II public static E[] makeArray(int[] a)
III public static Integer[] makeArray(E[] a)
I and III only
I only
I and II only
II and III only
What does it mean when the syntax ? extends D is used?
Any subclass of D may be used.
Any superclass of D may be used.
Any subclass or superclass of D may be used.
This indicates a wildcard with an upper bound.
Consider the following code snippet that declares the GraduateStudent class:
public GraduateStudent extends Student { . . .}
Which of these statements are false?
a. I GraduateStudent is a subclass of Student
b. II Stack is a subclass of Stack
c. III Stack is a subclass of Stack
d. II only
e. III only
f. II and III only
g. I only

Answers

Answer:

Explanation:

1) I and II only ... This is because the makeArray parameter must be an int[] since that is what the a array that is being passed actually is. The return type should be E[] only but since that is not an option, it could work with Integer[] if the E class allows.

2) Any superclass of D may be used. Although this is not complete, extends allows for a subclass to access any variables and methods within the superclass D but not directly access another superclass of D.

3)  I only ... GraduateStudent is a subclass of Student

Write the mostValuableNeighbor method, which compares the item in row r and column c to the items to its left and to its right. The method determines which of the three items has the greatest value and returns its name. If more than one of the values have a value that is greatest, then any of their names can be returned. If the item has no item to its left, it is compared only to the item to its right. If the item has no item to its right, it is compared only to the item to its left.

Answers

Answer:

Explanation:

The following method is written in Java, using the Item class and ItemGrid class found online we can use this method to grab the 2-dimensional array and compare the three neighbors in the same row. It saves the position of the neighbor with the greatest value in the variable greatest and then uses that position to call the getName() method from the object in that position to get the name of that Neighbor and returns the name.

public String mostValuableNeighbor(ItemGrid grid, int r, int c) {

       int greatest = grid[r][c];

      if (grid[r][c+1].getValue() > greatest.getValue()) {

          greatest = grid[r][c+1];

      }

       if (grid[r][c-1].getValue() > greatest.getValue()) {

           greatest = grid[r][c-1];

       }

       

      return greatest.getName();

   }

In this exercise we have to use the knowledge of computational language in JAVA to write the code.

We have the code in the attached image.

The code in Java can be found as:

public String mostValuableNeighbor(ItemGrid grid, int r, int c) {

      int greatest = grid[r][c];

     if (grid[r][c+1].getValue() > greatest.getValue()) {

         greatest = grid[r][c+1];

     }

      if (grid[r][c-1].getValue() > greatest.getValue()) {

          greatest = grid[r][c-1];

      }

     return greatest.getName();

  }

See more about JAVA at brainly.com/question/26104476

What is the command to launch each of the following tools? Local Group Policy Local Security Policy Computer Management console Local Users and Groups console Resultant Set of Policy (RSoP)

Answers

Answer:

The command for

Local Group Policy  is GPedit.msc

Local Security Policy is SecPol.msc

Computer Management console is Compmgmt.msc

Local Users and Groups console is Lusrmgr.msc

Resultant Set of Policy is RSOP.msc

Explanation:

The command for

Local Group Policy  is GPedit.msc

Local Security Policy is SecPol.msc

Computer Management console is Compmgmt.msc

Local Users and Groups console is Lusrmgr.msc

Resultant Set of Policy is RSOP.msc

PLEASE HELP I REALLY NEED IT ASAP
Select the correct answer. Layla and her team have installed a fire alarm system in an office. The alarm system connects to a wireless network, so it can be monitored using smartphones and computers connected to the same network. Which wireless technology does the fire alarm system use?
OA satellite
OB. Bluetooth
O C. infrared
OD. WI-FI​

Answers

Answer:

wifi

Explanation:

if it's running on the same network that's wifi

Answer:

The correct answer is D. Wi-Fi.

Explanation:

I got it right on the Edmentum test.

Explain with examples:
What are the reasons of a successful and unsuccessful software project?

Answers

Answer:

A good starting point is by addressing some of the key reasons software projects fail.

Explanation:

Not Enough Time. ...

Insufficient Budget. ...

Poor Communication. ...

Never Reviewing Project Progress. ...

Inadequate Testing. ...

Testing in the Production Environment. ...

Lack of Quality Assurance. ...

Not Conforming to Industry Standards.

User involvement, management support, reasonable requirements, and accurate projections are some of the most frequent aspects that contribute to software project success.

What is a software project?

A software project is the entire process of developing software, from gathering requirements to testing and maintenance, carried out in accordance with execution techniques over a predetermined amount of time to produce the desired software output.

Some of the most frequent factors that influence the success of software projects are user interaction, management support, fair needs, and realistic estimates.

Application bug or error, environmental conditions, infrastructure or software failure, virus, hacker, network/hardware failure, and operator error are the main causes of software project failure.

According to the study, project success and failure are most heavily influenced by the degree of customer/user interaction, software process management, and estimation and timeline.

Thus, these are the reasons of a successful and unsuccessful software project.

For more details regarding software project, visit:

https://brainly.com/question/3818302

#SPJ2

write a c++ program that accept student information

Answers

Answer:

Structure

This program stores the information (name, roll and marks entered by the user) of a student in a structure and displays it on the screen.

To understand this example, you should have the knowledge of the following C++ programming topics:

C++ StructuresC++ StringsIn this program, a structure(student) is created which contains name, roll and marks as its data member. Then, a structure variable(s) is created. Then, data (name, roll and marks) is taken from user and stored in data members of structure variable s. Finally, the data entered by user is displayed.This structure has three members: name (string), roll (integer) and marks (float).

Then, a structure variable s is created to store information and display it on the screen.

Consider the following recursive method.

public static String doSomething(String str)
{
if (str.length() < 1)
{
return "";
}
else
{
return str.substring(0, 1) + doSomething(str.substring(1));
}
}
Which of the following best describes the result of the call doSomething(myString) ?

A
The method call returns a String containing the contents of myString unchanged.

B
The method call returns a String containing the contents of myString with the order of the characters reversed from their order in myString.

C
The method call returns a String containing all but the first character of myString.

D
The method call returns a String containing only the first and second characters of myString.

E
The method call returns a String containing only the first and last characters of myString.

Answers

Answer:

A

The method call returns a String containing the contents of myString unchanged.

Explanation:

1 There are several applications to assist you to surf through the internet, mention
three (3 marks)​

Answers

Email
Web browsing
Peer-to-peer services

Joseph learned in his physics class that centimeter is a smaller unit of length and a hundred centimeters group to form a larger unit of length called a meter. Joseph recollected that in computer science, a bit is the smallest unit of data storage and a group of eight bits forms a larger unit. Which term refers to a group of eight binary digits? A. bit B. byte O C. kilobyte D. megabyte​

Answers

Answer:

byte

Explanation:

A byte is made up of eight binary digits

Before hard disk drives were available, computer information was stored on:

Floppy Disks

Cassette Tapes

Punch Cards

All of the Above

Answers

floppy disks . is the answer

What power points feature will you use to apply motion effects to different objects of a slide

Answers

Answer:

Animation scheme can be used to apply motion effects to different objects of a slide.

Reusing existing software to create a new software system or product can be a cost-efficient approach to development in many software projects. It may not be cost-efficient in all projects. As a software engineer, you can determine if it is the best approach for your project only if you know, and can estimate, the associated costs. Which of the following costs is NOT one of the costs typically considered when estimating the cost of reuse?
A. The purchase or license cost of COTS software, where applicable
B. Modification and/or configuration costs associated with making reusable software meet system requirements
C. The cost associated with finding analyzing, and assessing software for reuse
D. Legal costs associated with defending against charges of copyright infringement
E. Integration costs associated with mixing reusable software and other software (either new or reused)

Answers

Answer:

D. Legal costs associated with defending against charges of copyright infringement

Explanation:

When estimating the cost of reusing software you are planning to obtain the necessary licences that are required for your project which will prevent copyright infringement claims from taking place.

Use the drop-down menus to describe how to add a data bar to a report.
1. Open the table in view.
2. Click the column of the desired numerical field.
3. Click the conditional tab Format, then .
4. In the Rules Manager dialog box, click .
5. Select to “compare to other records,” and determine whether you want the value and bar to show at the same time.
6. Adjust the desired length of the bar and the color. Click OK.
7. Once satisfied with your rule, click and then OK.

Answers

Answer:

1. layout

3. conditional formatting

4. new rule

7. apply

Explanation:

just did it on edge

Suppose you have the following search space:

State
next
cost

A
B
4

A
C
1

B
D
3

B
E
8

C
C
0

C
D
2

C
F
6

D
C
2

D
E
4

E
G
2

F
G
8

Draw the state space of this problem.

Assume that the initial state is A and the goal state is G. Show how each of the following search strategies would create a search tree to find a path from the initial state to the goal state:
Breadth-first search
Depth-first search
Uniform cost search

Answers

Breadth

Depth

Uniform

U

What is the benefit of making an archive folder visible in the Outlook folder list?

This makes the folder available on the Office 365 website.
The folder can be password protected to increase security.
Archived items in the folder are accessible within the Outlook client.
Archived items in the folder can be shared with other Outlook users.

Answers

Answer:

a

Explanation:

Other Questions
please answer asap! no scam links or scam comments or reported. 4. Tu *blank*una clase de historia, no? Three sixth-grade classes raised $25.50, $49.75,and $37.25 for their classroom libraries. They agreed toshare the money raised equally. What is each classs equal share? Which of the following best describes a relationship in this grassland?A Badgers are top predators because they eat upland sandpipers and beetles.B A producer-consumer relationship exists between lupines and ants.C a predator-prey relationship exists between beetles and ground squirrels.D upland sandpipers are primary and secondary consumers because they eat grasses and grasshoppers. Solve using substitution. You MUST find both variables to be crowned brainiest 2x + 4y = 40 x - 6y = -36 Mitosis is the division of the _____ and begins with a stage called ____ . As the nuclear envelope finishes dissolving, the cells enter ____, where microtubules from the spindle attach to the duplicated X-shaped chromosomes.When all chromosomes are fully attached to the spindle, they align at the midplate between poles. This marks the middle of mitosis, which is ____ . As sister chromatids separate, cells enter ____ and they finish separating and a nucleus reforms around each set of new chromosomes in ____ . During this phase, cytokinesis also becomes visible as the cells themselves begin to divide. Hey guys! Please help me out with these questions. Tmrw I have an exam... Will mark BRAINILIEST for the answer explaining proper steps. If I sound rude, please forgive me, I'm just stressed out..... Thanks A rectangular tank measures 14 cm by 9 cm by 10 cm. What is the volume of the tank in cubic centimeters? What steps transform the graph of y = x? to y = -(x + 3)2 + 5?translate 3 units to the right, translate down 5 unitstranslate 3 units to the left, translate up 5 unitso reflect across the x-axis, translate 3 units to the left, translate up 5 unitsreflect across the x-axis, translate 3 units to the right, translate down 5 units (PLEASE HELP) Biodiversity affects the sustainability of an ecosystem by-A. Always Increasing competition for limited resources within the ecosystem.B. Allowing the ecosystem to survive many changes.C. Preventing the ecosystem from surviving many changes.D. Always decreasing competition for limited resources within the ecosystem. 1. Nuevos contenidos curricularesa) L.escu which of the following scientists can be identified as a taxonomist? PWEASE HELP ME!Choose the correct verb in the correct form to fill in each blank.1. Mis amigos y yo _______ al partido de bisbol.2. Mi hermana y yo _______ televisores en nuestros dormitorios.3. Las muchachas _______ en la biblioteca.4. Marcos y Jorge _______ la tarea.a. estnb. tenemosc. vamosd. hacen 1 How do I make a girl blush?2 How do I know if I girl might like me by looking at her body language? Question 7 of 10Which story element most clearly shows direct characterization?O A. The way a character dressesO B. The narrator's comments about a character's true natureC. A character's private thoughts and feelings while aloneO D. How other characters act when a specific character is aroundSUBMIT A man wants to build around water fountain with diameter, d = 11.28 feet. The man is trying to put up a fence around the build with some wire. What is the length of the wire that the man needs to complete the task? From the choices provided, select all the questions that represent statistical questions,A What was the temperature at 5:00p.m. today in Boston?B How many pieces of fruit were used to make Shawn's smoothie today?How many states are there?D What types of food do students in your school bring for lunch each day?E How many books did each student check out at the library last year? Write a note to a friend about a special event Consider two kinesin motor proteins at the mitotic spindle midzone: kinesin A is a tetrameric motor that walks toward the plus end of both microtubules to which it is attached via its motor domains; kinesin B, on the other hand, walks toward the minus end of one microtubule while it is attached to another microtubule via its tail domain.How do these motors affect the length of the spindle?A. They both work to shorten the spindle.B. Kinesin-5 works to shorten the spindle whereas kinesin-14 works to lengthen it.C. Kinesin-5 works to lengthen the spindle whereas kinesin-14 works to shorten it.D. They both work to lengthen the spindle. N + 3H --> 2NHIf 207.0 g of H reacts, what mass of NH is produced?