Which of the following would a cyber criminal most likely do once they gained access to a user id and password

Answers

Answer 1

Answer:

do something wrong as you


Related Questions

Number the steps to describe how Tristan can complete
this task.
Cut the Television and related equipment row.
Paste the Television and related equipment row.
Click the plus sign on the left side of the table between
the last two rows.

Answers

Answer:

Cut the Television and related equipment row.Click the plus sign on the left side of the table between  the last two rows.Paste the Television and related equipment row.

Explanation:

In order to move the row, Tristan should first select the row and then cut it. This will ensure that the row will be moved completely instead of copied.

Tristan should then hover with the mouse between the last two rows and click on the plus sign on the left side. It will add a new row to the sheet. between the last two rows.

Tristan should then select the topmost cell and click paste. The television row will be pasted there and Tristan would have successfully moved it.

Answer:

2 3 1 Your Welcome

Explanation:

Write one line Linux command that performs the required action in each of the problems given below: (a) Find the difference in text between two text files File1.txt and File2.txt and save the result in a file named result.txt (b) Change the permissions of the file remote_driver.c such that the owner has the permissions to read, write and execute and anybody other than the owner can only read the file but cannot write or execute. (c) Search for the string ir_signal in the file /home/grad/remote_driver.c and print on the terminal the number of instances of the given string in the file /home/grad/remote_driver.c (d) Reboot the system after 5 minutes. (e) Display the list of processes currently being run by the user harvey. (f) Print 3 copies of a file named my_driver.c from a printer that has a name HPLaserJet4300. (g) Put the last 40 lines of the file driver_log.log into a new file final_fault.txt.

Answers

You have to add the integer

3. Never
to any instant messages, phone call, video call, or screen
staring requests from someone you do not know.
A. reply
B. refuse
C. forward text
D. accept pictures

Answers

Answer:

[tex]\color{Blue}\huge\boxed{Answer} [/tex]

B.Refuse

Answer:

Never reply to any instant messages, phone call, video call, or screen staring requests from someone you do not know.

Hope it helps u ARMY!!

I need help solving this problem on Picoctf. The question is What happens if you have a small exponent? There is a twist though, we padded the plaintext so that (M ** e) is just barely larger than N. Let's decrypt this: ciphertext. The ciphertext is this. I tried using stack flow and the rsatool on GitHub but nothing seems to work. Do you guys have any idea of what I can do. I need to solve this problem asap

Answers

Explanation:

Explanation:

RSA encryption is performed by calculating C=M^e(mod n).

However, if n is much larger than e (as is the case here), and if the message is not too long (i.e. small M), then M^e(mod n) == M^e and therefore M can be found by calculating the e-th root of C.

what is subnetting. what does subnetting mean

Answers

Answer:

Subnetting is the practice of dividing a network into two or more smaller networks. It increases routing efficiency, enhances the security of the network and reduces the size of the broadcast domain.

Explanation:

Programming a computer to win at chess
has been discussed since the
A. 1940's
B. 1950's
C. 1960's

Answers

I believe it was the 1960s but u should seach it up to double check

Answer:

B.

Explanation:

Provide an example of formula (with proper syntax) that would check whether cell B5 has a negative number, and return a value of "negative" if it was and "not negative" the value was zero or higher.

Answers

Answer:

The formula is:

=IF(B3<0,"negative","not negative")

Explanation:

The formula can be split as follows:

= --> This begins all excel formulas

IF --> This means that we are writing an IF condition formula

B3<0, ---> This is the condition being tested

"negative", ---> This is the result is the condition is true

"not negative" ---> This is the result is the condition is false

Implement a class Clock whose getHours and getMinutes methods return the current time at your location. (Call java.time.LocalTime.now().toString() and extract the time from that string.) Also provide a getTime method that returns a string with the hours and minutes by calling the getHours and getMinutes methods. Provide a subclass WorldClock whose constructor accepts a time offset. For example, if you live in California, a new WorldClock(3) should show the time in New York, three time zones ahead. Which methods did you override

Answers

Answer:

Explanation:

The following code was written in Java. It uses the LocalTime import to detect the current time. Then it creates a getHours, getMinutes, and getTime method to correctly print out only the hours and minutes in a simple format. Then it does the same for the WorldClock subclass which takes in the time offset as an int parameter and adds that to the hours in your own timezone.

class Clock {

   public String getHours() {

       String hours = java.time.LocalTime.now().toString().substring(0,2);

       return hours;

   }

   public String getMinutes() {

       String min = java.time.LocalTime.now().toString().substring(3,5);

       return min;

   }

   public String getTime() {

       String time = getHours() + ":" + getMinutes();

       return time;

   }

}

class WorldClock extends Clock {

   int timeZone = 0;

   public WorldClock(int timeZone) {

       super();

       this.timeZone = timeZone;

   }

   public String getHours() {

       String hours = String.valueOf(Integer.parseInt(super.getHours()) + 3);

       return hours;

   }

   public String getTime() {

       String time = getHours() + ":" + super.getMinutes();

       return time;

   }

}

class Test {

   public static void main(final String[] args) {

       Clock myClock = new Clock();

       System.out.println("My Time: " + myClock.getTime());

       WorldClock worldClock = new WorldClock(3);

       System.out.println("My Time + 3: " + worldClock.getTime());

   }

}

what is work immersion and its nature​

Answers

Work Immersion refers to the subject of the Senior High School Curriculum, which involves hands-on experience or work simulation in which learners can apply their competencies and acquired knowledge relevant to their track.

Suppose you observe that your home PC is responding very slowly to information requests from the net. And then you further observe that your network gateway shows high levels of network activity, even though you have closed your email client., Web browser, and other programs that access the net. What types of malware could cause these symptoms

Answers

ANSWER: BOT

EXPLANATION: When a PC is experiencing the listed effects, it thus depicts that the PC is under attack by a bot, which is a type of script or software application that establishes automated tasks via command.

However, a bad bots often initiate malicious tasks that gives room for attackers to take control over an affected PC remotely, most especially for fraudulent activities.

When several affected computers are connected, they form a botnet connection.

g Write a function named vowels that has one parameter and will return two values. Here is how the function works: Use a while loop to determine if the parameter is greater than 1. If it is not greater than 1, do the following: Display a message to the user saying the value must be greater than 1 and to try again. Prompt the user to enter how many numbers there will be. Use a for loop that will use the parameter to repeat the correct number of times (if the parameter is 10, the loop should repeat 10 times). Within this for loop, do the following: Generate a random integer between 65 and 90 Convert this integer to is equivalent capital letter character by using the chr function. If num is the variable with this integer, the conversion is done like this: ch

Answers

10-20-100.40 = my bin =nice

A _______ is one typed character.
-gigabyte
-byte
-megabyte
-kilobyte
-terabyte

Answers

A bite byte bight beight

arrange the following numbers from the highest to the lowest. ⅔,-7,0. no file or photo​

Answers

Answer:

2/3, 0, -7

Explanation:

6
Suppose the following formula is inputted into Excel:
=MROUND(1/4,100)
The output in the cell will be:
0
0.25
0.2500
1

Answers

Answer:

the output in the cell will be 0,2500

NEED HELP ASAP! You are looking for information in the online catalog for your local library. Which field would you not expect to see in a library's catalog or database?
A. Author
B. Title
C. Year
D. Phone number

Answers

Answer:

The answer is D

Explanation:

     

explain the different type of shift register counter ​

Answers

Answer:

Shift registers are also used as counters. There are two types of counters based on the type of output from right most D flip-flop is connected to the serial input. Those are Ring counter and Johnson Ring counter.

There are two types of shift register counters. They are given below:

Ring counter.Johnson ring counter.

What do you mean by Shift register counter?

The shift register counter may be defined as a sequence of a specific number of core registers that are significantly interconnected to one another in order to provide a clock-driven data shift.

A shift register is a set of f FFs that can be connected within the series and the stored data can be moved in the registers sequentially as per the command or instruction is given.

They are also utilized as counters. The type of shift register counter is based on the output from the D flip-flop which is connected to the serial input from the rightmost side.

Therefore, the two types of shift register counters are well mentioned above.

To learn more about Shift register, refer to the link:

https://brainly.com/question/14096550

#SPJ6

What are input masks most useful for in data validation? moving data from one field to another hiding parts of a value that are unnecessary identifying duplicate values in different records in a table ensuring consistent formatting of values in a specific field

Answers

Answer:

Ensuring Consistent Formatting of Values in a Specific Field

Explanation:

Answer: ensuring consistent formatting of values in a specific field

Explanation: on edg

If you are insured with third party insurance, it will cover which costs?

A. business losses due to a denial-of-service attack
B. loss of data in your laptop because of a coffee spillover
C. ransomware attack on your laptop
D. costs related to lawsuits, and penalties due to a cyberattack

Answers

Answer:

c.

Explanation:

Answer: D (costs related to lawsuits, and penalties due to a cyberattack)

Explanation: Third Party insurance covers the liabilities of policyholders to their clients or customers. Regulatory: It covers the cost related to legal affairs, lawsuits and penalties due to a cyberattack.  

What are
the rules for giving
variable name ?​

Answers

Answer:

Rules for naming variables:

- Variable names in Visual C++ can range from 1 to 255 characters. To make variable names portable to other environments stay within a 1 to 31 character range.

- All variable names must begin with a letter of the alphabet or an underscore ( _ ).  For beginning programmers, it may be easier to begin all variable names with a letter of the alphabet.

- After the first initial letter, variable names can also contain letters and numbers.  No spaces or special characters, however, are allowed.

- Uppercase characters are distinct from lowercase characters.  Using all uppercase letters is used primarily to identify constant variables.  

- You cannot use a C++ keyword (reserved word) as a variable name.

If a 9V, 7W radio is on from 9am to 12pm. Calculate the amount of charge that flows through it, hence or otherwise the total number of free electrons that pass through at a point at the power supply terminals​

Answers

Answer:

Q=It

and

p=IV

Given, v=9V P= 7W

I=P/V

I =7/9

Also, time(t) from 9am to 12pm is 3hrs

Converting into sec =3×3600

t=10800

Q= 7/9 ×10800

Q =8400C

What should a valid website have?

Select one:
a. Cited sources, copyright, and a clear purpose
b. Cited sources, copyright, and a poor design
c. Cited sources, copyright, and colorful images
d. Cited sources, no copyright, and a broad purpose

Answers

Answer:

A. cites sources,copyright,and a clear purpose

You are going to visit a national park, and have never been there before. You are using a map to try and make the distance travelled as short as possible. There are 5 intermediate towns, A, B, C, D, and E, you may gln your way to the park, and the distances between the various locations are given below.

Answers

Answer:

eggs fishing didn't ysjffj

If not cleared out, log files can eventually consume a large amount of data, sometimes filling a drive to its capacity. If the log files are on the same partition as the operating system, this could potentially bring down a Linux computer. What directories (or mount points) SHOULD be configured on its own partition to prevent this from happening?

Answers

Answer:

/var

Explanation:

The /var subdirectory contains files to which the system writes data during the course of its operation. Hence, since it serves as a system directory, it would prevent log files from consuming a large amount of data.

Answer:

/var

Explanation:

Hope this helps

is a general-purpose computing device?

Answers

Answer: I think so

Explanation: All mainframes, servers, laptop and desktop computers, as well as smartphones and tablets are general-purpose devices. In contrast, chips can be designed from scratch to perform only a fixed number of tasks, but which is only cost effective in large quantities (see ASIC).

Please give brainliest not this file virus exploiter

Consider the following two data structures for storing several million words.
I. An array of words, not in any particular order
II. An array of words, sorted in alphabetical order
Which of the following statements most accurately describes the time needed for operations on these data structures?
A. Finding the first word in alphabetical order is faster in I than in II.
B. Inserting a word is faster in II than in I.
C. Finding a given word is faster in II than in I.
D. Finding the longest word is faster in II than in I.

Answers

Answer:

The correct answer is C.

Explanation:

Finding a given word requires the search operation. The search operation is faster in a sorted array compared to an unsorted array. In a sorted array the binary search method is used which runs on logarithmic time while in an unsorted array, there's no other way than linear search which takes O(n) time on the worst case where the required word is not in the array.

The statement which most accurately describes the time needed for operations on these data structures is: C. Finding a given word is faster in II than in I.

What is a binary search?

Binary search can be defined as an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data, especially by using the run-time complexity of Ο(log n)

Note: n is the total number of elements.

In Computer science, Binary search typically applies the principles of divide and conquer. Thus, to perform a binary search on an array, the array must first be sorted in an alphabetical or ascending order.

In conclusion, the statement which most accurately describes the time needed for operations on these data structures is that, finding a given word is faster in data structure II than in I.

Read more on data structure here: https://brainly.com/question/24268720

Which option would allow you to watch an HD video, without delays in playback, on a computer with a Mac OS and a connection that has a lower bit rate? MPG QuickTime H.264 Flash Player

Answers

Answer:

H.264

Explanation:

A file type can be defined as the standard used to store digital data such as pictures, texts, videos, and audios. They all have unique file extension which determines the type of software program (application) to be used for opening a particular file and accessing its data e.g pictures (jpeg, png), texts (txt, docx, rtf), audios (mp3, acc), and videos (mp4, 3gp, avi, h.264, mkv).

Sometimes, computer users make the mistake of opening files with the wrong software application or program, this often leads to an error due to the incompatibility of the software application with the particular file.

H.265 is a high efficiency video codec (HEVC) and it's a standard video compression codec designed and developed to offer a better data compression, as an upgrade to the advanced video coding (AVC) standard.

Hence, the option or file extension (format) which would allow you to watch a high definition (HD) video, without delays in playback, on a computer with a Mac operating system (OS) and a connection that has a lower bit rate is the H.264 format.

Which of the following does cloud computing allow users to do? Check all of the boxes that apply.

access data from anywhere with an Internet connection

store pictures and music

store data

have a unique address for their computer

Answers

Answer:

a b c

Explanation:

there just right

Answer: a b c d

Explanation edge 2023

HELP ASAP DONT ANSWER WITH A LINK​

Answers

Answer:

Layout

title

title and content

section header

comparison

Orientation

landscape

portrait

whats the most popular social networking in the philippines?

Answers

Y o u t u b e

It wont let me say the word above

What yields 2.5? Type casting

Answers

Answer:

5.0/2

Explanation:

I don't do Java, but I do Python. I'm pretty sure the answer to this question is 5.0/2. I'm sorry if I'm wrong.

Other Questions
Trainees are put through a two-month school. The fixed cost of running one session of this school is $150,000. Any number of sessions can be run during the year but must be scheduled so that the airline always has enough flight attendants. The cost of having excess attendants is simply the salary that they receive, which is $15,000 per month. How many sessions of the school Whats the answer????(i will mark whoever answers the question right as Brainelist) Which situation is a result of focal policyO A A Corporationis fines for violating regulations.3. A school gets more money to buy computers,O C. A bank offers a loan to a small business.D. A consume hes limites options for food at a store Find the simple interest on the following amounts:a K4000 invested at 6% p.a. for 4 yearsb K23 000 invested at 6.5% p.a. for 8 yearsK580 borrowed at 5% p.a. for 9 monthsinte500 What did China and Britain fight over?ATeaBOpiumCSpicesDSilk find the value for x please help i am giving brainliest Check s if the statement makes sense. Check no if it does not make sense.1. s no Hay velas en un regalo.2. s no Siempre recibo uno o ms regalos para mi cumpleaos.3. s no A mucha gente le gusta comer cacahuates con galletas.4. s no Un boleto para el cine o un concierto es una entrada. 5. s no Los msicos tocan instrumentos musicales y los cantantes cantan.no dam links If you put a link i will hack your brainliy account Bistro Caterers contracts with Corporate Towers to cater the firms business meetings. Later, the contract between Bistro and Corporate is completely rescinded. Even later, Bistro offers to make a new deal. Corporate is willing to deal, but for a new price. Bistro and Corporate a. may agree to a new contract, but it cannot include a new price. b. must perform the part of their original contract that is executory. c. must perform their original contract. d. may agree to a new contract that includes the new price. HELLLLLLLPPPP PLZZZZZZZZZZZZ THIS IS A TEST 2. A chemical's flash point is the PLSSS HELPPP PLS WRITE IN UR WORDS When can you practice determination? Pete pumps water into an empty pool. After 8 minutes, there are 40 gallons o water in the pool. Use the coordinate plane provided to plot two points that can be used to represent the relationship between time, x, and the total amount of water, y, in the pool. Select the places on the coordinate plane to plot the points List the nurnbers in order from least to greatest. 1 -1,8,-18,-5,2,1 The numbers in order from least to greatest are Evaluate f(x) = 2|x 5| for f(5) and f(0).f(5) = 20, f(0) = 2f(5) = 10, f(0) = 0f(5) = 20, f(0) = 10f(5) = 12, f(0) = 5 Tameika makes a table about sensory organsEyeskinbraintongueWhich organ should be removed from the table? A. eye B. skin C. brain D. tongue 10. A large shipment of video streaming devices is accepted upon delivery if an inspection of 20 randomly selected video streaming devices yields no more than 1 defective item. a. Find the probability that the shipment is accepted if 3% of the total shipment is defective. b. Find the probability that the shipment is accepted if 15% of the total shipment is defective. Which side lengths will NOT form a triangle? *8.5 in., 12.5 in., 16 in.5.5 in., 7.5 in., 13 in.6 in., 8 in., 8 in.11 in., 10 in., 9 in. Plssss helpppp and thank you so so much What is Mpemba's effect? Define reparationsa) Paymentsb) Insurancec) Pride in one's countryd) guilt