Answer:
Reconnaissance- Reconnaissance means to collect information without interacting with victim. It involves collecting information from public records, social networking sites, etc.
Scanning- Next comes Scanning the system.Scanning also means to collect information but active information.For eg. Pinging on the system, checking the ports, services, etc.
Gaining Access- Then according to information gathered from the above two phases, we plan and implement our attack.
Maintaining Access- After gaining the access, the next step is to maintain the access.It’s very important so that if the victim even switch off or restart the system, connection is not lost. So, it's necessary to migrate the process or create a backdoor to maintain the access using different techniques.
Clearing tracks- The final step is to clean all traces which indicate the attackers presence so that all logs or tracks are cleared as this is an evidence of attacker's presence.
Explanation:
Have a great day!
Write a function that takes a word less than 25 characters long and returns the letter that word starts with (in capital letters)
The function that takes a word less than 25 characters long and returns the letter that word starts with in capital letters is as follows:
def first_letter(x):
if len(x) < 25:
for i in x:
return x[0].upper()
else:
return "Your text should be less than 25 characters"
print(first_letter("brainly"))
The code is written in python.
We declared a function named first_letter with the parameter x.
If the length of the word is less than 25 characters, we loop through it and return the first letter in uppercase.
Else if the word is not less than 25 character we ask the user to input a word less than 25 characters.
Finally, we call the function with a print statement.
The bolded portion of the code are python keywords.
read more: https://brainly.com/question/14603294?referrer=searchResults
Write a statement that slices a substring out of the string quote and puts it into a variable named selection. If given the string 'The only impossible journey is the one you never begin.', selection should contain 'possible jou' after your statement executes.
The statements that slices a substring out of the string quote and puts it into a variable named selection is as follows:
text = "The only impossible journey is the one you never begin."
selection = ""
selection += text[11:23]
print(selection)
The code is written in python.
The string is stored in a variable called text.
The variable selection is declared as an empty string. The purpose is to store our new substring.
The third line of the code is used to cut the string from the 11th index to the 23rd index(excluding the 23rd index) and add it to the declared variable selection.
Finally, we output the variable selection by using the print statement.
The bolded values in the code are python keywords.
read more; https://brainly.com/question/20361395?referrer=searchResults
What is the full form of eniac and univac ?
thanks!!
Answer:
ENIAC - Electronic Numerical Integrator and Calculator. UNIVAC - Universal Automatic Computer (First Digital Computer)
Mark brilliant please
Answer:
[tex]ENIAC - Electronic \: Numerical \: \\ Integrator \: and \: Computer[/tex]
[tex]UNIVAC- Universal \: Automatic \: Computer[/tex]
Choose a project with a relatively simple description (e.g. building a LAN,
designing a business web page, inventing a new communication device,
etc.). Describe your project scope in 100 words and then identify at least
five significant varied risks associated with the project. Be sure that at
least one of them is a positive risk
Answer:
Design a web page
Explanation:
It is easier html is a very easy language to learn css it should take ou about a week for a solid website
Freeze column A and rows 1 through 3 in the worksheet
The question tells us that we are dealing with an Excel Worksheet task.
The most popular workbooks are:
"MS Excel" and "G-Sheets"The purposes of this question we will consider both.
Columns in either of the two types of worksheets mentioned above refer to the Vertical Grids which run through the sheets.
Rows on the other hand refer to the Horizontal Grids which run through the sheets. Both Columns and Rows comprise Cells.
Freezing in this sense refers to the act of ensuring that regardless of which direction the worksheet is scrolled, the frozen parts remain visible on the screen.
How to Freeze Column A and Rows 1 to 3
In "MS Excel":
Open Microsoft Excel Click on Blank WorkbookClick on Cell B4 to highlight itOn the ribbon above, click on view to display its sub-functionsselect Freeze PanesThis action will freeze the entire column A as well as Row 1 to 3. To increase the number of rows from 1-3 to 1 to 5 for instance, you'd need to return to the View Function, Unfreeze the Panes, select Cell B6 then select Freeze Panes.
In "G-Sheets"
Ensure that your computer is online, that is, connected to the internetOpen "G-Sheets"Place your mouse cursor on cell B3 and click to highlight itWith your click on View in the ribbon above. This will display the Freeze function in "G-Sheets" along with its subfunctionsSelect the "Freeze + Up to row 3". This action will freeze Rows 1 to 3.Next, click anywhere in Column ACarry out step 4 above and select "Freeze + Up to column A"For more about Freezing Work Sheets click the link below:
https://brainly.com/question/17194167
a. In cell K11, create a formula using the DCOUNT function to count the number of projects with final costs of more than $100,000, using the data in the entire Projects table (Projects[#All]) and counting the values in the column of final costs ("Final Cost") that are equal to the values in the range J9:J10
Answer:
the data in the entire Projects table (Projects[#All]) and counting the values in the column of final costs ("Final Cost") that are equal to the values in the range J9:J10
Do you trust machine learning application?
Answer:
Trusting a machine learning model, in general, can be interpreted as creating a robust model which gives largely accurate results and has a high generalization ability. Classification models learn from past experience, so the robustness of a model primarily depends on the given training set
Explanation:
Hope it helps
Please mark as brainliest
What is the difference between Background and Watermark?
Describe three things (risks) that can cause damage to computer hardware
Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?
Tableau is said to mainly connects to Excel spreadsheets to make data analysis fast and easy. What Gilbert have to do to bring the spreadsheet into Tableau is that He is to connect to an outside data source.
Tableau is often used as a form of connection to Excel spreadsheets so as the data analysis very simple.It gives room for Excel users to keep their spreadsheets even when they are polishing their ability to analyze their data, while giving simple to build, simple to read visualizations that shows information boldly.
See full question below
Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?
Select an answer:
A. He moved the Excel spreadsheet onto the Tableau server, and then opened it in Tableau.
B. He connected to an outside data source.
C. He dragged and dropped the file into Tableau.
He duplicated the data in Tableau.
Learn more from
https://brainly.com/question/22908883
Which group on the Note Master tab contains the command to add footers to the notes pages?
Answer:
Place Holders
Explanation:
Choose the best option to answer each question. Which output device allows a user to create a copy of what is on the screen? printer speakers earphones display or monitor
Answer: printer
Explanation:
Which of the following is not an artificial intelligent technology?
Speech recognition
Text analytics and NLP
Computer vision
Robotic desktop automation
None of the above
Which among the following statements is not related to Capgemini
Intelligent Automation Platform (CIAP)?
loly
lov
OCIAP is built with a cloud-first approach
The functionality of the platform can be used and managed from a
command tower
ere i
Capgemini Intelligent Automation Platform is service agnostic
sha
The orchestration functionality of the platform is decentralised
O The platform's functional capabilities are enhanced by our fast Track Hub
10:2
IClick Submit o veri
LIL
:
Answer:
The platform's functional capabilities are enhanced by our fast Track Hub
Why is it good to be a computer programmer?
Answer: With programming, you have more freedom than with other jobs. The majority of programming job openings are remote, giving you plenty of freedom to complete your duties.
Explanation: You can work wherever you want with programming jobs, especially if you have a good reputation.
Enter a formula in the selected cell to display the owner's draw percentage (cell B6).
The formula is an illustration of Excel formulas, and Excel formulas are used to operate on values in a cell or a range of cells
Formula in the selected cell to display the owner's draw percentage is =B6
How to write the formula?From the question, the owner's draw percentage is in the cell B6.
To enter the formula, we simply enter the name of the cell (i.e. B6)
So, we have:
B6
Excel formulas begin with the equal to "=" sign,
So, we have:
= B6
Hence, the formula is = B6
Read more about Excel formulas at:
brainly.com/question/17566733
WHAT DO YOU KNOW?
Why would you want to change your Table
Properties?
read the slides ; Table Properties are the way the table appears or looks.
Detail for the configuration of your laptop and your phone
Answer:
What do u mean?
Explanation:explanation is...
The input nums is supposed to be an array of unique integers ranging from 1 to nums.length (inclusive). However, there is a mistake: one of the numbers in the array is duplicated, which means another number is missing. Find and return the sum of the duplicated number and the missing number. Example: in the array [4, 3, 3, 1], 3 is present twice and 2 is missing, so 3 2
The program is an illustration of loops.
Loops are used to perform repetitive and iterative operations.
The program in Python where comments are used to explain each line is as follows:
#This intializes the list
nums = [5,4,4,2,1]
#This gets the length of the list
size = len(nums)
#This iterates through the list
for i in range(size):
#The following if condition determines the repeating number
if nums[abs(nums[i])-1] > 0:
nums[abs(nums[i])-1] = -nums[abs(nums[i])-1]
else:
repeating = abs(nums[i])
#The following if condition determines the missing number
if nums[i]>0:
missing = i + 1
#This calculates and prints the sum of the missing and the repeating numbers
print(repeating+missing)
Read more about similar programs at:
https://brainly.com/question/13549861
Need help with c++ coding
Simple program MUST USE two one-dimensional arrays. One to store last name and one to store grades.
Please help I’m so lost. I don’t understand arrays at all.
Answer:
h8 3h73oodn4
Explanation:
Technician A says stepped resistors are made from one or more wire-wound resistors.
Technician B says a common application for this type of resistor is in a blower motor speed
control circuit. Who is correct?
Select one:
O a. Technician A
O b. Technician B
O C. Both Technician A and Technician B
O d. Neither Technician A nor Technician B
Which character is midway between the 3rd character from left and 6lh character from rights
a. 2
b. 3 ANS
c. 8
d. Y
Answer:
D
Explanation:
Interface elements include but are not limited to:
Question 3 options:
A. Navigational components, containers, interaction design
B. Input controls, navigational components, visual design
C. Input controls, informational components, containers
D. Input controls, informational components, visual design
E. Navigational components, informational components, visual design
Interface elements include but are not limited to: C. Input controls, informational components, containers.
A visual programming language is also commonly referred to as graphics user interface builder (GUI builder) and it can be defined as a programming tool that avails programmers the ability to develop software programs (applications) through the use of graphical elements and figures rather than texts alone.
Interface elements refers to the graphic tools that are used by programmers in the design of a user interface on a software program.
In Computer programming, some of the interface elements used include the following:
Input controls: it comprises buttons, radio buttons, list boxes, dropdown lists, checkboxes, text fields, toggles, date field, etc.Informational components: these are progress bar, icons, notifications, tooltips, modal windows, message boxes, etc.Containers: they are made up of accordion.Navigational components: these are slider, search field, slider, tags, pagination, breadcrumb, icons, etc.Read more: https://brainly.com/question/19341134
A keyboard would be considered _____. Select 2 options.
an input device
storage
an output device
software
hardware
Answer:
input devise and hardware
Explanation:
How do you create speaker note changes that show the slides, related notes and company logo on each page
Answer:
The Notes Master contains two placeholders one for your text and the other for the slide. We can move or change the size of either of these objects and we can change the format of the text in the notes placeholder, we can also add or change elements that we want to appear on each handout and also notice the convenient placement of the header, footer, date and page numbers.
Which of the following does a secure website use to safeguard transmitted information
Answer:encryption
Explanation:
because you can hack encrypted things well not so easily
Encryption is a secure website used to safeguard transmitted information. The correct option is C.
What is encryption?The process of converting information into a secret code that conceals its true meaning is known as encryption.
Cryptography is the study of information encryption and decryption. In the world of computers, ciphertext refers to encrypted data and plaintext to unencrypted data.
By converting the message's content into a code, encryption serves as a confidentiality tool. Integrity and authenticity are the goals of digital signatures.
They serve to confirm the message's source and show that the content hasn't been altered.
In the process of encryption, ordinary text, such as a text message or email, is scrambled into "cypher text," which is an unintelligible format. Secure websites utilise encryption to protect sent information.
Thus, the correct option is C.
For more details regarding encryption, visit:
https://brainly.com/question/17017885
#SPJ6
Your question seems incomplete, the missing options are:
A) A lock icon
B) The http protocol
C) Encryption
D) Digital certificate
rearrange the following procedures in there proper order. use numbers (1-8) to indicate their order of precedence.
.___________crimp
.___________strip cable end
.___________test
.___________untwist wire ends
.___________trim wires to size
.___________check
.___________arrange wires
.___________attach connector
Answer:
6 - crimp
1 - strip cable end
8 - test
2 - untwist wire ends
4 - trim wires to size
7 - check
3 - arrange wires
5 - attach connector
Explanation:
Step 1. Strip cable by inserting into the stripping tool. Rotate the cable in a smooth and even motion to create a clean cut and pull away towards the end of the wire to remove the sheathing.
Step 2. Untwist wire ends. Separate the twisted wires and straighten them out to easily sort in the right order.
Step 3. Arrange wires. Put the wires in the correct order so they can be properly crimped.
Step 4. Trim wires to size. Use the cutting section of the crimping tool to cut them into an even line.
Step 5. Attach connector. Insert the connector so that each of the small wires fits into the small grooves in the connector.
Step 6. Crimp. Insert the connector in the crimping tool. Squeeze the handles to crimp the connector and secure the wires.
Step 7. Check. Take the connector our of the tool and look at the pins to see that they're all pushed down.
Step 8. Test. Lightly tug at the connector to make sure it's attached to the cable.
4. Let's continue with Amber. Once she began, she realized that she was short on
time so she simply skipped her opening slides. Feeling a bit frazzled, Amber began
reading from slide 7. Why do you think that this would not be Amber's best strategy?
Answer:
because she could miss important information
Answer:
I think that this would not be the best strategy as she could miss vital information in the opening which may not be a lot but packs a punch within how your presentation is gonna go so the audience can gouge you out and your style.
Explanation:
Because
HTTP is the protocol that governs communications between Web servers and Web clients (i.e. browsers). Part of the protocol includes a status code returned by the server to tell the browser the status of its most recent page request. Some of the codes and their meanings are listed below:
• 200, OK (fulfilled)
• 403, forbidden
• 404, not found
• 500, server error
Given an int variable status, write a switch statement that prints out the appropriate label from the above list based on status.
In C++ please
Answer:
switch( status )
{
case 200:
cout << "OK (fulfilled)";
break;
case 403:
cout << "forbidden";
break;
case 404:
cout << "not found";
break;
case 500:
cout << "server error";
break;
}
Explanation:
MPL 2021
What is that called…. Ethetnet cable port or what !?
Answer:
The left one is a router or switch or hub (could be any as far as I see).
The right one is a satellite dish.
Explanation:
"A switch transmits data from one device to another in form of frames while a router transmits data from one network to another in form of packets. A hub transmits data from one device to another in form of binary bits." - from section.io
"A satellite dish is a dish-shaped type of parabolic antenna designed to receive or transmit information by radio waves to or from a communication satellite." - Wikipedia