Which is not a tool hackers use to gain access to and take control of your computer?

Answers

Answer 1
A rat/ or kalilinux is used to take over your computer but Kalilinux is a linux program most hackers use it to do all types of stuff with it if not to use kali the other software is a rat witch can take control of your whole computer and a rat is a virus witch is hard to get away from 

Related Questions

Which of the following definitions describes a receptacle ground fault circuit interrupter (GFCI)? A. Includes an extension cord B. Protects a worker by increasing the duration of an electrical shock C. Protects users from ground faults when someone connects electrical equipment to a GFCI protected outlet D. Replaces a circuit breaker on the main circuit board Suspend Assessment

Answers

C. Protects users from ground faults when someone connects electrical equipment to a GFCI protected outlet

Name two purposes of creating a microsoft account for use in visual studio 2015

Answers

Creating a Microsoft account for use in Visual Studio 2015 means that you will get a better and optimized user experience, with several benefits.
Some of the purposes why you should create an account are:
1. free software, training and support from Visual Studio and broad range of benefits
2. synchronized Visual Studio Settings, which means that you will have for example the same layout, window and color theme, or whatever you select in the settings, every time you log in with your account


What type of file system is used by sdxc memory cards?

Answers

Answer:

ExFAT

Explanation:

A: Required: Create and delete file of the programs are a. process control b. file management ... question_answer Q: 350. __________ is used to shift processes so they are contiguous

List three considerations when you choose memory.

Answers

1)How many memory cards (how many can you computer hold)
2)Company (some companies run better than others)
3)Amount of memory (xGb)

When reassembling your pc what does the text recommend as the first step?

Answers

When reassembling your PC the first step is to wear an anti shock bracelet to ground yourself from the electricity. Then take a Philips head screwdriver and take the machine apart. Typically the hard drive is taken out first and then the RAM.

Assuming you are using the sun sdk, what command would you type at the operating system command prompt to compile the program labassignment.java?

Answers

Assuming javac is on the PATH variable:

javac labassignment.java

Otherwise, it would have to be:

/path/to/javac labassignment.java

What is the difference between a syntax error and a logical error?

Answers

A syntax error can be a simple mistake as a typo or an extra space. A logical error has to do with the code structure, and if it makes sense.

Hope this helps!

What motivates engineers to make tcp/ip packets more independent?

Answers

The TCP/IP model has four layers: application, host-to-host layer, internet layer and network access layer.  
TCP is the transmission protocol that is used and it is connection-oriented.
IP stands for Internet. 
A stream of bytes is broken into segments and reconnected at the other end. The packets are retransmitted whatever is lost and the segments are organized might in the correct order. 
The boom of new different applications that should be interoperable motivates engineers to make tcp/ip packets more independent.

What does limited access to a document mean?

It makes a document inaccessible without a password.
It enables a person to make changes and automatically save them.
It does not reflect any changes made in the document.
It enables a person to read the document but not edit it.
It blocks a person from accessing a document.

Answers

the second last one is the answer i think

Answer:

C). It enables a person to read the document but not edit it.

Explanation:

Limited access to a document is primarily associated with the creator of document restricting the usage and changes that can be made to a specific document. It assists the users to protect the authenticity of their document and prevent it from any unnecessary editing to the document. Therefore, the limited access to a document would imply 'enabling a person to only read the document but not edit or make changes to it' without the creator's permission. It is thus aimed to limit the access to a specific content. Therefore, option C is the correct answer.  

To reboot a pc, hold down the ____ keys at the same time.

Answers

CTRL+ALT+DELETE

Sometimes called a three finger salute.

alt f4

Explanation:

alt f4 is the goatttttttttttttttttttttttttttttttttttttttttttttttttttt

Each hard disk is divided into pie-shaped groups of ____.

Answers

sectors







-------------------------------

import static java.lang.System.*;
import java.util.Scanner;

public class Sales{

//you haven't learned about "static" yet but take it on faith that it is needed
//we'll discuss in future classes what it actually means and why you need it
//create a private static variable for price
//create a private static variable for discountRate - it's an integer
//create a private static variable for tax


// the sale method takes in no parameters
// there are 3 print satements and the method returns the final sale price
public static double sale(){

//write your code here. Use the Word doc example as a guide to what the print statements
//should look like. Don't forget the "return" statement.

}

/*
*The main method is what is executed when the "run" button is clicked.
*It is necessary, in this case, for the program to be tested.
*Actually study this code and trace through it to see how the Scanner is used to assign
* values to the variables. Also pay attention to the use of print, println and \n to cause the
* output to be formatted the way it is in the example.
*/

public static void main(String[] args){
Scanner kb = new Scanner(System.in);
System.out.print("Please enter a price: ");
price = kb.nextDouble();
System.out.println(price + "\n");
System.out.print("What is the tax rate? ");
tax = kb.nextDouble();
System.out.println(tax);
discountRate = (int)(Math.random() * 40);
System.out.println("Result returned is " + sale());
}
}




Can anyone help with this

Answers

First you add the three static variables as instructed:

    private static double price;
    private static int discountRate;
    private static double tax;

Then you implement the sale() method:

public static double sale(){
    System.out.printf("Price before discount: %.2f\n", price);

    double sale = price * (1-(double)discountRate/100.0);
    System.out.printf("Price after discounting %d%% but before tax: %.2f\n", discountRate, sale);

    sale *= (1+tax/100.0);
    System.out.printf("Discounted price with %.1f%% tax added: %.2f\n", tax, sale);

    return sale;
}

I kind of took a stab at how to calculate the sale. Not sure if the tax has to be added before or after the discount. But I'm sure you can fix that if needed.

The area that holds all the instructions the computer needs to start up when it is powered on is ________. the cpu rom ram the usb

Answers

ROM (Read Only Memory)

Proprietary file types are easily displayed in Word documents, Web pages, etc.
Question 15 options:

True


False

Answers

it should be true :)

Answer:

It is true

Explanation:

I took the test

Attacks that take place against web based services are considered to be what type of attack?

Answers

cyber attack is correct

Which option enables you to keep the last grammatical change

Answers

To keep last grammatical change in a word processor, one should look for the "Undo" or "Ctrl+Z" option.

How do we use it in word processor?

In most word processors like Goo/gle Docs, we can simply press "Ctrl+Z" or select the "Undo" option from the menu to revert the last grammatical change you made. This feature allows to quickly correct any mistakes or undo changes that you may have made unintentionally.

Its helps for maintaining the correctness and clarity of your documents. So, if we want to preserve the last grammatical we will use the "Undo" function in the word processing software.

Read more about grammatical change

brainly.com/question/33472332

#SPJ1

A right turn should be from the right lane into the right lane of the roadway entered. True or false. A. True B. False

Answers

it depends if it's America or another continent but assuming it's America I would say A.True

Using Word, Maureen is writing an outline of a presentation she plans to give to her company. She will be showing a video during the presentation, and she would like to place images of isolated video frames in her outline so that she remembers exactly what to talk about when the corresponding part of the video is played to her audience. Which tool would be best for Maureen to place these images in Word, and why?

Answers

A copy and paste would be fastest and easiest. As you can pinpoint the exact location to where you want the picture to be. 

Answer:

The tool that would be best for Maureen to place the image in Word is the Screen Clipping tool because it allows to pick a window that is opened in the device and insert the screenshot of it in the document.

Explanation:

The screen clipping tool allows you to take a screenshot of a window that is opened in the device and add it to the document in which you are working.

To use it you have to click on the part of the document where you want to put the image and click on the insert tab and then, screenshot. After this, you will see the windows that are opened and you can choose the screenshot you need or select a part of it. Then, the image is added to the document. According to this, the tool that would be best for Maureen to place the imagen in Word is the screen clipping tool.

Spreadsheet software creates a ____, composed of a grid of columns and rows

Answers

Spreadsheet software creates a worksheet, composed of a grid of columns and rows.

What is the purpose of using modulo 2 arithmetic rather than binary arithmetic in computing an fcs?

Answers

Final answer:

The purpose of using modulo 2 arithmetic in computing an FCS is to detect transmission errors through simple and efficient calculations. It provides a checksum that can be used to verify data integrity, detecting common errors like single-bit and burst errors. This method does not require handling carry operations, simplifying implementation.

Explanation:

The purpose of using modulo 2 arithmetic in computing a Frame Check Sequence (FCS) is to provide error detection capability when data packets are transmitted over a network. Modulo 2 arithmetic is a simple, efficient method of calculating a type of checksum that can be used to verify the integrity of the transmitted data. By performing bitwise exclusive OR (XOR) operations on the data bits, modulo 2 arithmetic generates a value that can be appended to the data. When the data is received, the same operations are performed, including the FCS. If the result is zero, it is assumed that the data has not been corrupted during transmission.Modulo 2 arithmetic is used because it resembles binary addition without carry. It simplifies the hardware or software implementation since handling carry operations is not required. Also, modulo 2 arithmetic can detect common errors such as single-bit errors and burst errors that can occur in communication channels, providing a simple yet robust way to ensure data integrity. This method is commonly used in network protocols, for example, in the Cyclic Redundancy Check (CRC).

David’s gross pay is $450, and his total deductions were $49. What is his net pay?

Answers

the net pay is the gross pay after deductions so his net pay would be 401 dollars
His net pay would be $401. 
This is the answer because $49 was the amount of the total deductions from his gross pay. 
$450 - $49 = $401.
So $401 is the correct answer.

A web application server that is compromised in a cross-site scripting attack is said to be

Answers

Cross-site scripting attack ( XSS ) occurs when malicious script are injected into web sites. An attacker uses web application to send malicious code.
Answer:
A web application server that is comprised in a cross-site scripting attack is said to be B. injected.     

Hard disk storage technology can be classified as ____ storage.

Answers

Persistent (between boots) or permanent.

In spreadsheet software, use ____ to create meaningful data summaries to analyze worksheets containing large volumes of data.

Answers

In spreadsheet software, use pivot tables to create meaningful data summaries to analyze worksheets containing large volumes of data.

The name of an array stores the ________ of the first array element

Answers

address. The equivelent of array[ 0 ].

After a worksheet has been displayed in page layout view, page breaks are indicated by ________ in normal view.

Answers

After a worksheet has been displayed in page layout view, page breaks are indicated by dotted lines in normal view. Typical view for used for creating and viewing presentation slides is called normal view and is also known as slide view. Which offers a full size view of a slide, making it easier to create a slide.

What would happen if computers only had input peripherals and a CPU?

A. Computers would process and display data.
B. Computers would receive signals and display data.
C. Computers would receive signals and process data.
D. Computers would receive signals, process, and print data.

Answers

Assuming it has all the correct inputs and a CPU it would only be able to receive signals via the input and process that data. There are no display outputs or printer so the answer is probably C.

What would happen if computers only had input peripherals and a CPU is that: C. Computers would receive signals and process data.

A computer can be defined as an electronic device that is designed and developed to receive data in raw form as an input and then processes these data into an information (output) that could be used by an end user.

Basically, the main part of a computer include the following;

Central processing unit (CPU): this is the brain of a computer and it does all the processing and logical control.Input devices (peripherals): keyboard, mouse, scanner, etc.Output devices (peripherals): printer, monitor, speaker, etc..Motherboard.Memory and storage device: random access memory (RAM) and read only memory (ROM).

Hence, if a computer only has input peripherals and a central processing unit (CPU) it would receive signals and process data respectively.

Find more information: https://brainly.com/question/17402566

Which are types of online resources that students can use for help? Check all that apply.

Answers

What are the choices ?

Answer:

A, B,E.

have a great day

PLZ HELP ASAP!!!
The CPU is referred to as the ______ of the computer.

A. brains
B. face
C. heart
D. soul

Answers

the CPU would be the brain so A) 


have a wonderful rest of ur day :)

The main reason to use a visual aid in a presentation is to

a ensure concepts are more challenging to understand.
b make a challenging concept easier to understand.
c guarantee that complex information is accurate.
d keep an audience’s attention through distraction.

Answers

D keep the audiences attention through distraction

Answer:

d keep an audience’s attention through distraction.

Explanation:

Advantages of Visual Aids in a Presentation:

A picture is worth a thousand words - presentation softwares let you display images and videos that help prove the speaker's theses. By using graphics to show trends or using photographs to showcase a product, the speaker helps the audience better visualize (and therefore understand) what he or she tells you.Appeals to many senses - While oral speech mainly stimulates hearing, the use of multimedia tools stimulates other senses, especially vision. To see is to feel. And for some auditoriums that makes all the difference: Have you ever wondered why tradeshow vendors insist on permanently repeating demonstrations without forgetting the videos that explain the benefits of their products?Greener and more versatile support - Multimedia presentations save paper: a single presentation can be seen by all members of the auditorium without photocopying. On the other hand, they allow greater creativity and originality in the presentation of contents when compared to paper.Easy content creation - Multimedia tools allow you to quickly and simply dress up and embellish the speaker's ideas and make them visually appealing. In fact, no Visual Design course is required to make captivating slides.
Other Questions
After a habituation period if infants do not recognize the previously presented object they will What is the answer to 3/8r=15/16 High birth rate and high death rate in rural areas in South Africa due to lack of education and medical care True or false: according to the empirical rule, 95% of the data is within three plus or minus standard deviations of the mean. Is it legal for an 18 year old to smoke weed washington? Suppose you have developed a scale that indicates the brightness of sunlight each category in the table is five times brighter than the category above it for example a day that is dazzling is five times brighter than a day that is radian how many times brighter is a dazzling day then a dim day Dim=2 Illuminated=3 Radiant=4 Dazzling=5 What is the reaction of the body and mind to disturbing events Find the coordinates of point p which divides the line segment from A=(0,4)to B=(6,8)in a ratio of 1:2 Simplify (-a2b3)2(c2)0 which if these immigrants would have been least likely to encounter prejudice?A. JewB. CatholicC. protestantD. African American The "guns versus butter" dilemma that all nations confront is that a person has to have a class C license to get a class A and B license?truefalse Find the area of this figure. Please show work if you can! What was the chief value of the colonies? What was the effect of the 15th Amendment? A. It legalized the separate but equal doctrine. B. It gave black men the right to vote. C. It struck down the Jim Crow laws in the South. D. It made former slaves citizens of the United States. Simplify. 7i(8i)5656i56i56 What dose me regarde les emission de sport?? What does this excerpt from act 1 of Romeo and Juliet reveal about the Montague-Capulet feud? ABRAHAM: Do you bite your thumb at us, sir? SAMPSON: I do bite my thumb, sir. ABRAHAM: Do you bite your thumb at us, sir? SAMPSON: (aside to GREGORY) Is the law of our side, if I say ay? GREGORY: No. SAMPSON: No, sir, I do not bite my thumb at you, sir, but I bite my thumb, sir. GREGORY: Do you quarrel, sir? ABRAHAM: Quarrel sir! no, sir. SAMPSON: If you do, sir, I am for you: I serve as good a man as you. ABRAHAM: No better. SAMPSON: Well, sir. GREGORY: Say 'better:' here comes one of my master's kinsmen. SAMPSON: Yes, better, sir. ABRAHAM: You lie. SAMPSON: Draw, if you be men. Gregory, remember thy swashing blow. The servants are more serious about the feud than their masters. The servants of both households use the feud as an excuse to pick fights with each other. The Capulet-Montague feud is petty, foolish, and easily blown out of proportion. The servants dont take the feud seriously and are disinterested in its outcome. The young noblemen of both houses use the feud as an excuse to pick fights. Daniela finds the sum of two addenda. The sum is odd. Which statement is true about the addenda Respondez aux questions. Enregistez vos response pour l'activite orale1 What did you eat2 Where did you live3 Who were your friends4 What did you like to do5 What did you like to watch on tv6 What movies did you likePLEASE INCLUDE IMPARFAIT OR PASS COMPOSE Steam Workshop Downloader