Farouk uses his computer to break into Global Financial Center's computer.Farouk is a
A) hacker.
B) phisher.
C) worm.
D) virus.

Answers

Answer 1

Answer:

hacker

Explanation:


Related Questions

which command can be used to check the system calls called by the program in a Linux operating system

Answers

Answer:

STRACE

Explanation:

strace is a powerful command line tool for debugging and trouble shooting programs in Unix-like operating systems such as Linux. It captures and records all system calls made by a process and the signals received by the process.

Sarah has an audio file to insert into a presentation, but she does not want the entire file to play. What should she do to have only a portion of the file play when the audio control is selected?

1. Create bookmarks.
2. Edit the file prior to inserting it into the presentation.
3. Use the Trim Audio dialog box.
4. Configure Audio styles.

Answers

Answer:

3. Use the Trim Audio dialog box. :3

Answer:

3: Use the Trim Audio dialog box.

Explanation:

I am not entirely sure, though I am quite certain.

You have configured a cloud-based VDI solution in which client devices run a cloud-based Windows desktop. Which term best describes the connecting user device that may be generally used

Answers

A thin client is an end user device that, although having little processing and storage power, may connect to a powerful remote server via a network to execute operating systems and applications.

What is the name of the firewall service provided by the cloud?

Cloud firewalls are also referred to as FWaaS, or firewall-as-a-service. Similar to other "as-a-service" categories like software-as-a-service (SaaS) or infrastructure-as-a-service, FWaaS functions in the cloud, is accessed over the Internet, and is updated and maintained by a third-party provider (IaaS).

What are the three fundamental types of cloud computing platforms?

The other three main kinds of cloud computing services are platforms-as-a-service (PaaS), infrastructure-as-a-service (IaaS), and software-as-a-service (SaaS). The decision to use a particular cloud type or cloud service is personal.

To know more about VDI visit :-

https://brainly.com/question/13650925

#SPJ4

In what ways is the Zara model counterintuitive? In what ways has Zara’s model made the firm a better performer than Gap and other competitors?

Answers

Zara has put up a lot of effort to maintain its lead over other clothing retailers, and by doing so, they have remained successful and outstanding.

A simple computer model is what?

There are three conceptual aspects to the computer. input device output unit for a central processing unit (CPU).

Technology was used by Zara to expand its business and is still being used until the last transaction. Zara's success is largely attributable to their capacity to ascertain what the client wants, as well as to producing the goods and getting them onto the shelves as rapidly as possible, and minimizing costs associated with markdowns, inventory errors, and advertising.

To know more about Models visit :

https://brainly.com/question/4122308

#SPJ4

Python ch5
Write the code to call the function named send_signal. There are no parameters for this function.send_signal()
Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to standard output a single line consisting of 5 periods (".").
def printDottedLine():
print(".....")
Write the code to call a function whose name is send_number. There is one argument for this function, which is an int. Send 5 as an argument to the function.send_number(5)
Write the code to call a function named send_variable and that expects a single int parameter.

Answers

The code to call the function name send_signal() is given below.

In Python, how can you call any function without any arguments?

In these circumstances, we can call the function using default arguments without providing the values again for parameter values.Python allows us to accomplish this by using the = sign and the default value.

send_signal().

def printDottedLine():

print(".....")

def printDottedLine():

print(".....")

send_number(5)

send_variable(x);

To know more about Python visit:

https://brainly.com/question/13437928

#SPJ4

____ data can have only a true or false (yes or no) values.

Answers

Answer:

boolean data

Explanation:

Source code is one particular representation of a software system. It highlights some details and hides others. This is a good example of:

Answers

A nice example of abstraction is when a source code shows some details while hiding others.

What exactly is computer source code?

A programmer's text editor or visual programming tool-created programming statements that are later saved in a file are known as source code. The output, a compiled file, that results from the compilation of the source code using a C compiler is referred to as object code in most contexts.

How is the source code concealed?

Really, there is no method to conceal the source code for languages used on the web. Everyone has access to it if the browser can see it. Obfuscating it is one way to try to make it more difficult. Given enough time, one can still make sense of it.

To know more about abstraction visit :-

https://brainly.com/question/19419456

#SPJ4

Joe works for an insurance company and has been tasked with creating a web-based application that the field adjusters can use to upload pictures of vehicles they are inspecting. Which of the following components would Joe need to create and configure on their cloud service provider's portal for the pictures to be saved to

Answers

We tried several cloud backup services, and while they are all difficult to use for various reasons, we nevertheless advise utilising one.

What is cloud backup services?Local backups serve as the foundation of a sound backup strategy, but an online backup service should be the capstone. In our opinion, Back blaze is the best cloud backup service for the majority of users and the most user-friendly after years of testing.Back blaze is the least expensive backup solution we examined, offering unrestricted online storage for one machine for about $70 annually. On Mac and Windows, it is simple to use. The uploads begin right away with the most frequently used folders that need backing up when the software is installed and the settings are left to their defaults. Despite the fact that Back blaze only retains file versions for 30 days, which is shorter than we'd prefer, it does provide paid upgrades to extend the time that backups are kept accessible. Backblaze supports external drives that are linked to your computer and offers a robust selection of online support resources. However, the use of private encryption keys compromises some security for usability, and the restoration procedure is far too slow.

To Learn more About cloud backup services Refer To:

https://brainly.com/question/13152446

#SPJ4

What function should be used to draw a box?

Answers

Answer:

noun In cotton manufacturing, a set of three or more pairs of rollers attached to combing- and certain other machines for attenuating, or drawing out, the sliver.

Explanation:

Why is computer science so important?

Answers

The reason that computer science are:

Economic Impact: Technological AdvancementSocietal ImpactSkill Development

What is computer science?

Computer science is important for several reasons:

Economic Impact: Computer science is a rapidly growing field with a high demand for skilled professionals. It plays a crucial role in driving innovation and economic growth in various industries such as finance, healthcare, education, and entertainment.

Technological Advancement: Computer science is the foundation of modern technology. It is the backbone of the internet and it's a key driver of technological advancements such as artificial intelligence, machine learning, and big data.

Societal Impact: Computer science plays a critical role in solving complex societal problems such as healthcare, education, and environmental issues. It can help to improve the quality of life and make the world a better place.

Lastly, in Skill Development: Learning computer science helps to develop a range of skills such as problem-solving, critical thinking, and creativity that are valuable in any field.

Learn more about computer science  from

https://brainly.com/question/20837448

#SPJ1

The statement “If a customer buys a dozen eggs, he or she is 80% likely to also purchase milk.” is a conclusion that may be determined from what type of data mining?

Regression Analysis
Clustering Analysis
Association Rule Mining
Anomaly or Outlier Detection

Answers

Answer:

Association Rule Mining

Explanation:

The statement being made is a conclusion that may be determined with Association Rule Mining. This is because this type of data mining focuses on discovering various frequently occurring patterns, correlations, or associations in large sets of data. In this statement, various surveys or experients would have most likely concluded that many individuals that ended up buying a dozen eggs also purchased milk, which would have indicated a pattern in the data set.

The type of data mining from which the given statement concluded is; C: Associate Rule Mining

What is Data Mining?

The given statement made is a conclusion that can be determined with Association Rule Mining. This is because this type of data mining is one that places emphasis on discovering various frequently occurring patterns, correlations, or associations that exists in large sets of data.

Finally, various surveys or experiments would most likely have definitely concluded that many individuals that ended up buying a dozen eggs that is 80% also likely to purchase milk, which would indicate a pattern in the data set.

Read more about Data Mining at; https://brainly.com/question/14846093

Why do you think lists are essential concepts in programs?

Answers

Answer:

A list, sometimes called an array, is a tool for storing data, just like a variable. However, unlike a variable, which can only store one piece of data, a list can store many. Like a variable, a list is a named storage area within the computer's memory.

I need help with creating a code for defining if a number i an Armtrong or not
on code h

Answers

A number is said to be Armstrong if the sum of its digits raised to the power of three equals the number itself. For instance, the number 371 is an Armstrong number as 3**3 + 7**3 + 1**3 = 371

I don't know how to receive my Armstrong number.

Armstrong numbers are numbers that are identical to themselves when the various digits of the number are added together to form a cube. Because 153 = 13+53+33, it is an Armstrong number. Expected Results: The Armstrong number is 153.

The inventor of the Armstrong number?

American electrical engineer and inventor Edwin Howard Armstrong (December 18, 1890 – February 1, 1954) created the superheterodyne receiver system and FM (frequency modulation) radio.

To know more about armtrong number visit:

https://brainly.com/question/29556551

#SPJ4

To generate a surrogate key, Microsoft Access uses a(n) ____ data type.
a. identity
b. autoNumber
c. surrogate
d. sequence

Answers

B. AutoNumber???
This is a strange question..
sorry if I’m wrong

Security managers are accountable for the day-to-day operation of the information security program. T/F?

Answers

The answer of this statement "Security managers are accountable for the day-to-day operation of the information security program" is True.

What is a Security Program?

An group's security policies, procedures, tools, and controls are all part of its security program. In essence, your security program is the comprehensive, multifaceted security strategy & governance that safeguards the sensitive information and capabilities of your firm.

Why are security programs important?

The cyber security policies, practices, standards, and recommendations of your company are provided in a structured security program. For data to be actively protected while remaining compliant with best practices, legal regulations, and consumer standards, security procedures are essential.

To know more about security program visit :

https://brainly.com/question/30168673

#SPJ4

To analzye various alternative scenarios, a manager would use _______.
a. the spreadsheet's 'what-if' capability
b. the graphing features of spreadsheet software
c. the reporting feature of a BI tool
d. a data visualization tool

Answers

The 'what-if' feature of the spreadsheet would be used by the management to assess numerous potential scenarios.

used to search through enormous amounts of data for hidden patterns that can be utilized to forecast future trends?

Large data sets are sorted through using a technique called data mining to find patterns and relationships that may be used to analyze data and find answers to business challenges. Businesses can foresee future trends and make more educated business decisions thanks to data mining techniques and tools.

Which of the following will be a fact measure in a data cube utilized at a chain retail establishment?

The revenue for a chain retail business is typically the fact measure in a data cube (example: Indiana's second-quarter revenue of $900 from sales of pants).

To know more about spreadsheet visit :-

https://brainly.com/question/8284022

#SPJ4

R Management 4. Assume that your system has one queue for jobs waiting for printing, and another queue for those waiting for access to a disk. Which queue would you expect to have the faster response? Explain your reasoning. ​

Answers

This suggests that the other queue, where jobs are awaiting access to a disk, will move more quickly.

Why is a system referred to as a computer?

Its interconnected components (input, output, storage, and CPU) work together to accomplish the tasks specified in the program being run, a computer is referred to as a system.

This is so that other jobs can't interfere with the job that is done as even the printing queue operates on the first Attend, First Wait algorithm, which requires the queue waiting and printing services to go through numerous other procedures before the service provided to print. Additionally, since the job with printing must save the data on the disk, there is a chance that doing so will quickly and randomly alter the disk's content. This may lead to the potential that perhaps the disk is just not updated with the most recent information; as a result, the printing process may produce outdated information that is unusable. However. As it does not operate according to the initial Ask, first Serve algorithm, the queue waiting for disk access would've been able to handle more jobs quickly.

To know more about System visit :

https://brainly.com/question/30146762

#SPJ4

You are seeing streaks of toner across your papers when you are printing things using your office's laser printer. What is the MOST likely cause of this problem

Answers

It's usually a sign of a filthy transfer roller if you notice toner streaks on your printouts. As a result, routinely cleaning the transfer roller will keep your printed documents spotless.

What brings about toner streaks?

Toner can pour out of a broken cartridge, or it can cause streaky prints. It is necessary to change your toner cartridge if any of its photoconductor's (the part with the green or blue roller) parts are visibly harmed.

Why are there streaks on my laser printer's prints?

The most common causes of streaking are a used-up toner cartridge or a worn-out drum unit. Drum units are consumables that only require replacement after using three or four toner cartridges. Toner and drum units are not always used separately by printers.

To know more about laser printer visit:-

https://brainly.com/question/14783882

#SPJ4

The trackpad/touchpad on my laptop is acting unusual. When I click on something or move to an area, it jumps or moves to another area. What would be a good troubleshooting step to try and resolve this issue

Answers

1. Check Drivers: this probably won't solve your issue as driver problems are pretty rare, but it's a pretty good first step. To find drivers, search your model number on your manufacturers website.

2. Dry out the touchpad: I've had similar experiences when a touchpad is wet. Dry out the touchpad using a microfiber cloth or a paper towel.

Which of the following kinds of file utilities shrink the size of a file(s)?
A. conversion. B. file compression. C. matrix. D. unit

Answers

The Correct answer is Option (B), A file compression utility is a utility that shrinks the size of a files.

What is Compression utility?

A software package that compressed and decodes different file types is known as a compression software or compression utility. Tools of compressing and uncompressing files are generally included with operating systems. For instance, the most recent versions of Microsoft Windows come with a tool for producing and extracting compressed files.

What makes a compression tool helpful?

Black and white pictures can be compressed up to 10 times, and color image files can be compressed up to 100 times). They will upload faster as a result, making them considerably simpler to email and transfer.

To know more about Compression utility visit :

https://brainly.com/question/30022738

#SPJ4

The main reason to use secondary storage is to hold data for long periods of time, even when the power supply to the computer is turned off.
True
False

Answers

Answer:

Explanation:

True. The main reason to use secondary storage is to hold data for long periods of time, even when the power supply to the computer is turned off. Secondary storage devices, such as hard drives and solid state drives, are used to store data that is not currently being used by the computer but needs to be kept for future use. These devices retain data even when the computer is powered off, unlike primary storage devices such as RAM which lose their data when the power is turned off.

Secondary storage is also used for archiving older files and data that are not needed on a regular basis. They also provide a larger storage capacity than primary storage devices, which allows users to store more data or larger files. With the availability of large external storage devices, like hard drives or USB drives, it's possible to take the secondary storage outside of the computer, making it easy to backup or share data.


One line of code is missing (marked in
red). Write a single line that MUST use the
class function "plus" to increase the value
of num1.number.
When done correctly, this code already will
print the new value of num1.number.

Answers

Answer: num1.plus(1);

Explanation:

You must analyze data on a digital camera's internal memory. You plan to connect your forensic computer to the camera using a USB cable. What should you do to ensure that you do not modify data on the camera

Answers

A read-only device known as a forensic disk controller or a hardware write-blocker enables users to access the data on a questionable device without running the risk of changing or destroying the data.

What initial care should be taken with a mobile device to protect data?

The easiest approach to handle a mobile device and protect data is to keep it powered on while enclosing it in a Faraday cage.

What program is used to image a disk for forensic purposes?

The Autopsy and the Sleuth Kit are probably the two most well-known forensics toolkits. The Sleuth Kit is a command-line tool that does forensic examination of hard drive and smartphone forensic photos.

To know more about forensic disk visit:-

https://brainly.com/question/9692470

#SPJ4

What is the easiest way of ensuring that others can access a presentation that a user has created and make changes to it, while also ensuring that those changes are tracked and coauthoring can occur?

Save to removable media.
Email the file.
Store on OneDrive and share.
Make a second copy of the file.

Answers

Answer: Its C

Explanation: I just found the answer

Which best describes the jobs each applicant could obtain with their education background? ​

Answers

Answer:

Eli can work as an e Electromechanical Technician. Blake can work as a Museum Conservator. Fiona can work as a Robotics Engineer, and Zoey can work as a Mathematician

Explanation:

The degrees earned by the applicants for the STEM Career Cluster are;

Eli; High school diploma, associate degree

Blake; High school diploma, bachelor's degree, masters degree

Fiona; High school diploma, bachelor's degree

Zoey; High school diploma, bachelor's degree, doctoral degree

a) The educational requirement for an Electromechanical Technician is a post secondary certificate in mechanical or electronic technology or an associate degree

The suitable candidate to work as an Electromechanical Technician is Eli to prevent underemployment of the other candidates

b) The educational requirement for a Museum Conservator is usually a master's degree

The suitable candidate is Blake

c) The minimum educational requirement for a Robotics Engineer is a bachelors degree

Therefore, Fiona can obtain a job as a Robotics Engineer

d) The educational requirement for a Mathematician is usually a masters or doctorate degree

Based on the educational requirement, only Zoe can obtain a job as a Mathematician.

Which of the following can be described as an isolated guest operating system installed on top of a normal operating system?
Select one:
a. virtual machine
b. physical server
c. host computer
d. emulated PC

Answers

An isolated guest operating system that is put on top of a regular operating system is what is known as a virtual machine.

What advantages can virtual machines offer?

Data accessibility, sharing, backup, and recovery are made simple with the aid of virtual machine solutions, providing flexibility and mobility in company operations. This helps to ensure company continuity as well as the benefits of cooperation and enhanced productivity.

What are the workings of a virtual machine? It is what?

A computer file that mimics the operation of a real computer is called a virtual machine. Typically, these files are referred to as images. It can function as the entire computer experience for the user or operate in a window as a separate computing environment, typically using a different operating system.

To know more about virtual machine visit:

https://brainly.com/question/29535108

#SPJ4

A painting company has determined that for every 112 square feet of wall space, one gallon of paint and eight hours of labor will be required. The company charges $35.00 per hour for labor.
Write a function named compute_cost(), that takes area of wall space and the price of a paint gallon. Function then computes the following:
The number of gallons of paint required
The hours of labor required
The cost of the paint
The labor charges
The total cost of the paint job
Finally it returns the total cost to the calling program
Write the main() function that prompts the user to enter area of wall space to be painted and the price of a paint gallon. The main function then calls compute_cost() function to compute the cost and prints the total cos.
Make sure it is in python program

Answers

The sum of paint cost() and labor charge ()

print(f"The number of hours of lab time are needed: labour()hours" print(f"The number of gallons of paint are needed: gallons(wall)")

Print "The Price of Paint: $paint cost()," "The Price of Labor: $labour charge()," and "The Total Price of the Job: $round(total(), 2)"

In Python, what is a programme?

A collection of Python statements that have been carefully chosen to accomplish a certain task is the simplest definition of a programme.

The square footage of a wall in feet and the cost of a gallon of paint are inputted by the user into the python software. To determine the entire cost of the project based on the quantity of paint and the labour costs, five functions are used: gallons(), labour(), paint cost(), labour charge(), and total().

To know more about Python visit:-

brainly.com/question/18502436

#SPJ4

If data takes up more than one line in a cell, ____.
a. you must manually reconfigure the cell height
b. some text will not appear
c. Word automatically wraps the text to the next line and increases the height of the row
d. Word moves the text into a new cell

Answers

c. Word automatically moves the text to the following line and makes the row taller.

Can you type while dragging the entry point to the a cell in a table to enter data?

Moving the entry point to a column and typing allow you to input data into a table.The easiest way to pick a specific area of a table is to drag the mouse pointer over the columns and rows.The insertion point changes to a new spot on the horizontal ruler when users press the Tab key, which is known as a tab stop.

How can I ignore several mistakes in Excel?

Launch your Excel workbook.Pick out the cell (and cells) that the error messages are displayed in.When the cells are chosen, click the caution icon which appears next to them.Choose Ignore Error from the drop-down menu.

To know more about Word visit:

https://brainly.com/question/28611

#SPJ4

Which local folder temporarily stores all sent mails until they are successfully sent to a recipient

Answers

Answer:

The outbox stores all outgoing emails until the Email programs sends them to a recipient.A computer or phone's outbox is a folder where emails that are awaiting sending are kept

Explanation:

When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.

Answers

Answer: DNS

Explanation:

Other Questions
For the final two questions, use this link to see a time-lapse map of urban growth in Las Vegas, Nevada, since 1985:1. In at least two sentences, describe how the city has changed over time. (2 points)2. Think about Las Vegas's ecosystem. How has Las Vegas's growth affected its ecosystem? What was the purpose of war time entertainers? A store is having a sale on chocolate chips and Walnuts. For 3 pounds of chocolate chips and 5 of walnuts, The total cost is $19. For 9 pounds of chocolate chips and 7 pounds of walnuts, the total cost is $35. Find the cost for each pound of chocolate chips and each pound of walnuts. A company is producing picture frames as well as the glass for the front of the frames. The amount of wood requiredfor the frame is represented by the function W/(x), and the amount of glass is represented by the function G(x). Theframes have lengths represented by the function f(x) and widths represented by g(x).X2345W(x)=2[(f+g)(x)]14243444G(x) = (f-g)(x)62760105Which statement describes the combined functions W(x) and G(x)?O The amount of glass required has a constant rate of change, but the amount of wood does not.O The amount of wood required has a constant rate of change, but the amount of glass does not.O Both the amount of wood required and the amount of glass required have a constant rate of change.ONeither the amount of wood required nor the amount of glass required has a constant rate of change. Which freezes faster, hot water or cold water? In the reaction 2K + Cl2 2KCI, the speciesoxidized isA. Cl2B. CI-C. KD. K+ Unlike price ceilings, price floors lead to very positive effects when properly implemented.True/False A box contains 3 plain pencils and 9 pens. A second box contains 9 color pencils and I crayon. One item from each box is chosen at random. What is theprobability that a pen from the first box and a crayon from the second box are selected?Write your answer as a fraction in simplest form. What is the prepositional phrase for "the flag twirlers marched behind the school band. " Complete the statment with the best choice.All rectangles are also_____________________.a.squaresc.trapezoidsb.parallelogramsd.rhombusesPlease select the best answer from the choices providedABCD help please A lamp is marked 1.8w in normal brightness it carries a current of 600mA1) what is the related voltage? Why would a developer choose to store source code in Cloud Source Repositories? Choose all the answers that are correct (2 correct answers).A) To reduce workB) To have total control over the hosting infrastructureC) To keep code private to a GCP project M/5 + 9=11Solve two step equations The autonomic nervous system is the part of the peripheral nervous system that is responsible for1. skeletal muscle movement.2. involuntary bodily functions, such as sweating.3. light, sound, taste, and smell detection.4. new cell development. Roman urbanism was based on the philosophy of imperial order, a means of making manifest through planning and architecture common urban spatial arrangements and building types. Which of the following is NOT considered an element of Roman urbanism imperial order All of the following are challenges to community-based environmental initiatives becoming policy EXCEPTWHAT THE IMAGE SHOWS -------->Ring of blue circles with white text. In the bottom circle, it reads Individual intrapersonal, Knowledge, skills and motivation of an individual. The next circle up reads, Interpersonal An individuals relationship with others. The circle above reads Organizational Institutional, The rules and regulations of organizations. The circle above reads Community, Community resources that promote social norms. The last circle reads, Policy, Local, state and federal policies.ANSWER CHOICES----> the reliance upon unpaid volunteers high levels of staff turnover limited availability of resources participant retention mutual learning experiences between individuals and organizations is there a point in going to university or college? (n + 8) + (n - 12) whats the answer?? You are making a sandwich. You need lettuce, tomato, and two slices of bread to make the sandwich....L = lettuce. T = Tomato. B = Bread. S = SandwichVegetables ( Lettuce and tomato) are $2 a piece. Bread is $1 a slice.The cost of a sandwich can be represented by the equation: {L+T+B+B = S.}1.) Write another equation you could use to show the cost of a sandwich. (hint: add then multiply)2.) Figure out the cost of a sandwich (Solve for S). Which region had the greatest growth in percentage of households with a computer between 2008 and 2018