Answer:
privilege escalation.
Explanation:
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification
Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.
In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.
Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.
Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.
pls help
urgent questions please
Answer:
1 - CLI
2- GUI
3-CLI
4- CLI
Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest
Answer:
Motion sensor.
Explanation:
I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor
plz help
In response to a line of code reading name = input(“What is your name?”), the user enters the word Joshi. What will be the variable name assigned to the data Joshi?
a.
input
b.
name
c.
one
d.
What is your name?
Answer:
name
Explanation:
name =
is an assignment to the variable called 'name'.
Answer:
b. name
Explanation:
Not sure what language this is, but it looks like input( ) is a function that displays whatever you pass in, and then gets the responding user input.
Therefore, when you assign the function to a variable named "name", whatever the user input is will be assigned to it.
var name;
name = input("What is your name?");
print(name); //This would print the user's input.
What do you use the Pygame library for?
Answer:
Pygame is a cross-platform set of Python modules designed for writing video games. It includes computer graphics and sound libraries designed to be used with the Python programming language.
Select all the correct answers.
Which THREE of the following are spreadsheets typically used for?
budgeting
scientific analysis
creating presentations
number formatting
computer programming
Answer:
number formatting,
scientific analysis computer programming
Answer number formatting,
scientific analysis computer programming
Explanation: its right
which of the following has the highest storage capacity?
a.digital versatile disc
b.computer disc
c.floppy disk
d.hard disk
Answer:
d. Hard disk
Explanation:
The storage capacity of the given options are presented as follows;
[tex]\begin{array}{lr}Device& Storage \ Capacity\\ Digital \ versatile \ disc\ (DVD)& 4.7 \ GB\\ \begin {flushleft} Computer \ disc \ (CD)&703 \ MB\\Floppy \ disk & 2.8 \ MB\\Hard \ disk & 1,000 \ GB\end{array}\right][/tex]
Therefore, the device with the highest storage capacity from among the options is the hard disk with a storage capacity of 1,000 gigabytes of data
Select the correct answer.
Walden is looking at his company’s regional sales numbers. He needs a quick estimate of the total sales across regions. The numbers are confusing to read because of the trailing decimals. What function can Walden use to round the numbers to the nearest whole number?
A.
=ROUND(number)
B.
=ROUND(0)
C.
=ROUND(number, 0)
D.
=ROUND(1)
E.
=ROUND(number, 1)
Answer:
C. =ROUND(number, 0)
Explanation:
The ROUND function in MS Excel is used in rounding off numbers input in the function to a specified number of decimal places
The cell address containing the original number to be rounded off, or the original number is entered as the first argument of the function, while the second argument is the number of digits the original number is to be rounded to
In order to round to the nearest whole number, the second argument would be 0 which result in the removal of the numbers after the decimal place and rounding the last integer on the bases of the value of the number after the decimal point
Therefore, to round the original number to the nearest whole number, the function Walden should use is =ROUND(number, 0).
what is the correct way to write h1 tag
Answer:
[tex]\huge\boxed{\texttt{<h1> </h1>}}[/tex]
Explanation:
The h1 tag in HTML is used to create title-like text.
HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.
Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website. JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.
Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.
<h1> Hello there! </h1>
The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.
Hope this helped!
PLEASE HELP DUE IN 30 MINUTES NO LINKS PLEASE
Answer:
3
Explanation:
Answer:
Correct answer is C: Format Check
which memory can be removed from motherboard? RAM OR ROM?
Answer:
RAM is random-access memory and it can be removed from the motherboard.
Feel free to mark as brainliest :D
When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may display a _________ before allowing you to move forward. Select one: Red Flashing Lights Red X Warning Bell Warning Page
Answer:
the last option
warning page
Which term describes the part of a file name after the period that indicates which application can create or open it?
O CSV
O path
O extension
O delimiter
What is the error in the following line: (1)
age=int(input("Enter your age:")
Answer:
14
Explanation:
Q3.What are the hardware requirement of the multimedia system?
Answer:
• The processing unit
• The memory
• Universal Serial Bus (USB) Device
• Graphics Card and Graphical Processing Unit (GPU)
• Hard drive
• Monitor
• External storage and optical device
You are an administrator with 550 devices to enroll into Intune. You choose to bulk enroll them. Which other software will you need to build the package necessary to bulk enroll the devices via USB or network location
Answer: Windows Configuration Designer (WCD)
Explanation:
The other software that will be needed to build the package which is vital in bulk enroll the devices through USB or network location is Windows Configuration Designer (WCD).
Windows Configuration Designer typically allows the configuration of several aspects of Windows devices such as Active Directory, Connect to WiFi, Device name, and install applications.
Express 42 as a product of its prime factor
who invented the Bluetooth device
Answer:
The Bluetooth standard was originally conceived by Dr. Jaap Haartsen at Ericsson back in 1994.
Explanation:
according to this website www.androidauthority.com/history-bluetooth-explained-846345/
Answer:
alexander - edg 2022
Explanation:
what is processing for a computer?
Answer:
is an action or series of actions that a microprocessor, also known as a central processing unit (CPU), in a computer performs when it receives information.
The mapping of a logical address to a physical address is done in hardware by the ________. A. memory address register B. memory-management-unit (MMU) C. relocation register D. dynamic loading register
Answer:
b. Memory-Management Unit
Explanation:
The hardware device called Memory-Management Unit is used for mapping logical address to its corresponding physical address.
Sami needs to decide how the fonts, colors, and images will look on her new web site. Which will help her pian her design?
O Mockup
Rough draft
O Sketchbook
Storyboard
Answer:
Your answer is D Storyboard
Explanation:
Storyboarding is a process where you plan how things will look on your website just as described.
By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:
Answer:
Software piracy.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
Basically, softwares are categorized into two (2) main categories and these are;
I. Open-source software.
II. Proprietary software.
A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.
Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.
Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.
Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).
Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.
when can one say that certain product has value
Answer:
We can say that a certain product has a value when it is sold on Market and if many people demands on it. Products are produced to satisfy our needs and wants.
Explanation:
thank me later
Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to
Answer:
She is referring to composite primary key
Explanation:
Composite primary key comprises of several columns with each having column having its own individual uniqueness.
In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.
What do you call a collection of pre-programmed commands and functions used in programs?
Choices
1.Widget
2.Function
3.Libary
4.Variable
please answer this question
Answer:
17. True
18. Backup
Explanation:
Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.
When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.
pls pls pls helppp!! I NEED SOMEONE WHO IS A PRO AT COMPUTER SCIENCE CODING LIKE PYTHON AND STUFF TO CREATE A ZOOM AND HELP ME WITH SOMETHING!! :))) PLEASEEE
Answer:
?
Explanation:
Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.
a) Realiza un esquema en planta del mecanismo.
b) Calcula n2 n3, n4. y la relación de transmisión.
c) Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.
Answer:
a. engranaje 1 → engranaje 2 → engranaje 3 → engranaje 4
z1 = 10 z2 = 20 z3 =10 z4 = 20
b. n2 = 600 rpm, n3 = 1200 rpm, n4 = 600 rpm
la relacion de transmision = 2
Explanation:
where z1 = 10, z2 = 20, z3 = 10, z4 = 20
and n1 = 1200 rpm
n2 = n1 * z1/z2 = (1200 * 10)/ 20 = 600 rpm
n3 = n2 * z2/z3 = (600 * 20)/ 10 = 1200 rpm
n4 = n3 * z3/z4 = (1200 * 10)/ 20 = 600 rpm
la relacion de transmision = z2/z1 * z3/z2 * z4/z3
= 20/10 * 10/20 * 20/10 = 2 * 0.5 * 2 = 2
What is the first phase of game development?
OA
the concept phase
B.
the pre-production phase
O c.
the prototype phase
D.
the alpha phase
E.
the beta phase
Hello there! The answer is:
B. The Pre-Production Phase
When someone or a group of people are designing an app or game, they generally follow the rule of phases. Basically, if you don't know what this process is, sound effects, character designs, icons and the concept are discussed. This is the first phase of game development.
I hope I helped you!
Data inconsistency is described as A. Lack of data sharing between DBMS and Data Warehouse B. Program data dependence C. Having duplicate data in multiple files D. Lack of data sharing between similar DBMS E. Different versions of the same data appear in different places
Answer:
Having Duplicate Data in Seperate Files
Explanation:
A conflicting data set happens when managerial changes to a data set in the exchange log disagree with data kept up in the data set's setup document. A DBMS is a way this can be forestalled. I hope I helped you!
What space is space surrounding the area around the main subject.
Answer:
Positive space refers to the subject or areas of interest in an artwork, such as a person's face or figure in a portrait, the objects in a still life painting, or the trees in a landscape painting. Negative space is the background or the area that surrounds the subject of the work.
Explanation:
- The emptiness around and between the shapes or forms are called the negative spaces or ground. We often call it the background but it is more than that.