A desktop system on your network has been compromised. Despite loading different operating systems using different media on the same desktop, attackers appear to have access to that system every time it is powered up and placed on the network. This could be an example of what type of rootkit

Answers

Answer 1

Answer: Firmware rootkit

Explanation:

From the question, since despite loading different operating systems using different media on the same desktop, and the fact that attackers appear to have access to that system every time it is powered up and placed on the network. This could be an example of firmware rootkit

Firmware rootkits are a threat to ones online safety. In this scenario, the firmware of the computer are targeted by the rootkits and not the operating system and malware are then installed which can destroy the router, or hard drive. This can be used by hackers.


Related Questions

Write a Java statement that declares and creates an array of Strings named Breeds. Your array should be large enough to hold the names of 100 dog breeds.

Answers

Answer: String[]Breeds = new String[100]

what is the full form of ARPANet, WAN,FTP,DCP,HTML,ISP and last WWW​

Answers

Advanced Research Projects Agency Network,

wide area network

File Transfer Protocol

?

Hypertext Markup Language

Internet service provider

world wide web

ARPANET — Advanced Research Projects Agency Network

WAN — Wide Area Network

FTP — File Transfer Protocol

DCP — Diploma Computer Programming

HTML — Hyper Text Markup Language

ISP — Internet Service Provider

www — World Wide Web

HOPE IT HELPS

PLEASE MARK ME BRAINLIEST ☺️

Please!! I need help, this is due by tonight!!!

Answers

Answer:

sorry if it is too late but I think it is d

Explanation:

Leo needs to consolidate data in multiple worksheets by performing a calculation across all worksheets on the same cells.
Which feature should he use to perform this task?
A) data consolidation
B) 3-D reference
C) grouped cells
D) linked cells

Answers

A do you think is the answer

Answer:

3-D reference

Explanation:

Edge 2022

Write a function max_magnitude() with two integer input parameters that returns the largest magnitude value. Use the function in a program that takes two integer inputs, and outputs the largest magnitude value. Ex: If the inputs are: 5 7 the function returns: 7 Ex: If the inputs are: -8 -2 the function returns: -8 Note: The function does not just return the largest value, which for -8 -2 would be -2. Though not necessary, you may use the built-in absolute value function to determine the max magnitude, but you must still output the input number (Ex: Output -8, not 8). Your program must define and call the following function:

Answers

Answer:

The question is answered in python

def max_magnitude(a,b):

   if abs(a) > abs(b):

       return a

   else:

       return b

       

num1 = int(input("Num 1: "))

num2 = int(input("Num 2: "))

print(max_magnitude(num1,num2))

Explanation:

This question is answered using the concept of absolute value to get the integer with the highest magnitude

First, the function is defined with integer parameters a and b

def max_magnitude(a,b):

This checks if a has the highest magnitude

   if abs(a) > abs(b):

If true, it returns a

       return a

If otherwise, it returns b

   else:

       return b

       

The main starts here

The next two lines prompt the user for inputs

num1 = int(input("Num 1: "))

num2 = int(input("Num 2: "))

This calls the function

print(max_magnitude(num1,num2))

Which type(s) of license(s) allow the underlying software code to be viewed?

a. Freeware
b. Free software

Answers

Answer:

The correct answer is B. Free software.

Explanation:

Free software is a term used for software that the holder can use, copy, read, modify and distribute with or without modification at will. Software that falls under this category includes software that is not protected by copyright laws or software that is licensed to be used in this way.

Motives for developing free software can be technical, economic or social. What is significant for developers is the desire to develop as producers of programs by learning from other producers. The desire to help others is also a major motive.

If you have a line that is 2.5 inches in decimal, what is that in fraction form?

2 5/16 inches

2 1/4 inches

2 3/4 inches

2 1/2 inches

If you are asked to measure 9/16th on a ruler how many lines would you have to count?

Answers

Answer: 2 1/2 inches; 9 lines

Explanation:

If one has a line that is 2.5 inches in decimal, this in fraction form will be written as:

= 2.5 inches = 2 5/10 inches.

When we reduce 5/10 to its lowest term, this will be 1/2. Therefore 2.5 inches = 2 1/2 inches.

Since each mark on a ruler is 1/16, therefore 9/16 will be (9/16 ÷ 1/16) = (9/16 × 16/1) = 9 lines

computer is an electronic machine that is used for data processing to produce meaningful information explain in statement​

Answers

A computer is an electronic machine that processes raw data to give information as output. An electronic device that accepts data as input, and transforms it under the influence of a set of special instructions called Programs, to produce the desired output (referred to as Information.) hope This helps!

In the program below, which variable has the same scope as strA?

def usernameMaker (strFirst, strLast):
return strFirst + strLast[0]

def passwordMaker (strA, numC):
if len(strA) > 4:
answer = dogName[0:3]
return answer + str(numC)
else:
return 'xk&' + str(numC)

Answers

Answer:

" numC " is the correct answer

Explanation:

The reason is that on line 3 of code it has "def passwordMaker (strA, numC):"

strA and numC are both in "( )" which is the scope and only things inside are varibles. Also its the only line that has  strA in it.

The scope of a variable is the extent at which the variable can be referenced.

The variable with the same scope as strA is variable numC

From the program, we have the following function definition

def passwordMaker (strA, numC):

Variables strA and numC are declared along with the function passwordMaker

This means that:

Variables strA and numC have the same scope

Hence, the variable with the same scope as strA is variable numC

Read more about scopes of variables at:

https://brainly.com/question/17102008

Search for articles describing front end and back end design of any application (example, a website). Summarize the concepts and elements for each one. Does the database that holds all the data exist at the front end or the back end

Answers

Answer:

No, the database is a back-end utility.

Explanation:

A webpage is a page of a website. The website is the collection of internet pages addressing particular information or service. There are two sides of web development, that is the front-end and back-end web development.

The front-end is the part of a website that interacts or is seen by the user of the website. The back-end developer scripts it to connect the server, route the webpages and communicate the data in the database.

Sarah used a grid to create this layout for a website. Which rule of composition did Sarah use for the grid?



A.
unity
B.
rule of thirds
C.
contrast
D.
rhythm

Answers

Answer:

B rule of thirds

Explanation:

Answer:

a

Explanation:

Write a program that prompts the user to input a string and outputs the string in uppercase letters. (Use a character array to store the string.)

Answers

Answer:

Explanation:

The following code is written in Java. It asks the user for a string/sentence and then grabs every character in the string, capitalizes it, and saves it in a char ArrayList. Then it concatenates the char array into a String variable called output and prints the capitalized String.

public static void capitalizeMe() {

               Scanner in = new Scanner(System.in);

               System.out.println("Enter a String:");

               String inputSentence = in.nextLine();

               ArrayList<Character> capitalString = new ArrayList<Character>();

               for (int x = 0; x < inputSentence.length(); x++) {

                       capitalString.add(Character.toUpperCase(inputSentence.charAt(x)));

               }

               String output = "";

               for (char x: capitalString) {

                       output += x;

               }

               System.out.println(output);

       }

What two solutions address lack of human access to clean water

Answers

Answer:

THREE strategies which local municipality is implementing in addressing the issue of lack of clean water caused by human factors include:

1) Increasing the amount of tax for those companies which are opening their wastes into water sources which can help built better water cleaning and recycle system.

2) Tree plantation is another strategy to help secure the water sources and naturally keep cleaning it.

3) Running awareness campaigns for general people to keep the water sources clean as well as use the only amount of water which they need and not waste it.

Explanation:

i hope this helps you

Plz help me

What is a challenge in wild animal photography?


A. They are easy to close to


B. They don’t move much


C. You can’t position them


D. All of the above

Answers

Answer: C
Explanation: You cannot just go up to a wild animal and make it move to wherever you want it to be. In other words, you cannot manipulate nature.

Answer:

C. You can’t position them for K12

Where can a client identify the instant deposit options for their QuickBooks Payments account?

Deposits tab
Account and Settings
Invoices tab
Create Invoice screen
Banking Center

Answers

Answer:

Banking centre

.

.

..

.

.

.

.

.

.

.

why ROM is called non volatila Memory?​

Answers

Answer:

Explanation:

ROMs that are read only memory are called non volatile because all of the data that are inside it happens to not get erased after shutting down the system or computer and starting it all over again. The opposite is this phenomenon is RAM. In RAM, they are being called volatile because all of the data that are inside it happens to get erased once shutting down of the system or computer occurs and it is being restarted.

This is telling us that ROM irrespective, stores data while it is on and also while it is off, it doesn't matter. It never forgets data, unless of course, in a situation whereby it is erased.

Volatile memory stores data as long as it is powered. ROM, which stands for read-only memory, is called non-volatile memory because of they do not lose memory when power is removed. Data stored in ROM cannot be electronically modified after the manufacture of the memory device.

HOPE IT HELPS

PLEASE MARK ME BRAINLIEST ☺️

Write a class called Date that represents a date consisting of a day, month, and year. A date object should have the following methods: public Date(int day, int month, int year) -- Constructs a new Date object to represent the given date public int getDay() -- returns the day value of this date public int getMonth() -- returns the month value of this date public int getYear() -- returns the year value of this date public void addDays(int days) -- Moves the Date object forward in time by the given number of days public int daysTo(Date other) -- Returns the number of days between this Date and the other Date public boolean isLeapYear() -- Returns true if the year of this Date is a leap year. A leap year occurs when the value of the year is divisible by 4, except when it is divisible by 100 and not 400 (so 1700, 1800, and 1900 are not leap years) public String toString() -- returns a String representation of this date in the form day/month/year Write a program in which to test your class. This program should prompt the user to enter the days, months, and years of two separate dates, and then print out the number of days between these two dates.

Answers

Answer:

No

Explanation:

Because it's years and its also very public

What will be result of below if statement.
if (Grade >= 90)
puts("A");

What’s the answer?

Answers

Explanation:

pls check it ur answer hp u understand this

i want to touch it but if i talked about the past , it would be i wanted to touch it or i wanted to touched it?​

Answers

Answer:

I wanted to touch it

Explanation:

since you put the setting in the past you can use present verbs because we already know it's something that already happened

What is Code?
A) Rules of conduct
B) One or more commands designed to be carried out by a computer.
C) A pack between friends.
D) Edoc spelled backwords.

Answers

Answer:

In a class of statistics course, there are 50 students, of which 15 students  scored B, 25 students scored C and 10 students scored F. If a student is chosen at random from the class, what is the probability of scoring

not F?

Explanation:

Answer:

its b it's like opening multiple tabs

What is a feature of Print Preview?

Fit to Document
Fit to Margin
Fit to Page
Fit to Size

Answers

fit to page i believe

Answer:c

Explanation:

What is the main advantage that a website builder offers for web development?

OA. It enables people with no coding skills to create websites.
OB. It allows developers to debug the code on your website.
OC. It allows developers to adjust the finer details more easily than an IDE does.
OD. It provides tools such as a resource manager and interpreter.

Answers

The correct answer is: OA. It enables people with no coding skills to create websites.

Answer: A

It enables people with no coding skills to create websites.

Explanation:

A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of the data uses to decrypt the text. (230)Group of answer choices

Answers

Answer:

The appropriate response will be "Public key".

Explanation:

A public key would be created in something like such key encryption cryptography consisting incorporates asymmetric encryption of the keys algorithms. Those same keys have been utilized to transform a document to even such an unintelligible form. Decryption consists done using only a separate, however corresponding, secret address or private key.

As per the scenario, a Public key would be the set of such characters.

A public key would have been generated using cryptographic protocols or the techniques, which contains asymmetric keyword encrypted methods.These very same keys were being used to convert a memorandum or manuscript to such an unintelligible state. Decryption has always been accomplished solely through the use of a completely separate, but associated, highly classified address and otherwise key.

Thus the above response is correct.

Learn more:

https://brainly.com/question/20709892

second question today 25 POINTS: What is the formula to balance a lever when both effort and resistance are present?

Answers

Answer:

To find the MA of a lever, divide the output force by the input force, or divide the length of the resistance arm by the length of the effort arm. In a first-class lever the fulcrum is located at some point between the effort and resistance forces.

Explanation:

________ reveals functional requirements regarding the exchange of data and services between systems.
a. Observations
b. User interface analysis
c. Document analysis
d. System interface analysis

Answers

The answer to this question is b

Which file extension indicates a text document? .ppt .tst .pdf .txt

Answers

Answer:

The answer is .txt

Explanation:

Answer:

.txt

Explanation:

odesseyware 2021

A hacker posing as a potential customer has connected to your network and has discovered that a server running Windows Server has a configuration that a misconfiguration on a Windows Server that exposes the PowerShell prompt. The hacker executes a script to log valuable information about the server. Which vulnerabilities did the hacker exploit

Answers

Answer:

Lack of ips

Insecure configuration

Explanation:

Lack of IPS

This is fully known as intrusion prevention softwares this works by enabling the firewall and protecting the computer system from unauthorised users and potential attackers and it prevents data from being stolen by identifying potential attacks. It monitors the network continuously, thereby looking for possible malicious threats and also capturing informations about these threats.

Insecure configuration

Obviously if you have power shell enabled then you would have a secure configuration. Attackers can easily access your system in the presence of this flaw.

Write a program that can be used to calculate the federal tax. The tax is calculated as follows: For single people, the standard exemption is $4,000; for married people, the standard exemption is $7,000. A person can also put up to 6% of his or her gross income in a pension plan. The tax rates are as follows: If the taxable income is:

Between $0 and $15,000, the tax rate is 15%.
Between $15,001 and $40,000, the tax is $2,250 plus 25% of the taxable income over $15,000.
Over $40,000, the tax is $8,460 plus 35% of the taxable income over $40,000. Prompt the user to enter the following information:
Marital status
If the marital status is “married,” ask for the number of children under the age of 14
Gross salary (If the marital status is “married” and both spouses have income, enter the combined salary.)
Percentage of gross income contributed to a pension fund Your program must consist of at least the following functions:
Function getData: This function asks the user to enter the relevant data.
Function taxAmount: This function computes and returns the tax owed.

To calculate the taxable income, subtract the sum of the standard exemption, the amount contributed to a pension plan, and the personal exemption, which is $1,500 per person. (Note that if a married couple has two children under the age of 14, then the personal exemption is $1,500 ∗ 4 = $6,000.)

Since your program handles currency, make sure to use a data type that can store decimals with a decimal precision of 2.

Answers

Answer:

?

Explanation:

You can ask for helps on sites meant specifically for coding like cpphelp and stackoverflow

Explain the concept of Informed Consent?

Answers

Informed consent is a process of communication between you and your health care provider that often leads to agreement or permission for care, treatment, or services. Evey patient has the right to get information and ask questions before procedures and treatments.

What are differences between manual formatting and formatting in word
processor?​

Answers

Answer:-

Editing refers to making quick modification to a document using editing tools such as find and replace spelling and grammar checkers,copy and paste or undo redo features. Formatting refers to changing the appearance of text in a document such as text formatting or page formatting or paragraph formatting.

Other Questions
Pls help me!! Thank u sm An industry consists of 100 small firms, and the largest firm accounts for only 2 percent of sales. Brand names are considered a signal of quality. The industry described is best classified as THE GREATEST PRODUCTYou have sixty seconds to arrange the numbers 3.456and 7 in the boxes below to get the largest productibleEach number may be used only once Why might Montresor becarrying a trowel, or shovel?What guess can you about hisplans? If Danny gains 40 yards on the football field and then looses 15, What was the end result? PLEASSSEEEE ANSWER FAST We know that Jules Verne is the author of Journey to the Center of the Earth. This book is a classic thathas spawned many adventure stories, television shows and at least two movies. In order to understandthe book a little bit better, it helps if we know a little something about the author. Write down a couple ofquestions that you think might be helpful or interesting to know about him. Once you have generatedthose questions, it is time to do a little detective work. Using the Internet (remember focus on sites thatseem reputable) or your local library and helpful librarian, try to find answers to the questions you cameup with. Write out your answers to the questions in a 100-word response in your journal.I NEED HELP PLS!!! What common molecules are made with atoms of nitrogen? please help HURRRRYYY!!!! I WILL GIVE BRAINLIEST!!!!Match the principle of government to the question it answers.1. states rights How are powers in the national and state government kept separate? 2. popular sovereignty How are citizens wishes made known in government? 3. representative government What protects individual freedoms from government oppression? 4. political ideology What guides the beliefs that a government follows? 5. limited government Where does the government get its power given a force of 88n and an acceleration of 4m/s2 what is the mass The metaphysical poets used elaborate metaphors and preferred intellect over sentiment in their poetry.a. True b. False: The value of the 3 number 138 is how many times as great as the value of the 3 in the number 14,397 Eugene ate 20% of the Christmas cookies hisgrandmother made. If he ate 8 cookies, howmany are left? CAN SOMEONE PLEASEEEE HELP ME WITH THIS SCIENCE QUESTION THANK YOU:) Read the excerpt from Act IV of Hamlet.Claudius: Good Laertes,If you desire to know the certaintyOf your dear father's death, is 't writ in your revenge,That, swoopstake, you will draw both friend and foe,Winner and loser?Laertes: None but his enemies.Claudius: Will you know them then?Laertes: To his good friends thus wide I'll ope my arms;And like the kind life-rendering pelican,Repast them with my blood.How does this confrontation advance the plot?The concept of revenge is introduced for the first time in the play.The plays action reaches a climax as Laertes exacts revenge.The suspense builds as Claudius clarifies Laertes's goal.The play's action is resolved as Claudius and Laertes make peace. 4x + 2y = 7I need help This question involves a simulation of a two-player game. In the game, two simulated players each start out with an equal number of coins. In each round, each player chooses to spend either 1, 2, or 3 coins. Coins are then awarded to each player according to the following rules.Same rule: If both players spend the same number of coins, player 2 gains 1 coin.Off-by-one rule: If the players do not spend the same number of coins and the positive difference between the number of coins spent by the two players is 1, player 2 is awarded 1 coin.Off-by-two rule: If the players do not spend the same number of coins and the positive difference between the number of coins spent by the two players is 2, player 1 is awarded 2 coins.The game ends when the specified number of rounds have been played or when a players coin count is less than 3 at the end of a round.The CoinGame class is shown below. You will write two methods in the CoinGame class.public class CoinGame{private int startingCoins; // starting number of coinsprivate int maxRounds; // maximum number of rounds playedpublic CoinGame(int s, int r){startingCoins = s;maxRounds = r;}/** Returns the number of coins (1, 2, or 3) that player 1 will spend.*/public int getPlayer1Move(){/* implementation not shown. */}/** Returns the number of coins (1, 2, or 3) that player 2 will spend, as described in part (a).*/public int getPlayer2Move(int round){/* to be implemented in part (a) */}/** Plays a simulated game between two players, as described in part (b).*/public void playGame(){/* to be implemented in part (b) */}}In the simulation, player 2 will always play according to the same strategy. The number of coins player 2 spends is based on what round it is, as described below.(a) You will write method getPlayer2Move, which returns the number of coins that player 2 will spend in a given round of the game. In the first round of the game, the parameter round has the value 1, in the second round of the game, it has the value 2, and so on. The method returns 1, 2, or 3 based on the following rules.If round is divisible by 3, then return 3.If round is not divisible by 3 but is divisible by 2, then return 2.If round is not divisible by 3 and is not divisible by 2, then return 1.Complete method getPlayer2Move below by assigning the correct value to result to be returned./** Returns the number of coins (1, 2, or 3) that player 2 will spend, as described in part (a).*/public int getPlayer2Move(int round){int result; return result;}Write the method playGame, which simulates a game between player 1 and player 2, based on the rules and example shown at the beginning of the question. Both player 1 and player 2 start the game with startingCoins coins. Computer player 1 spends 1, 2, or 3 coins based on the value returned by the method getPlayer1Move(). Computer player 2 spends 1, 2, or 3 coins based on the value returned by the method getPlayer2Move().The game ends when maxRounds rounds have been played or when a players coin count is less than 3 at the end of a round.At the end of the game, the winner is determined according to the following rules.If both players have the same number of coins at the end of the game, the method prints "tie game".If player 1 has more coins than player 2, the method prints "player 1 wins".If player 2 has more coins than player 1, the method prints "player 2 wins".(b) Assume that getPlayer2Move works as specified, regardless of what you wrote in part (a) . You must use getPlayer1Move and getPlayer2Move appropriately to receive full credit.Complete method playGame below./** Plays a simulated game between two players, as described in part (b).*/public void playGame() PLZ HELP SIMPE TRUE OR FALSEThe tribes in Pontiac's Conspiracy came only from the south, near Georgiatrue or falseThe Stamp Act was the first tax to visibly affect all the coloniststrue or false The American College Testing Corporation has a test called the ACT that is used for admissions to college. The American College Testing Corporation reports that students who attend 2-year colleges in the Midwest United States have an average ACT score of 21.5, with a standard deviation of 3.17. The president of the Minneapolis Community College wonders if students who attend her college have a ACT scores that are significantly different from the ACT scores reported by the American College Teaching Corporation. The president would perform a ___________ test, and use a z-critical value of _____. NUMBER 6 ONLY. Please help. Only if you are SURE