must eat is a company that allows online food delivery. must eat rolls out updates every month for better user interface. recently, after one of its updates, the network team of the company detects certain unauthorized access to the main data frame of the company. on inspection, the team notices that there has been no breach of sensitive data. what kind of cybersecurity exploitation was attempted by the hackers in this scenario?

Answers

Answer 1

Since must eat is a company that allows online food delivery, the kind of cybersecurity exploitation was attempted by the hackers in this scenario is  A zero-day attack.

What is meant by zero day attack?

Since the seller or developer has only become aware of the flaw, they have "zero days" to remedy it, hence the term "zero-day." When hackers take advantage of the vulnerability before developers have a chance to fix it, it is known as a zero-day assault.

This harmful computer worm targeted machines in Iran, India, and Indonesia that were utilized for manufacturing. Iran's uranium enrichment facilities were the main target in an effort to thwart the nation's nuclear program.

Therefore, Since there are currently no antivirus signatures or updates for zero-day threats, they are by definition challenging to identify. There are a variety of zero-day vulnerability detection techniques that can be used to locate previously unknown software vulnerabilities.

Learn more about A zero-day attack from

https://brainly.com/question/27715022
#SPJ1

See full question below

Must Eat is a company that allows online food delivery. Must Eat rolls out updates every month for better user interface. Recently, after one of its updates, the network team of the company detects certain unauthorized access to the main data frame of the company. On inspection, the team notices that there has been no breach of sensitive data. What kind of cybersecurity exploitation was attempted by the hackers in this scenario?

1. It could have been an evil twin exploit.

2. It could have been an attempted hack by a white hat hacker

3. A zero-day attack might have been the cause

4. It could have been an attempted hack by a gray hat hacker


Related Questions

you want to create alerts on your cloud resources, such as when health checks fail. which is the best cloud product to use?

Answers

Stackdriver Monitoring  is the best cloud product to use.

What is Stackdriver Monitoring ?

A monitoring tool called G**gle Stackdriver gave IT teams information on the performance of programs and virtual machines  running on the public clouds of G**gle Cloud Platform  and Amazon Web Services.

What is virtual machine?

An electronic replica of a physical computer is called a virtual machine . Virtual machine software requires upkeep such as updates and system monitoring because it can run programs and operating systems, store data, connect to networks, and perform other computing functions.

What is  G**gle Cloud Platform?

The G**gle Cloud Platform  is a collection of cloud computing services that G**gle offers. It employs the same internal infrastructure as G**gle does for its consumer products including

What is Amazon Web Services for?

With Amazon Web Services, you may select the web application platform, programming language, operating system, database, and other services you need. Through Amazon Web Services, you receive a virtual environment that you may populate with the applications and services your application requires.

Learn more about g**gle cloud click here :

https://brainly.com/question/13526923

#SPJ4

all firewalls, including those using static packet filtering, stateful inspection, and application proxy, have one thing in common. what is it?

Answers

All firewalls, including those using static packet filtering, stateful inspection, and application proxy, have one thing in common.It is rules

What are the 4 varieties of different firewall rules?There are three basic types of firewalls that are used by companies to protect their data & devices to keep destructive elements out of network, viz. Packet Filters, Stateful Inspection and Proxy Server FirewallsAn organization's previously set security policies are used to monitor and filter incoming and outgoing network traffic through a firewall, a network security device.A firewall is essentially the barrier that stands between a private internal network and the open Internet at its most basic level. There are four basic types of firewalls, each with a different way of operation,fire walls that filter packets.The earliest and most fundamental kind of firewalls are packet filtering firewalls.Gateways at the circuit level.Firewalls with stateful inspection.Gateways at the Application-Level

To learn more about firewalls refer

https://brainly.com/question/13693641

#SPJ4

All firewalls, including those using static packet filtering, stately inspection, and application proxy, have one thing in common.

What are the 4 varieties of different firewall rules?Companies employ one of three main types of firewalls to safeguard their data and devices and keep malicious elements out of their networks, namely: Firewalls with packet filters, stately inspection, and proxy serversThrough a firewall, a network security device, incoming and outgoing network traffic is monitored and filtered based on previously established security policies for the company.At its most basic level, a firewall is essentially the barrier that sits between a private internal network and the public Internet.There are four primary forms of packet-filtering firewalls, each with a unique mode of operation. Packet filtering firewalls are the earliest and most basic type of firewalls.

To learn more about firewalls refer:

brainly.com/question/13693641

#SPJ4

the system administrator of your network wants to edit the registry, including setting security on the registry keys. what primary utilities that support the full editing of the windows 10 registry should the system administrator use?

Answers

The primary utilities that support the full editing of the Windows 10 registry are  REGEDIT and REGEDT32

What is regedit used for?Regedit is the Windows registry editor, a graphical program that enables you to browse, monitor, and, if necessary, edit, the registry of the Windows operating system. You should exercise extreme caution when using Regedit since it enables you to make root-level or administrative changes to your computer as well as the configuration options for software that connects to the registry.The registry aids Windows in controlling and managing your computer by ensuring access to essential resources and assisting crucial apps with establishing configuration. The registry is a set of keys and values organized in a hierarchical database.Registry keys are containers that function like folders and house values or subways. Similar to files, registry values (not containers). The small registry size is maintained by the relatively basic user interface and grammar.

To learn more about Window registry, refer to

https://brainly.com/question/28500965

#SPJ4

what is value engineering
Substituting low-cost components with high-quality components that still meet the product's lifetime duration and basic purpose
Substituting high-quality components with low-cost components that still meet the product's lifetime duration and basic purpose
Engineering products that are not meant to be replaced but have a high cost Engineering products that are meant to be replaced frequently but have a low cost

Answers

The term value engineering is option D: Engineering products that are meant to be replaced frequently but have a low cost.

What is meant by value engineering?

Value engineering is a methodical, planned strategy for delivering essential project functionalities for the least amount of money. Value engineering encourages the use of less expensive substitutes for materials and techniques without compromising functionality.

Instead of emphasizing the physical characteristics of different parts and materials, it only focuses on their functions. Value analysis is another name for value engineering.

Therefore, Value engineering is the process of reviewing new or current goods throughout the design phase in order to lower costs and improve functionality in order to boost the product's value. The most economical way to produce an item without detracting from its function is considered to be the worth of that thing. Hence, it is cost-cutting tactics that sacrifice quality are just that—cost-cutting tactics.

Value engineering is what it is.

Learn more about value engineering from

https://brainly.com/question/15649329

#SPJ1

the system used to issue pairs of asymmetric encryption keys and digital certificates is called a . a. vpn b. key escrow c. pki d. tokenization or data masking

Answers

The correct answer is pki (Public key infrastructure). therefore the correct option is (c).

The Public key infrastructure (PKI) is the set of hardware, software, policies, processes, and procedures required to create, manage, distribute, use, store, and revoke digital certificates and public-keys.What is public key infrastructure and how does it work.Public key infrastructure uses asymmetric encryption methods to ensure that messages remain private and also to authenticate the device or user sending the transmission. Asymmetric encryption involves the use of a public and private key. A cryptographic key is a long string of bits used to encrypt data.

To learn more about Public key infrastructure click the link below:

brainly.com/question/14456381

#SPJ4

13.which monitoring methodology will trigger the ids if any application tries to scan multiple ports?

Answers

Any program that tries to scan numerous ports will cause the IDS to go off. the place where the packet was created. A specific IP address or range of addresses, an IP mask, the MAC address, or a host name can all be used to identify an address.

The connection is attempting to connect to this address. Intrusion detection systems warn network managers of potential threats using two primary ways of threat detection: signature-based and anomaly-based. The most effective use of signature-based detection is often for locating known threats. Both signature-based intrusion detection and anomaly-based intrusion detection are widely used by intrusion detection systems. With the help of network traffic and log data, signature-based intrusion detection can identify potential threats by comparing them to known attack patterns.

Learn more about address here-

https://brainly.com/question/16011753

#SPJ4

what will happen if you install a processr on a motherboard that can fit the socket butis the wrong chipset

Answers

The motherboard's chipset and the processor can both be harmed by installing a processor that fits the motherboard's socket but is incompatible with it .

What does a motherboard's chipset do?The motherboard's integrated chipset, which supports specific CPU versions, is made of silicon. Between the CPU and the numerous linked expansion and storage devices, it relays communications.The component of the computer that handles high-level computer operations and application requests is known as the central processor unit (CPU). The CPU may communicate with software and other components of the computer through the chipset. A chipset and a CPU are necessary for a computer to run.The greatest phone CPUs for Android devices are the Qualcomm Snapdragon 888, Dimensity 1000+, and Huawei Kirin 9000.

To learn more about motherboard refer to:

https://brainly.com/question/27817482

#SPJ4

which of the following is most likely a secondary method of data collection? a. a focus group interview b. database search c. a survey d. an experiment e. observation

Answers

The correct answer is e. observation. therefore the correct option is option (e).

Primary data collection uses surveys, experiments or direct observations. Secondary data collection may be conducted by collecting information from a diverse source of documents or electronically stored information. U.S. census and market studies are examples of a common sources of secondary data.

To learn about observation click the link below:

brainly.com/question/28041973

#SPJ4

2. Electrical energy can be produced from:
a. Mechanical energy
b. Chemical energy
c. Radiant energy
d. All of the above

Answers

Answer:

The correct answer is (d) all of the above.

fox agro, a small business, faces network congestion and connection failures, which affect the network. as a result, the quality of performance of the unit gets adversely affected. you are appointed as a network administrator to determine the best solution to this problem. which type of routing path will you use to solve this problem?

Answers

Dynamic routing is a method for determining the best path between network devices by exchanging routing information across routers.

Network pathways are identified and announced using a routing mechanism. A static route is set up before any network communication. On the other hand, with dynamic routing, routers must communicate with one another in order to learn about the network's pathways. Where appropriate, both static and dynamic routing are utilized, and some networks use both. Scalability and adaptability are two significant advantages that dynamic routing has over static routing. A dynamically routed network can expand more quickly and can adjust to topology changes brought on by this expansion or by the failure of one or more network elements.

Learn more about network here-

https://brainly.com/question/14276789

#SPJ4

13) a query retrieves specific data from one or more tables to answer a question. (1 point) true false

Answers

A query retrieves specific data from one or more tables to answer a question, is the true statement.

What is query retrieves?

Query/Retrieve. DICOM Query/Retrieve enables searching for information in a database from a workstation, archive, or other device. he act of retrieving data from a Database Management System (DBMS), such as ODBMS, is known as data retrieval.

In order to store images locally, the DICOM Query/Retrieve retrieves them from distant DICOM servers. The photos can be imported and processed independently of the remote server after they have been received.

Thus, it is the true statement.

For more information about query retrieves, click here:

https://brainly.com/question/18000816

#SPJ1

when the edgemax router is accessed remotely using ssh, which command displays its routing table?

Answers

High-performance router with ten Gigabit RJ45 ports, two SFP ports, and an integrated Layer 2 switch.

Explain about the edge max router?

The Edge Router employs a state full firewall, different connection states can be considered when matching router firewall rules. The current conditions are: new The packets coming in are from a fresh connection. established The arriving packets belong to a connection that already exists.

Additionally, the EdgeRouter X can be configured as a backup or PoE switch. Log into the interface and choose the "Wizards" tab before using these devices as a switch. Use non-default VLAN for management by clicking the "Switch" option under the setup wizards side menu in the "Wizards" tab.

While the Edge Router is powered on, press and hold the Reset button.

To learn more about edge max router refer to:

https://brainly.com/question/15006683

#SPJ4

in digital forensics what is a forensic image, and why is it important to a digital forensics investigation?

Answers

The correct answer is a forensic image is a bit for bit copy of the source device and is stored in a forensic image format. A forensic image allows you to conduct your investigation on an exact copy of the source device.

A forensic image allows you to conduct your investigation on an exact copy of the source device. Now your source device may be a thumb drive, hard drive, or SSD drive. You do not want to do your exam on the original evidence due to its fragility. It is very easy to change digital evidence inadvertently.Most IR teams will create and process three primary types of forensic images: complete disk, partition, and logical. Each has its purpose, and your team should understand when to use one rather than another.

To learn more about forensic image click the link below:

brainly.com/question/23216887

#SPJ4

which type of title search method only goes back as far as when the last title search was performed and assumes the last search was done accurately, legally, and that any issues were resolved?

Answers

Torrens system is the type of title search method that only goes back as far as when the last title search was performed and assumes the last search was done accurately, legally, and that any issues were resolved.

What is Torrens system?

Torrens title is a system for land registration and transfer that involves a state creating and maintaining a register of land holdings that serves as the conclusive proof of ownership for both the proprietor listed on the register and all other recorded interests.

Therefore, The Torrens System operates under the "title by registration" principle as opposed to "registration of title." Instead of purchasing land and later registering it, a buyer can only receive a title if it has already been registered. Each piece of land is given a specific number and title in the registry to identify it.

Learn more about Torrens system from

https://brainly.com/question/29359982
#SPJ1

you have just received a new hdd so you connect it to your computer. the disk manager software recognizes the disk but when you try to format it, you see an error indicating the disk manager software cannot find location of the tracks and sectors. what is the most likely problem?

Answers

The most likely problem is the disk is not low-level formatted. Windows' Disk Management system software gives you the ability to carry out sophisticated storage functions.

Windows' Disk Management system software gives you the ability to carry out sophisticated storage functions. Hard disk software is used on hard disk drives to complete a variety of tasks, such as file system checks and error checking, backups, defragmentation, data recovery, and partitioning.

Initializing a new drive can be used to set up a new drive.

See Expand a basic volume to extend a volume into space that isn't already occupied by a volume on the same drive.

Utility software called disk management tools is used to manage data on disk by carrying out various operations on it. Additionally, they carry out tasks like managing drives, formatting disks, checking disks, and partitioning devices.

To know more about Disk Management click here:

https://brainly.com/question/2742036

#SPJ4

The disk's lack of low-level formatting is the most likely cause of the issue.

Low-Level Formatting, commonly known as LLF, is the process of formatting that entirely deletes data from your hard disk and creates new sectors and tracks . Your data are saved on the disk you are formatting according to the physical format that LLF creates.

When using Windows, its disk management software enables you to complete complex storage activities including initializing a new drive and expanding or contracting volumes.

Hard disk software is used on hard disk drives to complete a variety of tasks, such as file-system checks and error checking, backups,  

de-fragmentation, data recovery, and partitioning.

Utility software called disk management tools is used to manage data on disk by carrying out various operations on it. Additionally, they carry out tasks like managing drives, formatting discs, checking discs, and partitioning devices.

A new drive can be configured by initialising it.

To extend a volume into space that isn't already occupied by a volume on the same drive, see expand a basic volume.

To learn more about Disk Management click here:

brainly.com/question/2742036

#ADT1

1. What is a word processor program?
A software program that can be used to create, edit and print documents.
A software program that can be used to create, edit and print spreadsheets.
A software program that can be used to create, edit and view presentations.
An old machine used to type papers.

Answers

A word processor program is a software that can be used to create, edit and print documents.

you can add or remove various fields in a door or room schedule. (t/f?) question 2 options: true false

Answers

It is true you can add or remove various fields in a door or room schedule.

What is room schedule?Room schedulers give facility managers the ability to forecast future usage. They're a crucial tool for assisting staff in efficiently using spaces. The analytics offered by expert room schedulers for facility managers assist you in making growth plans.Every every view that is associated to a view that has a section tag added to it also has a section tag added. In section views, it is possible to change items (such doors, windows, and ceilings). Using the crop region does not allow you to change the "depth of view."Select Schedule/Quantities from the Schedules pull-down menu after selecting the View tab's View option. Click OK after selecting Spaces as the category for scheduling. Include these conditions in the Schedule fields. To create the Schedule view, click OK.

To learn more about room schedule refer to:

brainly.com/question/12310554

#SPJ4

Which option is an example of an entry-level job that can be achieved with a bachelor's degree in computer science?

junior systems analyst
senior systems analyst
mid-level systems analyst
chief technology officer

Answers

The junior systems analyst is an example of an entry-level job that can be achieved with a bachelor's degree in computer science. Thus, option A is correct.

What is computer science?

Application and system platform creation and assessment are the main areas of computer science research. Engaging in utilizing statistical models, information protection and monitoring, computers, and computational science are all aspects of it.

Helps with the concept, development, and deployment of electronic information processing platforms; conducts related tasks as needed.  The basic concepts that form the cornerstone of all programs are defined by software engineers.

Therefore, option A is the correct option.

Learn more about computer science, here:

https://brainly.com/question/13609051

#SPJ1

which of the following procedures will enable you to change how cells in your spreadsheet appear if they contain a value of $100 or more?

Answers

Excel IF functions are used to make decisions by making logical comparisons.

What is bazinga?

The value that will appear in cell B2 is 'bazinga'. The following procedures will enable you to change how cells in your spreadsheet appear if they contain a value of $100 or more.

The formula is given as:

=if(A1>100,'bazinga','zippo")

And the value of A1 is given as:

A1 = 425

An Excel if function is represented as:

=if(logical_comparison,value_if_true,value_if_false)

First, the formula makes comparison of cell A1 and 100 i.e. the formula checks if 425 is greater than 100, since 425 is greater than 100, then the result of cell B2 will be 'bazinga'.

Therefore, Excel IF functions are used to make decisions by making logical comparisons.

Read more about Excel formulas at:

brainly.com/question/19295387

#SPJ1

which best describes the user-centered design with usability goals for effectiveness, efficiency, and satisfaction?

Answers

The  Usability describes the user-centered design with usability goals for effectiveness, efficiency, and satisfaction.

What is meant by Usability?

In layman's terms, usability is a quality criterion for determining whether a given program is simple and provides the best possible experience for users. The applications we use every day, from clocks to social media to email, were created by hundreds of designers and programmers.

The quality of a user's experience when interacting with products or systems, such as websites, software, devices, or applications, is referred to as usability. Usability is concerned with the user's effectiveness, efficiency, and overall satisfaction.

Usability is a measure of how effectively, efficiently, and satisfactorily a specific user in a specific context can use a product/design to achieve a defined goal. To ensure maximum usability, designers typically measure a design's usability throughout the development process—from wireframes to the final deliverable.

To learn more about usability refer to:

https://brainly.com/question/24289772

#SPJ4

in the file cabinet analogy of a file system, which element of a file cabinet best represents a disk drive?

Answers

In the file cabinet analogy of a file system file drawer of a file cabinet best represents a disk drive.

Explain about the file drawer?

With Rev-A-RAS-SM Shelf's Series, you can turn any drawer into a well-organized file system. This organizer has a black, powder-coated wire construction with T-rod connectors to store both legal and letter sizes in one practical drawer. It is designed to fit easily into 18" base cabinet drawers.

Comparable to physical cabinets in significance is an electronic cabinet. A software programme for electronic filing organises the documents into several cabinets. Different folders and drawers are used to further organize these cabinets. They are an excellent method for structuring the text as a result.

The most popular styles of filing cabinets include lateral, vertical, mobile, open shelf, and flat, at least on the surface.

To learn more about file drawer refer to:

https://brainly.com/question/14450899

#SPJ4

a software engineer is building a web application about popular music and wants to display aggregated data about recent hits. in order to retrieve that data, the engineer would likely use a(n) . api traditional application markup language graphical user interface

Answers

In order to retrieve the data about popular music, the engineer would most likely use an: API.

What is an API?

API is an abbreviation for application programming interface and it can be defined as a software application intermediary or computing interface that comprises tools, set of executable codes, and protocols that is designed and developed to help software applications and computers to function properly, as well enable the exchange and retrieval of data from a database.

In Computer technology, an application programming interface (API) allows a computer network device and a cloud-based server or two cloud-based servers to share data and functionality within the cloud.

In conclusion, we can logically deduce that this software engineer would most likely use an application programming interface (API).

Read more on API here: brainly.com/question/28090326

#SPJ1

what are two software design and development factors which contribute to system errors and failures?

Answers

The two software design and development factors which contribute to system errors and failures are confusing User-Interface (UI) and Insufficient testing.

The Software development factors which causes system failures:

Inadequate attention to potential safety risksInteraction with physical devices that do not work as expectedIncompatibility of software and hardware, or of application software and the operating systemNot planning and designing for unexpected inputs or circumstancesConfusing user interfacesInsufficient testingReuse of software from another system without adequate checkingOverconfidence in softwareCarelessness

The actual development of the system starts, where the programming takes place in order to execute the previously defined design as a set of programs or program units.

This phase incorporates two main activities; coding and units testing in an iterative manner

Failures And Errors :

Non-readable Design Document If the design document was large, unclear then it might be non-readable nor understandable by programmers, and thus they will be unable to decide what to codePL does not support architectural design If the programming language was not selected early in the design phase with respect to the architectural design method in use, then the programmer will fall into the trap where he cannot implement the architectural design using the previously selected programming language.

To learn more about Software Development, visit: https://brainly.com/question/26135704

#SPJ4

write a c program that allows the user to encode a text file using the huffman code tree created. your program must be able to encode a file and decode it

Answers

If the bit stream being compressed is 0001, the decompressed output could be "cccd," "ccb," "acd," or "ab."

A lossless data compression algorithm is Huffman coding. Input characters are given variable-length codes, the lengths of which are determined by the frequency of the matching characters. The character used the most often is given the smallest code, and the character used the least often is given the largest code.

The variable-length codes (bit sequences) assigned to input characters are Prefix Codes, which means that no other character will have a code that is the prefix of the code assigned to that character. This is how Huffman Coding ensures that the generated bitstream cannot contain any ambiguities during decoding.

To know more about Huffman click here:

https://brainly.com/question/18994486

#SPJ4

describe two benefits of using a formal specification to help with the implementation of a software system.

Answers

They typically contain more information than more casual specifications since formality tends to draw attention to any shortcomings that could otherwise go unnoticed.

What are the benefits of formal specification?Compared to informal specifications, formal specifications have a number of benefits.They are capable of mathematical accuracy.They typically contain more information than more casual specifications since formality tends to draw attention to any shortcomings that could otherwise go unnoticed. The goal of formal techniques is to organize and bring rigor to all stages of software development.This prevents us from forgetting important concerns, offers a uniform way to record different assumptions and conclusions, and establishes a foundation for consistency throughout numerous connected operations. Formal methods are system design techniques that create hardware and software systems using mathematical models with exacting specifications.Unlike other design systems, formal approaches use mathematical proof to assure accurate behavior in addition to system testing. On project intent, performance, and construction, the specification offers precise directions.It might serve as a reminder of the standards and quality that need to be followed.It is possible to define materials and make items with clarity.The requirements for installation, testing, and handover can be determined.

To learn more about implementation of software system refer

https://brainly.com/question/13738259

#SPJ4

preinstalled software typically includes . select all that apply. a. system software b. games c. advanced video editing programs d. trial versions of apps

Answers

Preinstalled software typically includes system software. Thus,  option A i.e. 'system software' is the correct answer.

Preinstalled software refers to software that is already installed and licensed on computers from the manufacturer. Usually, it is the system software that comes preinstalled with the computers. System software is an operating system that enables the proper and efficient functioning of computer systems. Without a system software, it is not possible to use computer systems. Every computer device comes with at least one preinstalled system software.

However, games, advanced video editing software, and trial versions of applications are not preinstalled software. These are the software that a user installs as per their requirements.

You can learn more about system software at

https://brainly.com/question/24321656

#SPJ4

Answer

Explanation:preinstalled software typically

List three areas in a downtown area where you may have to make a sudden stop in a car

Answers

Answer:

1. If some car rushes out of nowhere and is about to hit you.

2. If a car crashes and you are suddenly about to ram into it and have nowhere else to go.

3. If somebody runs out onto the street and you are driving toward the person.

Explanation:

These are just my ideas, hope this helps!

which it staff member works with programmers and vendor staff members to test new systems and system upgrades, recommend solutions, and determine whether program requirements have been met?

Answers

The IT staff member that works with programmers and vendor staff members to test new systems and system upgrades, recommend solutions is system analyst.

An information technology (IT) practitioner with a focus on the analysis, design, and implementation of information systems is known as a systems analyst, sometimes known as a business technology analyst. Systems analysts coordinate with end users, software providers, and programmers to achieve these results by evaluating the suitability of information systems in terms of their intended outcomes.

A systems analyst is a person who uses design and analysis methods to use information technology to solve business problems. Systems analysts can act as change agents by identifying the organizational adjustments that are required, designing the systems to carry out those adjustments, and motivating others to use the systems.

To know more about systems analyst click here:

https://brainly.com/question/29331333

#SPJ4

is a security professional. a user reports that, after opening an email attachment, every document he saves is in a template format and other microsoft word documents will not open. after investigating the issue, alison determines that the user's microsoft office normal.dot template has been damaged, as well as many word files. what type of virus is the most likely cause?

Answers

Since Allison determined that the user's Microsoft Office normal.dot template has been damaged, as well as many Word files, the type of virus which is most likely the cause is a macro virus.

What is a virus?

In Computer technology, a virus can be defined as a type of malicious software program that is designed and developed to move through computer networks and the operating systems (OS) installed on a computer (host), specifically by attaching themselves to different software programs, links and databases.

What are macros?

In Computer technology, macros are composed of commands and instructions which may be grouped together as a single command to automatically execute a task in Microsoft  Word.

Read more on a virus here: brainly.com/question/26128220

#SPJ1

Complete Question:

Allison is a security professional. A user reports that, after opening an email attachment, every document he saves is in a template format and other Microsoft Word documents will not open. After investigating the issue, Allison determines that the user's Microsoft Office normal.dot template has been damaged, as well as many Word files. What type of virus is most likely the cause?

sql supports the modifier on update and on delete for foreign key definitions. the database engines do not support on insert. why would implementing on insert be impossible in most scenarios?

Answers

The correct answer is SQL supports the modifier ON UPDATE and ON DELETE for foreign key definitions.

Foreign keys cannot handle deletes and updates. Explanation: A foreign key is the one which declares that an index in one table is related to that in another and place constraints. ON DELETE CASCADE means if the parent record is deleted, then any referencing child records are also deleted. ON UPDATE defaults to RESTRICT, which means the UPDATE on the parent record will fail. ON DELETE action defaults to RESTRICT, which means the DELETE on the parent record will fail.

To learn more about ON UPDATE and ON DELETE click the link below:

brainly.com/question/15514353

#SPJ4

Other Questions
Which animal was hunted to make such products as oil and corsets?dolphinotterpelicanwhale joules to warm 59.5 mL of water ( density=1.00g/mL ) from 26.5 C to 100 C and vaporize it at 100 C Find point C on the x-axis so that AC + BC is a minimum.A(-8,4), B(-1,3) 15:45 in its simplest form Anna received a gift of $5,000 from her grandmother and decided to invest it. The expression 5000(1.0005)^12t represents the amount of money Anna is earning on her investment. Select all of the following that are equivalent expressions so that Anna can better understand how her money is invested.a) 5000(1.0005^12)^tb) 5025^12tc) 5000(1+0.0005)^12td) 5000(1.0005^t)^12e) (5000+2.5)^12tf) 5000(1+0.06/12)^12t After studying both prehistoric and ancient art, your classmate Nathaniel is determined that these two types of art are almost exactly the same. You tell him that you have noticed many differences. What could you tell him to support your argument that prehistoric and ancient art have differences?A. Prehistoric art features red figure style; ancient art features black figure styleB. In prehistoric, art artists occupied roles as laborers producing a product; artists in ancient times were celebrated for their roles as creators of beautiful objectsC. Animals were present in ancient art; in prehistoric art, animals were absentD. Ancient architectural structures were built on a much grander scale than the structures of prehistoric societies There are approximately 420 national parks in the United States. A surveyshowed that 85% of the national parks allow overnight camping. Based onthis information, how many national parks allow overnight camping? algebra 2 help needed! Step 2The risk assessment has been carried out and fortunately has not uncovered any majorproblems. Now the owner wants your help in choosing the right kind of insurance for hisbusiness. Help him by writing a guide on what to consider when making this decision so thathe chooses the right kind of insurance. Be sure to mention important factors such as theinfluence of the business's location, the number of employees, and the industry they are in. what role did the religious views of prominent leaders such as thomas jefferson and benjamin franklin come to play in the new nation? group of answer choices jefferson and franklin argued for the literal truth of the bible, which inspired future politicians in the new nation to adopt a literal view of the constitution in all instances. jefferson and franklin were basically atheists, which guaranteed that religion would play little role in the day-to-day politics of the new nation and that fewer people would become activists. jefferson and franklin were influenced by deism, which viewed all people as created equal in the eyes of god and promoted ideas of rationalism in the new nation. jefferson and franklin felt the united states should have an official religion, which, although it never came to pass, had lasting effects on the limited free speech americans had. jefferson and franklin believed in an all-powerful god, which impacted the authority people came to ascribe the government, especially the presidency and legislature. How did decreasing oil prices in the early 1980s impact the Soviet economy? Fewer profits meant that the economy further declined. The Soviet Union began importing other products. It increased the Soviet Unions economic growth. It caused mass unemployment. A child whose weight is 350 N swings outover a pool of water using a rope attachedto the branch of a tree at the edge of thepool. The branch is 10.2 m above groundlevel and the surface of the water is 1.79 mbelow ground level. The child holds on to arope of length 7.2 m attached to the branchand moves back until the angle between therope and the vertical is 12. When the rope isin the vertical position, the child lets go anddrops into the pool. The acceleration due to gravity is 9.81 m/s^2Find the speed of the child at the surface ofthe water.Answer in units of m/s. What must an employee do to perform their role in a safe and healthy work environment?. In this assignment, you will conduct research to find the best loan for your first car. Using referencematerials and Internet sites, you will collect information for a used car and loan options to buy the car.You will use an online loan calculator to find the best option for a used car loan. You will do a multimediapresentation on the best loan option for a used car and the resources you used, along with the optionsyou explored to decide on the best loan option. A list of search term suggestions for finding resources isprovided at the end of this guide.Your presentation should include the following slides. The slides should be a title slide, a slide containingyour used car information, a slide containing information on loan options with a bank and with a creditunion, a slide including calculations, a slide comparing the loan options, a slide with the best choice for acar loan, and a works-cited slide. a system of community self-responsibility that existed in britain during the middle ages, in which residents were held responsible for the conduct of their neighbors was called a . a sales invoice included the following information: merchandise price, $9,400; terms 1/10, n/eom; fob shipping point with prepaid freight of $405 added to the invoice. assuming that a credit for merchandise returned of $1,900 is granted prior to payment and that the invoice is paid within the discount period, what is the amount of cash that should be received by the seller? GAME DESIGN If you are designing a video game that will primarily be played on a smartphone or tablet, what considerations about the operation or control methods should you keep in mind? Expand using Pascal's triangle: (x + 1)4. given the context of the time , why might washington have chosen to look the other way on segregation and to appease white southerners? Help please!!!!!!!!!!!!!!