Answer:
A (information technology)
Explanation:
Answer:
C. an example of open-source software.
Explanation:
open-source software is the type of software in which anyone can access, it can also be shared And modified by anyone simply because ita accessible to the public.
Hence and open source software's source code can be
inspected, enhanced and modified by anyone. A typical example is Linux.
Answer: Emergency Operation Center (EOC)
Explanation:
An Emergency Operation Center is the coordination base for emergency service in case there is any within a state or a state Connecticut. The major purpose of the emergency center is to be in charge of controlling deploying and utilizing facilities needed to prepare for any form of emergency, disaster management, etc.
To run an effective Emergency Operation Center, focus must be on the facilities, equipments and personnel involved.
Answer:
(a) Weak passwords
Explanation:
Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.
Examples of weak passwords are;
i. those generated from the name of a user.
ii. those generated for a user by default.
iii. those generated from words from dictionary or other similar materials.
iv. those that don't include a combination of letters and numbers and even symbols.
v. those that are short in length e.g less than 8 characters.