1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
2 years ago
15

___________ is some danger that can exploit a vulnerability.

Computers and Technology
1 answer:
andreyandreev [35.5K]2 years ago
8 0

<u>Threat </u>is some danger that can exploit a vulnerability.

<h3>What is Threat?</h3>

Threat  is seen as Anything that can be able to take advantage of a vulnerability, intentionally as well as  accidentally, and take or damage, the  asset of a person.

Note that a threat is that which a person or firm is protect against and Vulnerability is seen as Weaknesses.

Therefore, <u>Threat </u>is some danger that can exploit a vulnerability.

Learn more about vulnerability from

brainly.com/question/25633298

#SPJ1

You might be interested in
What keyword must be used on any method (function) on your class that is called from your main() method?
Y_Kistochka [10]

Answer:

Idrk nglll

Explanation:

Sorry

8 0
2 years ago
Before you give your presentation to an audience, you should make sure that your ideas are organized in a clear and meaningful w
avanturin [10]

The answer is the second choice, "Re-order."


If your slides are in the wrong order, you can re-order them by dragging them into the correct place on the side toolbar.

8 0
3 years ago
Read 2 more answers
which of the following can be represented by a sequence of bits. 1. An integer 2. An alphanumeric character 3. A machine languag
goblinko [34]

Answer:

all of them

Explanation:

In a computer program, this is how numbers, text and program instructions are stored.

3 0
3 years ago
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
1 year ago
_____ provide the standards, syntax, statements, and instructions for writing computer software
miv72 [106K]
<span>Programming languages provide the standards, syntax, statements, and instructions for writing computer software.
</span>It is a vocabulary and set of grammatical rules. These rules are used for instructing a computer<span> or computing device to perform specific tasks and produce a certain output.</span>
4 0
3 years ago
Other questions:
  • In 2–3 sentences, describe how you would insert a table into a word-processing document.
    9·2 answers
  • Derek has an interest in designing video games. What requirements should he fulfill to be a game designer?
    13·1 answer
  • What is process equipment?
    12·1 answer
  • Fix the 2 error codes.
    14·1 answer
  • What are the advantages of repeating a header row? check all that apply
    14·1 answer
  • A typeface in which each character has the same width and is often used to display programming code is _
    8·1 answer
  • What could be one rule to help your friend to blog safely
    6·2 answers
  • A system administrator is selecting an operating system for use by the company’s research and development team. The team require
    15·1 answer
  • What is the result of executing the following code? You can assume the code compiles and runs. #include using namespace std; voi
    6·1 answer
  • Explain why regular system cleanup is vital to ensuring the operating system runs efficiently. ?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!