1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
2 years ago
15

___________ is some danger that can exploit a vulnerability.

Computers and Technology
1 answer:
andreyandreev [35.5K]2 years ago
8 0

<u>Threat </u>is some danger that can exploit a vulnerability.

<h3>What is Threat?</h3>

Threat  is seen as Anything that can be able to take advantage of a vulnerability, intentionally as well as  accidentally, and take or damage, the  asset of a person.

Note that a threat is that which a person or firm is protect against and Vulnerability is seen as Weaknesses.

Therefore, <u>Threat </u>is some danger that can exploit a vulnerability.

Learn more about vulnerability from

brainly.com/question/25633298

#SPJ1

You might be interested in
Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?
rosijanka [135]

Answer:

subroutines

Explanation:

subroutines is used in access to locate and retrieve data

5 0
3 years ago
Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the ap
Nutka1998 [239]

Answer:Presentation layer

Explanation: Presentation layer is the sixth layer belonging to the OSI model . It has the functionality of presenting the data or information in a standard and formatted way.The syntax is usually error free , well defined and adequate and thus also called as syntax layer. Presentation layer works between the application layer and the network layer.

It also performs the services of compression, encryption, decryption etc.

4 0
3 years ago
Consider the following code: String word [] = {"algorithm", "boolean", "char", "double"}; for ( int i =0; i &lt; word.length/2;
KiRa [710]

Answer:

{"double", "char", "char", "double"} will be stored in word.

Explanation:

Given the word is an array of four strings,  {"algorithm", "boolean", "char", "double"}. Hence, the length of the word array is 4.

The for-loop will only run for two iterations due to i < word.length/2, with i = 0 (first loop) and i = 1 (second loop).

In the first loop,  

  • word[word.length - 1 - i]  =  word[4 - 1 - 0]  = word[3]  = "double"
  • Hence, the string "double" will be assigned to word[0] and overwrite "algorithm"

In the second loop,

  • word[word.length - 1 - i]  =  word[4 - 1 - 1]  = word[2]  = "char"
  • Hence, the string "char" will be assigned to word[1] and overwrite "boolean"

At last, the word array will hold {"double", "char", "char", "double"}

8 0
4 years ago
Read 2 more answers
In portrait mode, your camera will use what?
vesna_86 [32]

Answer:

A. A Smaller Aperture

Have A Good Day

3 0
3 years ago
What considerations have to be kept in mind with JPEG
topjm [15]
JPEG is a file format for an image that will be compressed. Since it compressed the file size will be much smaller. That makes JPEG is one of the most used file types for images and was a default format for many application. But the drawback of compressing an image is that a portion of the data will lose and will cause the image quality dropped or produce a noise.
8 0
4 years ago
Other questions:
  • ( answer goes here) are pictures that you can click on to tell your computer what to do.
    10·2 answers
  • A technician is troubleshooting a Windows system in which an application works properly when the computer is booted in Safe Mode
    14·1 answer
  • What is the lowest layer of the osi model at which wired and wireless transmissions share the same protocols?
    11·1 answer
  • Extending the web server functionality implies that the web server and the web-to-database middleware will properly communicate
    10·1 answer
  • What is your favourite video game??​
    5·2 answers
  • In a digit 13 ISBN number, can you think of errors that the check digit system cannot identify and give an example to explain wh
    5·1 answer
  • A vital step in maintaining an operating system is to regularly do what? Replace the hard drive. Organize the computer’s data. R
    11·2 answers
  • Consider a system consisting of m resources of the same type, being shared by n processes. Resources can be requested and releas
    9·1 answer
  • If a fuse block or holder has tree fuses, it may be termed a...
    7·1 answer
  • Danny wants to create a web page for her friends dog walking service. Which coding language should she use
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!