1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
2 years ago
15

___________ is some danger that can exploit a vulnerability.

Computers and Technology
1 answer:
andreyandreev [35.5K]2 years ago
8 0

<u>Threat </u>is some danger that can exploit a vulnerability.

<h3>What is Threat?</h3>

Threat  is seen as Anything that can be able to take advantage of a vulnerability, intentionally as well as  accidentally, and take or damage, the  asset of a person.

Note that a threat is that which a person or firm is protect against and Vulnerability is seen as Weaknesses.

Therefore, <u>Threat </u>is some danger that can exploit a vulnerability.

Learn more about vulnerability from

brainly.com/question/25633298

#SPJ1

You might be interested in
_____ allows information to be viewed at a glance without needing to address the individual elements of the information separate
blagie [28]

Spatial representation allows information to be viewed at a glance without needing to address the individual elements of the information separately or analytically.

<h3>What do you mean information?</h3>
  • Information is a stimulus with meaning for the receiver in a specific situation.
  • Data is a broad term that refers to information that is entered into and stored in a computer.
  • Data that has been processed, such as formatting and printing, can be interpreted as information again.
  • When you communicate verbally, nonverbally, graphically, or in writing, you are passing on knowledge gained through research, instruction, investigation, or reading the news.
  • Information is known by many different names, including intelligence, message, data, signal, and fact.
  • Information helps to avoid study duplication. Information stimulates the cognitive processes of users, particularly scholars.
  • Scientists, engineers, academics, and others benefit from the use of information.

To learn more about Information, refer to:

brainly.com/question/4231278

#SPJ4

5 0
1 year ago
You have just performed a cpm analysis and have found that more than one path through the project network has zero slack values.
Alex787 [66]

Answer:

There are multiple critical paths

Explanation:

The critical path method (CPM), or critical path analysis (CPA), is an algorithm for scheduling a set of project activities. It is commonly used in conjunction with the program evaluation and review technique (PERT). A critical path is determined by identifying the longest stretch of dependent activities and measuring the time required to complete them from start to finish.

The essential technique for using CPM is to construct a model of the project that includes the following:

  •    A list of all activities required to complete the project (typically categorized within a work breakdown structure),
  •    The time (duration) that each activity will take to complete,
  •    The dependencies between the activities and,
  •    Logical end points such as milestones or deliverable items.      

Using these values, CPM calculates the longest path of planned activities to logical end points or to the end of the project, and the earliest and latest that each activity can start and finish without making the project longer. This process determines which activities are "critical" (i.e., on the longest path) and which have "total float" (i.e., can be delayed without making the project longer).

considering the above function of the cpm analysis because you have multiple path, there is tendency that more than path through the project network will have zero slack values.

5 0
3 years ago
To solve the difficulty of scaling memory organization, memories are physically organized into a ____-dimensional organization.
Brums [2.3K]

Answer: two

Explanation:

Organizational memory is simply referred to as the accumulation of data or information that have been created for a particular organization.

To solve the difficulty of scaling memory organization, memories are physically organized into a two dimensional organization.

3 0
3 years ago
What do you observe on the filter paper strip after 2 to 3 hours?
just olya [345]
Is there pictures or anything esle to read in order to figure out the answer

5 0
3 years ago
Read 2 more answers
Which document lists the planned dates for performing tasks and meeting goals identified in the project plan?
Mnenie [13.5K]
<span>The document is called as Project schedule. this document contains the tasks that needs to be performed, the time that is given to the perform the task, the target dates. It also contains the budget of the project and the budget can be represented task wise. This helps in performing the project in a more organized way.</span>
5 0
3 years ago
Other questions:
  • You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the ind
    6·1 answer
  • A power supply unit for a computer converts:
    7·1 answer
  • How should you handle possible suicides:
    10·1 answer
  • Why are application programs stored in main memory​
    11·1 answer
  • Plzz help.... <br><br>i will mark u as brainliest if u answer correct
    10·1 answer
  • design a relational database in EER for bike helmets and their reviews. a bike helmet has a name and color attributes. a bike co
    12·1 answer
  • Write a program that asks the user for a word. Next, open up the movie reviews.txt file and examine every review one at a time.
    15·1 answer
  • Imagine you were going to use a dedicated workstation for an animation job rather than a personal PC or the all-purpose PCs you
    5·1 answer
  • Josh needs to write a research report for his Civics class. Which file type will allow him to save his file? (5 points)
    12·1 answer
  • Use the drop-down menus to explain what happens when a manager assigns a task in Outlook.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!