1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skelet666 [1.2K]
2 years ago
7

A ____ risk assessment evaluates threats to and vulnerabilities of the network.

Computers and Technology
1 answer:
VashaNatasha [74]2 years ago
3 0

Answer:

Vulnerability

Explanation:

Vulnerability refers to a weakness in your hardware, software, or procedures

You might be interested in
Que funcion tiene la sombrilla forrada de aluminio​
shusha [124]

Answer:

La sombrilla forrada en aluminio, funciona como antitérmico, impidiendo la transmisión del calor a través de la estructura. La misma función cumple en los "colchones" o mantas para tomar sol.

Explanation:

4 0
3 years ago
List the different generation of computers with its main component​
Dennis_Churaev [7]

Answer:

1940 – 1956:  First Generation

1956 – 1963: Second Generation

1964 – 1971: Third Generation

1972 – 2010: Fourth Generation

2010-  : (Present )Fifth Generation

Explanation:

  1. First Generation Computers (1940-1956):In this Generation the main component of computers were Vacuum Tubes.
  2. Second Generation Computers (1956-1963):In this generation the main component of computers were Transistors.
  3. Third Generation Computers (1964-1971):In this generation the main component of computers were Integrated Circuits.
  4. Fourth Generation Computers (1972-2010):In this generation the main component of computers were Microprocessor
  5. Fifth Generation (2010-Present):In this generation the main component of computers is Artificial Intelligence
4 0
3 years ago
Solving a current problem with existing information gathered for another purpose is ____research
Vesnalui [34]
Primary research for your question
7 0
3 years ago
Read 2 more answers
What name is given to the assurance that requested information is available to authorized users upon request
mrs_skeptik [129]

Answer:

Availability

Explanation:

With Data availability, it means that we are saying that information is accessible to users. This gives the assurance of the system and also the data being accessible to authenticated users anytime they have the need for it.

It is simply saying that information would be operable by users with authorization whenever they request to.

5 0
3 years ago
Terry came into work and turned on his computer. During the boot process, the computer shut down. When he tried again, the compu
krok68 [10]

el cable SATA porque sirve para la transferencia de datos entre la placa base y algunos dispositivos de almacenamiento como la unidad de disco duro (donde generalmente se instala el sistema operativo)

3 0
3 years ago
Other questions:
  • What type of computer processing system is characterized by data that are assembled from more than one location and records that
    11·1 answer
  • Describe the difference between public and private IPv4 addresses. If a network is using private IP addresses, how can the compu
    13·1 answer
  • Which of the following is not a metamorphic agent?
    8·2 answers
  • Which of the following SNSs has been associated with art work display?
    14·2 answers
  • A manager keeps a record of daily each transaction in input.txt. Each line contains three items: The invoice number, the cash am
    5·1 answer
  • Is this website real? Or is it a scam?
    11·1 answer
  • Just took a test and I got 5 wrong and I wanted to know the correct answers
    10·1 answer
  • How can you apply multimedia for study explain​
    11·1 answer
  • Sftp uses which mechanism to provide security for authentication and data transfer?
    7·1 answer
  • Help debugging line 7 type error more arguments (5) than expected (1)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!