1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatuchka [14]
3 years ago
13

Your network administrator finds a virus in the network software. Fortunately,

Computers and Technology
1 answer:
Over [174]3 years ago
8 0
B. vulnerability

It’s considered a vulnerability because the administration should have had security protections on the network.
You might be interested in
What is an example of new technology having a negative impact on sustainability?.
Sedbober [7]

An example of new technology that is having a negative impact on sustainability is using multiple servers to maintain a cryptocurrency operation.

<h3>How does technology influence sustainability?</h3>

The use of technology is one that have a lot of power to increase productivity, efficiency and cost savings, and others  but it is also known to have a negative effect on the environment.

Sustainability implies that one meets the needs of people without having to compromise the power of future posterity to meet their own needs.

Learn more about sustainability from

brainly.com/question/25350238

3 0
3 years ago
The function below tries to create a list of integers by reading them from a file. The file is expected to have a single integer
Setler [38]

Answer:

Check the explanation

Explanation:

def get_list_of_integers_from_file(filename):

int_list=[]

for line in open(filename).readlines():

try:

int_list.append(int(line))

except:

continue

return int_list

print(get_list_of_integers_from_file('file.txt'))

 

File.txt:

Kindly check the output below.

4 0
3 years ago
) A stub network has ______. (Points : 2) one backup route
jeyben [28]

Answer: One backup router

Explanation:

 A stub network is the type of the packet network that basically describe the computer notwork. It typically capable for sending the complex data in the single network path when the network aware about its destination.

A stub network contain the one backup router as the stub routing is the typically designed for conserve the resources of the local router like the central processing unit (CPU) and the memory. It basically improve the stability of the network in the system.

6 0
3 years ago
A short
alexandr402 [8]

Explanation:

Java Bitwise Operators

Operator Description Example

>> (right shift) Binary Right Shift Operator. The left operands value is moved right by the number of bits specified by the right operand. A >> 2 will give 15 which is

8 0
3 years ago
a particular variety of database that works by connecting tables to each other. It is the most popular form of database and the
NeTakaya

Answer:

Relational Database      

Explanation:

  • Relational Database is the type of database in which data is stored and presented in the form of tables and it is used to access, manipulate and manage data.
  • Table is also called a relation. It consists of rows and columns where rows represent a record of data and columns represent the attributes of the data.
  • Every table has a primary key which uniquely identifies a row in a table and a foreign key is used to establish relationships among tables.
  • In relational database domain is used to define specify the possible values that an attribute can have.
  • Constraints can also be applied to the values of the attributes in the table.
  • There are many advantages of a relational database.
  • It can organize and manage bulk of information.
  • It is easy to add or delete data in the relational database according to the change in requirements.
  • Relational database ensures the consistency and integrity of data when many users obtain the same database at same time by using concurrency control methods.
  • It ensures security by limiting access rights to the data.
  • It also eliminates data redundancy and dependency using normalization technique which ensures data integrity and accuracy.
3 0
3 years ago
Other questions:
  • Is frequency measured in henry.
    14·1 answer
  • In your opinion, is it more beneficial to have many folders or is it better to “nest” subfolders? Explain your response.
    10·2 answers
  • Many programmers today use a(n) _________, which is software that helps them build their computer programs. eula cad sdlc ide
    15·1 answer
  • Which of the following statements are true of software engineers? Check all of the boxes that apply. They are responsible for wr
    11·2 answers
  • Defensive programming is sometimes referred to as _________.
    5·1 answer
  • What animal is perry the platypus ​
    6·2 answers
  • Viktor has climbed a tall tree to get a good view of the giraffes on the savannah. He is snapping lots of photographs of the gir
    8·1 answer
  • . Which of the following refers to the informal rules for how to behave online? A.
    9·1 answer
  • Please help This is a homework in ICT class
    11·1 answer
  • What is meant by editing a document​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!