1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lozanna [386]
3 years ago
7

Inherent flaws in system software code are called:

Computers and Technology
1 answer:
swat323 years ago
7 0
The answer is option (b.) Vulnerability

In a system software, the flaws in the code are called vulnerabilities. They are the weakness in the system and a risk. Attackers take the opportunity on this flaw to infiltrate the system's security.
You might be interested in
Which is the least technically experienced technical support group?
Nezavi [6.7K]

Answer:

Tier 1 support

Explanation:

Of the given options, tier 1 support technical group is the least experienced group. This group of technicians is also referred to as level 1 technical group.

The tier 1 or level support are made up of junior technician, and they have few technical understandings.

Their roles include email response and basic troubleshooting, attending to phone calls, among others.

When a problem cannot be solved by tier 1 support  technicians, they pass the problem to tier 2 support technicians,  

5 0
3 years ago
What does the following code do? Assume "list" is an array of int values, "temp" is some previously initialized int value, and "
____ [38]

Answer:

Counting the number of elements in the array list smaller than temp.

Explanation:

We have an array list,a previously initialized integer temp and a an integer c initialized with 0.

In the code a for loop is used to iterate over the array and it is checking if the element at jth index is less than temp if it is then increasing the variable c by 1.

Hence when the loop ends the c will be having the count of the integers in array list that are smaller than temp.

6 0
4 years ago
Write a program which asks the user to enter N numbers. The program will print out their average. Try your program with the foll
Likurg_2 [28]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

int n;

double average,sum=0,x;

cout<<"enter the Value of N:";

// read the value of N

cin>>n;

cout<<"enter "<<n<<" Numbers:";

// read n Numbers

for(int a=0;a<n;a++)

{

   cin>>x;

   // calculate total sum of all numbers

   sum=sum+x;

}

// calculate average

average=sum/n;

// print average

cout<<"average of "<<n<<" Numbers is: "<<average<<endl;

return 0;

}

Explanation:

Read the total number from user i.e "n".Then read "n" numbers from user with for loop and sum them all.Find there average by dividing the sum with n.And print the average.

Output:

enter the Value of N:5

enter 5 Numbers:20.5 19.7 21.3 18.6 22.1

average of 5 Numbers is: 20.44

7 0
4 years ago
What is a feature of Print Preview?
Snezhnost [94]
Fit to page i believe
6 0
3 years ago
The points where budget lines are tangent to indifference curves are used to derive the demand curve. A. False B. True
galben [10]

Answer:

B - TRUE

Explanation:

The points where budget lines are tangent to indifference curves are used to derive the demand curve, which helps to identifies the combination of goods yielding the highest total utility.

7 0
4 years ago
Other questions:
  • When a vehicle strikes a pedestrian, it's most often during A. a period of darkness or low visibility B. the day when pedestrian
    10·2 answers
  • Objects of the calculator class require no additional information when created. define an object named calc, of type calculator.
    14·2 answers
  • Which remote access configuration option should you choose if you want mobile users to be able to make a secure connection to th
    9·2 answers
  • In a case where electrical current leakage from the circuit occurs, the GFCI would do the following:
    10·1 answer
  • Which of these statements most accurately describes cookies?They have the capability to execute malicious software.Each cookie f
    12·1 answer
  • True or False: <br> The object reference can be used to polymorphically store any class in Java.
    13·1 answer
  • List the five body functions that monitor homeostasis.
    7·1 answer
  • Write a Java program that prompts the user for an int n. You can assume that 1 ≤ n ≤ 9. Your program should use embedded for loo
    5·1 answer
  • A company has a number of employees. The attributes of EMPLOYEE include Employee ID (identifier), Name, Address, and Birthdate.
    11·1 answer
  • In a well-developed paragraph - using domain-specific vocabulary and academic writing - address the following writing prompt:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!