1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ycow [4]
3 years ago
6

Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.

Computers and Technology
1 answer:
grandymaker [24]3 years ago
6 0
False because it might damage it more but if it was recommended by lots of people i mean the software then its true
You might be interested in
Compare and contrast between Client/Server and Peer-to-Peer networks. What are some of the business benefits of using such netwo
fgiga [73]
Client/Server and Peer-to-Peer networks are the two major network architecture models in use today. They each have advantages and disadvantages that can be used to benefit a particular outcome.

Briefly, the client/server model relates to one or many client performing relatively simple requests, which are then executed by a server. The server is performing more complex tasks, and often interacting with many clients simultaneously. Examples of client/server models include most websites, including the Brainly page you are running right this instant. Your web browser is acting as a client, and the Brainly.com website is running as a web server. It receives simple requests or information from your browser, such as clicking on a question or text typed by your keyboard, and then acts on this information by consulting a database, returning values, or returning a whole new web page to your browser. The client/server model is very powerful in business as it allows powerful and secure server-side processing and relatively simple clients. Office 365 that runs all microsoft office suites such as word and excel in a web browser on 'the cloud' is an example of a highly sophisticated client/server architecture.

By contrast, peer-to-peer networks are a distributed architecture of equals. Instead of a simple client and complex server, all clients are equals and link together to form nodes on a distributed network. There is no central control (server) and each node acts as a client and server to other nodes. This is also an extremely powerful network; as there is no central control it is difficult to shut down a peer-to-peer network. Taking out one node will not break the network in comparison to the client/server architecture where if the server goes down, services halt. Prime examples of famous peer-to-peer networks are the Bitcoin network and similar cryptographic currency networks, and music and file sharing networks such as Torrents. The torrent tracker websites are client/server however once a torrent is loaded into a torrent downloading application, the file is collectively downloaded from hundreds of 'peers' across the world as part of the torrent peer-to-peer network.


3 0
3 years ago
You can separate words in a macro name by using the ____ character
Maru [420]
You can separate words in a macro name by using the underscore character.

A macro is considered as a small reusable computer program. It is efficient as it helps you save time by automating any repeated task.
In order to create a macro, you do not need to be an expert in programming, however, a little knowledge about it will help.

8 0
3 years ago
Read 2 more answers
A specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network____
gogolik [260]

Answer: NAS(Network-attached storage)

Explanation:

NAS(Network-attached storage) is the file storage in computer server which links to computer network. It is used by heterogeneous client or group of other various users to access files data.

  • It can retrieve data from shared folder storage in network.It can provide serving file feature through standard, hardware,configuration or  software.
  • It provides high speed service of sharing and serving files, continuous work in faulty situation, easy configuration, simple accessing of data etc.

5 0
3 years ago
What formula would you enter to find the difference between the
nydimaria [60]

Answer:

=B2-C4                        

.

.

.

.

.

.

.

.

.

7 0
3 years ago
PLEASE HELP WILL MARK AS BRAINLIEST
Katena32 [7]

Answer:

Manufacturing

Explanation:

Planning. Data plots on all things and future plans as in if how much is bought what prices of stock you will have. Person could improve by taking courses in business planning.

3 0
2 years ago
Other questions:
  • PLS HURRY!! This OS introduced a very cool GUI that had animations and transparencies.
    5·1 answer
  • A(n) ___ operating system is a very fast, relatively small os. it is designed to respond to hardware and program requests almost
    6·1 answer
  • Please someone help me I hate python
    11·1 answer
  • Charles would like to visit a specific page on the World Wide Web. How should he do it? Enter the address in a search engine cli
    15·2 answers
  • A computer has 9850 processes and 172 of them where suspended while 276 were terminated.,explain why some of the processes where
    15·1 answer
  • Write any four common hardware devices​
    6·1 answer
  • Complete the sentence.<br><br> A ___________search can be done on a list that is not ordered.
    11·2 answers
  • Why should we not underestimate the widespread of mass media?
    13·1 answer
  • In numpy to append two arreys vertically the function __ is used
    12·2 answers
  • a) pencil b) ink bottle c) polygon d) eye 3. Under which of the following can an operating system be classified? b) software c)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!