1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alinara [238K]
3 years ago
7

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All

of the above e. None of the above
Computers and Technology
1 answer:
ELEN [110]3 years ago
7 0

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

You might be interested in
Why did hockey champion Haley wickenheiser feel angry after the Bach said the IOC would make a decision in the next month?
aliina [53]

Haley wickenheiser felt angry after the Bach said the IOC would make a decision in the next month as the IOC says the games will be held no later than summer 2021 but they will still be called the 2020 Tokyo Olympics.

Explanation:

  • The Tokyo Olympics were postponed until 2021 on Tuesday, ending weeks of speculation that the games could not go ahead as scheduled because of the coronavirus pandemic.
  • The International Olympic Committee made the decision after speaking with Japanese Prime Minister Shinzo Abe and local organizers.
  • The IOC said the games will be held not later than summer 2021 but they will still be called the 2020 Tokyo Olympics.
  • “President Bach said he will agree ‘100%,’ and we agreed to hold the Tokyo Olympics and Paralympics in the summer of 2021 at the latest,” Abe said, saying holding the games next year would be “proof of a victory by human beings against the coronavirus infections.”
  • The decision came only a few hours after local organizers said the torch relay would start as planned on Thursday.
4 0
3 years ago
Good keyboarding technique includes ________
Svetlanka [38]

Answer:

Keeping you hands on the homerow keys

Explanation:

3 0
3 years ago
Read 2 more answers
What technique is used when setup times at a workstation are sequence dependent?
grigory [225]

Answer:

johnsons rule minimizes total idle time for both machines or work centers. What technique is used when setup times at a workstation are sequence dependent? determine the total time of each job sequence permutation considering the setup time and choose the best (lowest) time.

Explanation:

please mark me as brainliest thank you

3 0
3 years ago
Which network component connects a device with the transmission media and allows it to send?
yanalaym [24]
The wireless network I believe
5 0
3 years ago
What an underlined word or phrase represents? (HTML AND CSS), has to be 9 letters long. kinda urgent
xz_007 [3.2K]

Answer:

hyperlink

Explanation:

Hyperlinks render as underlined by default, so that's my guess.

7 0
3 years ago
Other questions:
  • How does the use of modules provide flexibility in a structured programming design?
    14·2 answers
  • Heatsinks used to protect cpus in computers from overheating, are shaped so that their surface area is very large. why is that?
    5·1 answer
  • On Gmail, can I have an email get sent to someone at a certain time?
    7·1 answer
  • You can use this effect to break a color into a percentage of its full strength.
    13·1 answer
  • Interactive sites where users write personal topics and comments to a threadded discussion are called?
    11·1 answer
  • Stating a document is PDF or XPS document refers to document _______​
    10·1 answer
  • Varun wants to start his own business. Suggest him at least four functions of an entrepreneur.
    8·2 answers
  • Whats a hybrid wired network
    9·1 answer
  • Do you get notified if someone follows you on Spotify like your email or do you just have to find out on your own
    14·1 answer
  • Select all the items of the Design Elements.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!