1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alinara [238K]
3 years ago
7

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All

of the above e. None of the above
Computers and Technology
1 answer:
ELEN [110]3 years ago
7 0

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

You might be interested in
How would you define a relational database ?
UNO [17]

Answer: (D) Database design follows the twelve principles proffered by Dr. Edgar F. Codd

Explanation:

 The relational database is basically based on the relational model of the data which is proposed by the Dr Edger F. codd and he mainly introduced the twelve basics principle of the database designing in the database system. He also contributed various valuable principle in the computer science.

The twelve principle are:

  • The first rule of the relational database is the information rule as it represented all data or information
  • Independence of the integrity
  • Viewing various updating rule
  • Logically treatment of various NULL value
  • Independence of the physical database
  • Distribution in-dependency
  • Various delete, insert and update rules
  • The overall logical description of the database are basically stored in the database directory
  • There is no subversion rule
  • There is guarantee accessing rule
  • Proper rule for data language
  • The relational database level actions

7 0
3 years ago
Shape: element::paintbrush: ..............
kondor19780726 [428]
There is no question here but it might be paint
6 0
4 years ago
(within 200 words) analyzing the importance of information and communication technology in personal life.
Volgvan

Explanation:

Information technology is inescapable in modern day life, turn on the coffee pot and there are tiny microprocessor inside. Start your automobile and every aspect of operation is controlled by dozens of computer control modules. The current mobile phone amazing power and speed for the user. Technology is transforming every aspect of our life. Nowever is this more apparent than our place of employment. Developing of it makes our family to live happy because it helps the members of family to spend their most time with their family. It helps us to communicate the family member who live far from their family. It is also used in house hold work. It's saves our time to do more better and better

6 0
3 years ago
Which of the following blocks is least similar to the others?
GuDViN [60]
The answer is A or B
4 0
3 years ago
Read 2 more answers
How to implement domain controller?​
Pepsi [2]

Answer:

Log in as an administrator to the Windows 2000 or 2003 server host.

From the Start menu, go to Administrative Tools > Manage Your Server. ...

Install the Active Directory Domain Controller. ...

Install Windows Support Tools. ...

Create a new user account. ...

Create a user account to map to the Kerberos service.

Explanation:

google

3 0
3 years ago
Read 2 more answers
Other questions:
  • Assume the variable date has been set to a string value of the form mm/dd/yyyy, for example 09/08/2010. (Actual numbers would ap
    8·1 answer
  • What word processing feature saves you the most time when keying a document a. Thesaurus
    9·1 answer
  • What does it mean for a school to be “accredited”?
    5·1 answer
  • What will be the value of i after the C statements at the right have been executed
    6·1 answer
  • What is the best practice to do an SEO for a HTML website? Is there any plug-in for this?
    13·1 answer
  • Haigy Paigy is as a children's invented language which sounds exactly like English, except that "aig" is inserted before the vow
    12·1 answer
  • Multiple Choice: We have been assigned the task of developing a software testing tool (tester) that can assess reachability of s
    11·1 answer
  • What does Falstaff do to protect himself in battle? ​
    15·1 answer
  • 1. What is a digital networking app?
    12·2 answers
  • When it comes to game mechanics, what is the most universal mechanic that is present in virtually every computer game that you c
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!