Discovery of any vulnerability in a software program can potentially be sold to the government: True.
<h3>What is vulnerability?</h3>
Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.
This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.
Read more on vulnerability here: brainly.com/question/25813524
#SPJ1
Answer:
#
Explanation:
I have notes on it we learned it in 8th
I’m not 100% sure but I think it’s a padlock that represents it
Answer:
In a STAR TOPOLOGY network, each device on the network is attached to a central router. If the router fails, then the other devices will be unable to communicate, but if only one connected device fails, then all other devices will still be able to communicate.
Explanation:
In this type of topology all the computers are connected to a single router through a cable. This router is the central node and all others nodes are connected to the central node.
Answer:
a. new, running, waiting, ready, and terminated.
Explanation:
The process in a computer system can have different states and these are:
-New: When the process is created.
-Ready: When the process is waiting to be executed.
-Running: When the process is chosen to be executed.
-Waiting: When the process is expecting for something to happen.
-Terminated: When the process is not running anymore.
According to this, the answer is that the possible states of a process are: new, running, waiting, ready, and terminated.