1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anit [1.1K]
4 years ago
5

(Please answer! Correct answer gets brainliest!)

Computers and Technology
2 answers:
givi [52]4 years ago
8 0

Answer:

I think it is exploit.

Explanation:

because gain access means to exploit or something. if I am wrong I am very sorry.

KATRIN_1 [288]4 years ago
4 0

Answer: i believe exploit

Explanation:

You might be interested in
You know that a candy bar costs sixty cents today. You also know the CPI for 1962 and the CPI for today. Which of the following
Elan Coil [88]

Answer:

d. sixty cents x (1962 CPI / today's CPI)

Explanation:

Dividing sixty cents with today's CPI and multiplying with 1962 's CPI would give the cost in 1962

7 0
4 years ago
1. What are the benefits and drawbacks of keeping separate journals for individual accounts?​
astraxan [27]

Answer:

these are some benefits Keep track of multiple areas of interest. If you want to write extensively about your day-to-day life, your exercise goals, the movies you see, and the places you visit, you might feel more organized if you have a separate place to write about each topic.

3 0
3 years ago
"what is the #1 resource used when researching a product online?"
BARSIC [14]
I believe it would be customer reviews.
6 0
3 years ago
____________ is a widely accepted international best practices framework for implementing information systems security.
balandron [24]

Answer:

Control Objectives for Information and related Technology (COBIT)

Explanation:

COBIT is a framework developed by the ISACA for managing and supervising Information Technology processes. Such kinds of frameworks allow companies to position themselves with the expectations that they and their clients expect. COBIT's aim is to provide management and business process owners with an IT control and governance model that helps deliver value from IT and identify and handle the IT-related risks. It helps bridge the gap between business needs, control requirements and technical issues. It is a paradigm of control for addressing the IT governance requirements and maintaining the security of knowledge and information systems. COBIT emphasizes on what allows processes to work well.

8 0
4 years ago
What's wrong with my program? Here is my code , if the user wants a 3rd card dealt they, have to select yes and the total will b
Mashcka [7]

Your issue is on line 19 in your if statement. In python, if you have more than one condition in an if statement, you have to explicitly mention it after the or.

Your if statement is

if again == "Y" or "y":

However, this will always return true because the second statement simply asks "y".

To correct this, simply change the if statement to:

if again == "Y" or again == "y":

This will correct your code.

Another thing to consider is to always convert a userinput (whenever possible) to one version, this can be accomplished in your code by converting "again" into one version by using the .lower function.

again = input("Would you like to draw a 3rd card? Y or N? ")

again = again.lower()

Hope this helps!

4 0
2 years ago
Other questions:
  • What is the primary purpose of a business plan? To file for incorporation To help you identify your goals and plan how you will
    6·1 answer
  • Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.
    7·1 answer
  • What do you need for digital photography?
    14·1 answer
  • Using data from the BITS database, define a view named TopLevelClient. It consists of the number, name, address, balance, and cr
    9·1 answer
  • True or False <br><br> Rootkits are only made by black-hat hackers.
    11·1 answer
  • An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisemen
    14·1 answer
  • In addition to MLA, what are some other widely used style guides? Check all that apply.
    5·1 answer
  • Write a program that prompts the user to enter the center and a point on the circle. The program should then output the circle’s
    9·1 answer
  • Which of the following is not a characteristic of a good value log entry
    15·1 answer
  • Suppose that we want to enhance the processor used for Web serving. The new processor is 10 times faster on computation in the W
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!