1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serg [7]
3 years ago
10

What is an identified component of a software program that might allow a hacker or other intruder to gain entry and control of a

computing resource?
patch
endpoint
imaging software
vulnerability
Computers and Technology
2 answers:
vfiekz [6]3 years ago
7 0

it’s vulnerability i think

adell [148]3 years ago
3 0

D. Vulnerability

A patch is basically the same thing as a quick bug fix.

An endpoint is basically a way to access a server/resource.

Imaging software is just a type of software.

You might be interested in
What is the name of small programs stored on the hard drive that tell the computer how to communicate with a specific hardware d
Katena32 [7]
Small programs stored on the harddrive that provide basic functionality for he devices listed would be called Hardware Drivers.
I hope this helps!
5 0
3 years ago
Montoya Consumer Products Inc is implementing Service Cloud. They typically handle 50,000 customer inquiries per day. What shoul
maksim [4K]

Answer:

Option A is correct

Explanation:

It would help in building the right architecture and configuration that would decrease those operations times by a large magnitude like uploading or updating large number of records.

8 0
3 years ago
Which of the following are computer safety techniques? Check all of the boxes that apply.Identify Computer Safety Techniques:
zvonat [6]

Answer: Protect the system with a password  

               Use spam protection.

               Avoid using questionable software.

               

Explanation:

4 0
3 years ago
The table shows the number of points Ramon has earned on science quizzes. Quiz 16 points Quiz 2 9 points Quiz 3 1 point Quiz 4 9
kotykmax [81]

Answer:9

Explanation:d.9

6 0
2 years ago
I have a Lenovo laptop and I noticed a laptop with the name Le0OJU32 was listed as a device on my network? Is this just my lapto
xxMikexx [17]

U HAVE BEEN HACKED MY BROTHER/SISTER

4 0
3 years ago
Read 2 more answers
Other questions:
  • Print "Censored' if userlnput contains the word "darn, else print userlnput. End with newline. Ex: If userinput is "That darn ca
    11·1 answer
  • What is top down design? a. Top down design is a way of designing your program by starting with the biggest problem and breaking
    7·1 answer
  • Your sister asks you if it is possible to get an office productivity suite for free. What do you tell her?
    13·1 answer
  • Ayudaa, 5 ejes de sistemas tecnológicos
    5·1 answer
  • The results of the SPEC CPU2006 bzip2 benchmark running on an AMD Barcelona has an instruction count of 2.389E12, an execution t
    6·1 answer
  • Design a class named Employee. The class should keep the following information in member variables:
    5·1 answer
  • Why are people's visions of utopias and dystopias subjective?
    9·1 answer
  • How can I convert a string to a int? in Java
    13·1 answer
  • Im trying to do an animation only using simplegui in python and my objective is make the ball enters frame, be confused and jump
    12·1 answer
  • Why are salaried employees often excluded from overtime pay
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!