1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serg [7]
3 years ago
10

What is an identified component of a software program that might allow a hacker or other intruder to gain entry and control of a

computing resource?
patch
endpoint
imaging software
vulnerability
Computers and Technology
2 answers:
vfiekz [6]3 years ago
7 0

it’s vulnerability i think

adell [148]3 years ago
3 0

D. Vulnerability

A patch is basically the same thing as a quick bug fix.

An endpoint is basically a way to access a server/resource.

Imaging software is just a type of software.

You might be interested in
PowerPoint is a visual aid for many speakers. Discuss some points to remember when adding text to a PowerPoint presentation. How
Murljashka [212]
1. Less picture less distraction, but where to put pictures ? At the start of your presentation just to initially get the attention of the audience.
2. Use bullets for texts, never use paragraphs. Use short text or even words only which captures the subject of the presentation.
3. In conjunction with point 1. Use less animations as well. Especially for formal presentations

Additionally : Make sure to know your audience, for professionals, make the presentations short and precise. For much informal audiences you can be playful but always keep in mind not to overshadow the attention from the speaker.
7 0
2 years ago
These factors influence the design of a network.
REY [17]
Availability ,devices and applications, performance, security, scalability.
8 0
3 years ago
Read 2 more answers
To change the numbering style for a page number or to specify a number to use as the first page number, _____ should be clicked
Oksi-84 [34.3K]

Answer:

Format Page Number

Explanation:

In order to change the numbering style for  page number or to choose the numbering position or to specify the number to begin with, following the following steps:

a. Go to Insert tab

b. Go to Header & Footer section

c. Click the dropdown icon beside Page Number

d. Select Format Page Number.

7 0
3 years ago
________ is a crime that uses mock (fake) sites to trick people into sharing information.
Elan Coil [88]
<span>Phishing is a crime that uses mock (fake) sites to trick people into sharing information.</span>
5 0
3 years ago
Please help me asapppppp​
guapka [62]

Answer:

lol no

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • What does the security element of non-repudiation mean in e-commerce cybersecurity? A. Data needs to be available at all times.
    10·1 answer
  • Consider the following code example:
    9·1 answer
  • Malware that corrupts the target operating system in such a manner that a network defender can no longer trust the native OS is
    15·1 answer
  • Write a program that prompts the user for a measurement inmeters and then converts it into miles, feet, and inches.
    9·1 answer
  • What is computer Network?​
    10·1 answer
  • Cual es la definición de grouded?​
    7·1 answer
  • Can anybody answer this
    11·1 answer
  • For each of the innovations below. Decide if it is a computing innovation or not. Part 3 Continued.
    7·1 answer
  • Please help I’ll give 10 points
    6·1 answer
  • 9- Write a program in MARIE to add three numbers.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!