1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serg [7]
3 years ago
10

What is an identified component of a software program that might allow a hacker or other intruder to gain entry and control of a

computing resource?
patch
endpoint
imaging software
vulnerability
Computers and Technology
2 answers:
vfiekz [6]3 years ago
7 0

it’s vulnerability i think

adell [148]3 years ago
3 0

D. Vulnerability

A patch is basically the same thing as a quick bug fix.

An endpoint is basically a way to access a server/resource.

Imaging software is just a type of software.

You might be interested in
The goal of this project is to become familiar with basic Python data processing and file usage. By the end of this project, stu
xenn [34]

Answer:

Explanation:

The question does not provide any actual data to manipulate or use as input/guidline therefore I have taken the liberty of creating a function for each of the question's points that does what is requested. Each of the functions takes in a list of the needed data such as a list of field test averages for part 1, or a list of field tests for part 2, etc. Finally, returning the requested output back to the user.

import matplotlib.pyplot as plt

from collections import Counter

def best_pilot(field_test_average):

   return max(field_test_average)

def find_average(field_test):

   average = sum(field_test) / len(field_test)

   return average

def create_histogram(field_test_colors):

   count_unique_elements = Counter(field_test_colors).keys()

   plt.hist(field_test_colors, bins=len(count_unique_elements))

   plt.show()

def average_name_lengths(first, last):

   first_name_sum = 0

   last_name_sum = 0

   count = 0

   for name in first:

       first_name_sum += len(name)

       count += 1

   for name in last:

       last_name_sum += len(name)

   first_name_average = first_name_sum / count

   last_name_average = last_name_sum / count

   return first_name_average, last_name_average

7 0
3 years ago
Who is this person?<br><br><br> Kaneppeleqw. I see them everywhere. Are they a bot? Are they human?
Effectus [21]
I’m not sure. Maybe a human.
6 0
3 years ago
Describe Mr. Digby, the principal. ​
Gennadij [26K]

Answer:

stinky

Explanation:

7 0
4 years ago
How long does a baby dolphin stay with its mum
g100num [7]
The nursing usually takes up to 18 months, i.e. one year and a half.

The baby dolphin may however remain with his mum for up to 3-6 years.
5 0
3 years ago
In a PERT network, non-critical activities that have little slack need to be monitored closely
kozerog [31]

Answer: b)because near-critical paths could become critical paths with small delays in these activities

Explanation: Program evaluation and review technique(PERT) technique is used for management of the project .The organizing, maintenance,coordination of any task is done by this chart. The non-critical activities need to be observed carefully because they may create near-critical methods which can lead to complexity.

Other options are incorrect because not all activities are equally rather monitoring is done to avoid errors and slack can occur at any path . Small delays can be caused but not complete project can get delayed and there can be risk of complexity rather than being uncompleted.Thus, the correct option is option(b).

6 0
4 years ago
Other questions:
  • ________ are devices used to send data between two networks.
    11·1 answer
  • Differentiate between Software as a service, platform as a service and infrastructure as a service.
    14·1 answer
  • Digital certificates can be used for each of these EXCEPT _____. A. to encrypt channels to provide secure communication between
    13·1 answer
  • If you could make another device "smart" and have
    12·1 answer
  • The benefit of host and guest operating system difference is:
    8·2 answers
  • Microsoft words spell checker
    9·1 answer
  • The words that follow a code number in the cpt manual are called the
    12·1 answer
  • What is one of the advantages of using an algorithm to solve a puzzle like Kriss-Kross or Sudoku?
    13·1 answer
  • How do i delete cookies on a chromebook?
    8·1 answer
  • Lattice-based access controls use a two-dimensional matrix to assign authorizations. What are the two dimensions and what are th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!