1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
3 years ago
12

A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________

__ is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.
Computers and Technology
1 answer:
Lynna [10]3 years ago
6 0

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

You might be interested in
Alice is an investor who has created a device controlled by an app that will water plants automatically. Alice has no experience
oksian1 [2.3K]

Answer:

3rd one

Explanation:

took test

5 0
3 years ago
User can use ______ commands to search for and correct words in a document
Maksim231197 [3]
Find and replace is the answer
5 0
3 years ago
he wants to customize the operating system to meet his needs. what types of tools should he use, and what can he do with each?
Dennis_Churaev [7]

Answer:

remastering iso image

Explanation:

you  can add the gui, default installed program, etc

3 0
3 years ago
What will be the best way for computer science students in Nepal for better salary .​
Nataly [62]

Answer:

The more knowledge you have of emerging trends, technologies and applications, the better suited you will be when it comes to applying for positions within the industry. According to Payscale, an average salary of students who have completed Bsc. Csit in Nepal is around Npr 5,00,000.

3 0
2 years ago
Assume a program requires the execution of 50 x 106 FP instructions, 110 x 106 INT instructions, 80 x 106 L/S instructions, and
Molodets [167]

Explanation:

FP - 50 \times 10^6

CPI - 1

INT -110 \times 10^6,

CPI - 1

I/S - 80 \times 10^6 ,

CPI - 4

Branch - 16 \times 10^6

CPI - 2

Clock Speed - 2 \times 10^9

Time(old) =\frac{50 x 10^6 + 110 x 10^6 + 4 x ( 80 x 10^6) + 2 x (16 x 10^ 6)}{2 x 10^9}

Time(old) = 256 \times 10^ {-3}

Time(new) =  \frac{256 \times 10^{-3}}{2}

                = 128 \times 10^{-3}

                =\frac{CPI(new) x [50 x 10^6 + 110 x 10^6 + 4 x ( 80 x 10^6) + 2 x (16 x 10^ 6)]}{2 x 10^9}

                =  128 \times 10^{-3}

CPI(new) = \frac{-206}{50}

               = -4.12

3 0
3 years ago
Other questions:
  • What are some ways social media networks make money from users
    10·1 answer
  • Write a php program that checks the elements of a string array named $passwords. use regular expressions to test whether each el
    8·1 answer
  • If you enter 234.567 into a cell that is formatted to display 1 decimal place, what is the value stored in the cell?
    13·1 answer
  • Are high tech messages are always preferable to low tech messages
    8·1 answer
  • Which platform is the best? (X-box, PC, Playstation, Nintendo Switch, Wii)
    10·1 answer
  • How would asking questions or defining problems be used in this career?<br> -
    13·1 answer
  • Which formatting option(s) can be set for Conditional Formatting rules?
    8·2 answers
  • True or false we can used virus not use pirated software and programs ​
    10·1 answer
  • For each of the innovations below. Decide if it is a computing innovation or not. Part 3 Continued.
    7·1 answer
  • please answer as soon as possible and don't write wrong answer .wrong answer will be reported and correct answer will be marked
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!