1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
3 years ago
14

In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer

Computers and Technology
2 answers:
lara31 [8.8K]3 years ago
6 0

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

mash [69]3 years ago
3 0

Answer:

Backdoor

Explanation:

You might be interested in
open your browser and enter the address of this ftp site in the address box: ftp.cengage. if your browser supports ftp, a logon
Licemer1 [7]

FTP access is available from other companies, but access is constrained unless the user first authenticates by supplying a user name and potentially a password.

The files are frequently intended for specific uses rather than for public release. For instance, you must send a letter house your consumer address list. Both businesses would not want the public to have access to these materials in this situation. Software is a collection of instructions, data, or computer programs that are used to run machines and carry out particular activities. It is the antithesis of hardware, which refers to a computer's external components. A device's running programs, scripts, and applications are collectively referred to as "software" in this context. Software refers to the processes and programs that enable a computer or other electrical device to function.

Learn more about software here-

brainly.com/question/985406

#SPJ4

7 0
1 year ago
50 Points! 25 Points Each! Please help ASAP! Will mark brainliest! See attached image.
monitta

Answer:

I can't see the image

Explanation:

please put image up there

6 0
3 years ago
Read 2 more answers
(09 MC)How can understanding your own personality improve your relationships with others?
Mars2501 [29]
B.) is what most employers are looking for
5 0
2 years ago
Difference between multi-national and global company​
trapecia [35]

A multinational corporation, or MNC, is a company which produces goods and services and has offices in several other countries while a global corporation or company is a company which also has trade relations with several other countries. ... MNCs have official headquarters while global companies do not.

5 0
3 years ago
Read 2 more answers
When a computer restarts without a hardware power-down-power-up cycle, it is doing a _______________?
tamaranim1 [39]
When a computer restarts without a hardware power-down-power-up cycle, it is doing an update.
4 0
3 years ago
Other questions:
  • which of the following is true about both the cyber community and the real community like the one you live in,i will give 10 poi
    6·1 answer
  • 5. In Access, data is stored in a _______ once a form is completed. A. cell B. page C. record D. form
    13·1 answer
  • Why is it a mistake to put email addresses of people who don't know each other in the "To:" field?
    8·2 answers
  • What will empty the log of Internet sites you have recently viewed
    12·2 answers
  • What is information associated with a document to help describe that document called?
    12·1 answer
  • How many people employed in the United States work in a job related to digital media?
    12·1 answer
  • The data type of 17.3 should be ________________.
    12·2 answers
  • Please help with question
    14·1 answer
  • Help me pls...
    7·2 answers
  • Which operation is not efficiently supported by heaps?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!