1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
3 years ago
14

In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer

Computers and Technology
2 answers:
lara31 [8.8K]3 years ago
6 0

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

mash [69]3 years ago
3 0

Answer:

Backdoor

Explanation:

You might be interested in
Which technology can allow a single ground-based telescope to achieve images as sharp as those from the Hubble Space Telescope?
Ganezh [65]

Answer:

The correct answer to the following question will be "Adaptive Optics".

Explanation:

  • AO (Adaptive Optics) is a technique used to enhance optical system performance by reducing the impact of incoming gravitational wave distortions by compressing a mirror to compensate for the distortion.
  • It operates by calculating and compensating for defects in a wave-front with a system that corrects these errors as a deformable mirror or even a liquid crystal collection.
  • It is a technique that can make it possible for a single ground-based telescope to get images as clear as that of the Hubble Space Telescope.
  • Certain methods can achieve power resolution that exceeds the limit set by atmospheric distortion, for example, Aperture synthesis, Lucky imaging, and Speckle imaging.

Therefore, Adaptive Optics is the right answer.

7 0
3 years ago
WILL GIVE BRAINLIEST TO HELPFUL ANSWERS!
sashaice [31]

Algorithm is part of computer science. You an learn it on Khan academy. (you probably werent looking for this but no one was answering)

7 0
2 years ago
Add a data attribute tricks of type list to each Dog instance and initialize it in __init__ to the empty list. The user does not
Olenka [21]

Answer:

Following are the method to this question:

def __init__(self, _name, _breed):#defining Constructor

       """ Constructor """

       self.name = _name#assigning value in name variable

       self.breed = _breed#assigning value in breed variable

       self.tricks = []#defining tricks an empty list

Explanation:

In the above code, a parameterized constructor is defined, that hold two-variable "name and breed" in its parameter, and another object self is created for storing the value.

Inside the constructor two-variable, and one empty list variable "tricks" is defined that hold value in the name and breed variable, and the next step an empty list is defined, that store its value.

7 0
2 years ago
Disney's finding nemo is an example of a series of computer-generated images played in rapid succession. this medium is called _
Lana71 [14]

This medium is called Animation. Animation is a medium where images are handled to appear as moving pictures. In traditional animation, images are drawn or painted by hand on transparent celluloid sheet, so as to be photographed and exhibited on film. Today most animations are made with computer-generated imagery (CGI).

4 0
3 years ago
Please help with this coding problem! Any help is greatly appreciated!!
Nonamiya [84]

The python program is an illustration of python functions; Functions are names statements that are executed when called.

<h3>The order in which the statements are executed?</h3>

The program uses functions, and the functions would be executed when called.

So, the order of the statements is:

  • Line 10
  • Line 11
  • Line 1 to 3
  • Line 12
  • Line 4 to 6
  • Line 13
  • Line 7 to 9
  • Line 14

<h3>The value of x in between lines 11 and 12</h3>

On line 11, the function F(n) is called and executed.

This function multiplies 10 by 5 and assigns the product to x.

Hence, the value of x in between lines 11 and 12 is 50

<h3>The value of x in between lines 12 and 13</h3>

On line 12, the function G(n) is called and executed.

This function adds 25 to the global value of x (100) and assigns the sum to x.

Hence, the value of x in between lines 12 and 13 is 125

<h3>The program output</h3>

On line 13, the function H(n) is called and executed.

This function adds -25 to the global value of x (125) and assigns the sum to x.

The output is then printed on line 14

Hence, the output of the program is 150

Read more about Python programs at:

brainly.com/question/16397886

7 0
2 years ago
Other questions:
  • Speech on inventors and inventions
    14·1 answer
  • How to access files on different computer same network
    14·1 answer
  • 7. The penalties for a first-time DUI charge include a fine of __________. A. up to $500 for a BAL of .08 to .15 B. $500-$1,000
    5·1 answer
  • Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la
    14·1 answer
  • Alice is working on a web page to attract the maximum number of people to join her cause. She wants to inform people about the b
    12·1 answer
  • Which of the following is NOT one of the four steps preparing for sales forecast ?
    10·1 answer
  • Consider the following method.
    14·1 answer
  • Frrrrrrrrrrreeeeeeeeee brainliest for u
    13·2 answers
  • ...............is a personal computer that fits on desk.​
    5·2 answers
  • If you want to join all of the rows in the first table of a SELECT statement with just the matched rows in a second table, you u
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!