1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonja [21]
3 years ago
15

US-CERT is a set of moderated mailing lists full of detailed, full-disclosure discussions and announcements about computer secur

ity vulnerabilities. It is sponsored in part by SecurityFocus. _________________________
Computers and Technology
1 answer:
n200080 [17]3 years ago
3 0

Answer:

False

Explanation:

BugTraq is a high volume, full disclosure mailing list for the detailed discussion and announcement of computer security vulnerabilities, not US-CERT

You might be interested in
Which statement correctly compares blank presentations and themed presentations?
chubhunter [2.5K]

Answer:

To access blank presentations, you need to use the Insert tab on the ribbon; to access themed presentations, you  need to use the Design tab.

Explanation:

in order to make presentation, the user can select either blank presentation or themed presentation and then change it as required.

7 0
3 years ago
Read 2 more answers
Which method is useful for dimensionality reduction especially for small data-sets?
Anna [14]
Independent Component Analysis (ICA) is based on information-theory and is also one of the most widely used dimensionality reduction techniques.
8 0
2 years ago
The ____ option must be used when running a program in order to see the results of assert statements.
Lera25 [3.4K]

Answer:

-ea

Explanation:

We can enable or disable assertions in java, by default this assertions are disabled at runtime, but we can use two commands, for example, if we want to enable assertions at various granularities, we can use the -enableassertions, or -ea, switch, if we want to disable at various granularities, is -disableassertions, or -da.

4 0
3 years ago
patty works at Mcdonald's as a chef. it is her job to make hamburgers as each order arrives on her computer screen. one day patt
il63 [147K]
Angela should make sure the hamburger patty is disposed of and a new one prepared for the hamburger. She should reprimand Patty as what she did is wrong. Patty could well be fired for what she did. It is unsafe and unsanitary to give a customer food that has fallen on the floor. Angela should make sure this never happens again.

4 0
3 years ago
Read 2 more answers
Which of the following identifies a user based on anatomical characteristics such as a fingerprint, a voice print, or iris patte
antiseptic1488 [7]

Answer:

Biometrics

Explanation:

Biometrics is the techniques that is used to measure and identify different characteristic of human being that are usually unique in nature for individuals such as voice characteristics, eye retina and finger prints. These features are unique for every person. These features could be used for different purposes now a day such biometric identification, biometric verification and for forensic purposes.

There are different algorithms to compute and compare these unique characteristics for each user and store in a database for the purpose of identification of the users. This data can also be used for forensic purpose if needed by some security agency to identify some person.

The type of identification in which these features such as voice, finger prints and iris pattern use is called biometrics.

3 0
3 years ago
Other questions:
  • The component in a disk brake unit acts as a return spring and allows the pad to move a ay from the rotor is the
    6·1 answer
  • Which part of a formal email is optional
    6·2 answers
  • What are some of the issues that organizations need to be aware of when designing and managing data?
    8·1 answer
  • Describe some ways that you personally use information technologies differently than you did just a few years ago
    11·1 answer
  • What is the term for the error caused when one end of an unshielded twisted-pair (UTP) cable is terminated in the T568A configur
    6·1 answer
  • Thomas drew a rectangle with an area of 6 square cm what is the greatest possible perimeter of this rectangle
    5·1 answer
  • Who is a second-degree contact on a professional networking profile?
    12·1 answer
  • How would you justify using cloud computing?
    12·1 answer
  • What is the difference between information poor and information rich<br>​
    13·1 answer
  • There are many potential risks associated with the internet. what do we call the distribution and access of illegal copies of di
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!