1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveta [45]
3 years ago
12

If anyone know python code, your answer will be valuable.

Computers and Technology
2 answers:
Bingel [31]3 years ago
6 0
B is the answer.

Hope this answer helps!
Veseljchak [2.6K]3 years ago
4 0

Answer:

Explanation:

B

You might be interested in
The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
gayaneshka [121]

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

5 0
3 years ago
20 POINTS!!! I NEED HELPP
Cloud [144]

Answer:

Apple

Explanation:

5 0
3 years ago
Read 2 more answers
Dynamic addressing: __________.
Anarel [89]

Explanation:

jwjajahabauiqjqjwjajjwwjnwaj

6 0
3 years ago
Read 2 more answers
Array elements must be ________ before a binary search can be performed.
Sladkaya [172]
In order.
You have to be able to see if its on the left or right side of the midpoint
7 0
3 years ago
Chad, a computer programming student, just finished writing a computer program. In order to check whether the program performs t
dangina [55]
He'd need to use a compiler. 
3 0
3 years ago
Read 2 more answers
Other questions:
  • Opportunity cost is the least desirable alternative given up as a result of a decision.
    6·1 answer
  • What is an independent data mart?
    8·1 answer
  • Which category of app does word processing software fall into? A. Productivity B. Entertainment C. Social networking D. Educatio
    14·2 answers
  • PLEASE HELP ASAP!!!
    8·1 answer
  • What’s the best description of an opportunity cost
    5·1 answer
  • Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furthermore, it has some properties
    9·2 answers
  • A website's ____ page provides basic information about the individual or organization and includes a navigation bar with links t
    13·1 answer
  • . What is the difference between a combinational circuit and sequential circuit? Give example of each.
    8·1 answer
  • Multiple Choice
    8·1 answer
  • If you wanted to divide an integer variable by 2, which of the following lines of code would you use? total = int + 2 total = in
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!