1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
5

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network

Computers and Technology
1 answer:
Komok [63]3 years ago
6 0

Answer: vulnerability scanners

Explanation:

The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.

Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.

You might be interested in
I have been working on this python program for a hour now, and I am trying to figure out what I an doing wrong in the loop. I ha
Alona [7]

Answer:

The correct loop is as follows:

for year in range(starting_tuitionYear, ending_tuitionYear, increment):

   tuition = startingTuition + rate * startingTuition

   startingTuition = tuition

   print('Tuition for the year of ' + str(year)+ ' is ' + str(tuition));

Explanation:

Required

The correction to the attached program

Some variables are not needed; so, I've removed the redundant variables.

The main error in the program is in the loop;

After the tuition for each year has been calculated, the startTuition of the next year must be set to the current tuition

<em>See attachment for complete program</em>

7 0
3 years ago
What is used in computer appliances and special-purpose applications, such as an automobile, ATM, or media player and is used fo
zlopas [31]

Answer:

Embedded Operating System.

Explanation:

Embedded OS (also called Real Time Operating System) is designed to perform a single purpose in devices that may or may not be computers that have very little computer power and little RAM size such as washing machines, ATM, media player, automobiles, and cameras.  Examples of such embedded operating system are iOS(used in Apple's mobile devices), Symbian, Palm OS and Window OS.

Since they are used in single-purpose computers, they handle and perform their tasks with so much efficiency.

<em>Hope this helps!</em>

6 0
3 years ago
Pls due soon
Natasha_Volkova [10]

Answer:

Software for personal computers is typically developed and distributed independently from the hardware or operating system manufacturers. Many personal computer users no longer need to write their own programs to make any use of a personal computer, although end-user programming is still feasible. This contrasts with mobile systems, where software is often only available through a manufacturer-supported channel. And end-user program development may be discouraged by lack of support by the manufacturer.

Explanation:

5 0
3 years ago
Which of the following refers to semitransparent text or a faint object that appears
Agata [3.3K]
<h2>Option D: Watermark refers to semitransparent text or a faint object that appears behind the document content.</h2>

Explanation:

Footer: This is a text which appears in the bottom of every page. Mostly page numbers and the name of the publisher or the company name will be in the footer.

Page Color: This represents the color of the page

Page border: This option provides border to the page. The border can be thin or thick according to the requirement.

Watermark: This is the right answer. A watermark is added such that your content cannot be used by anyone else without permission. When you copy the text, the water mark also gets copied, thus avoiding plagiarism.

4 0
3 years ago
Helen is having a meeting with her colleagues in her company. They are working on the goals and objectives for the coming year.
bekas [8.4K]
<span> Get assistance from </span>colleagues<span> when </span>your <span>relationship with the employee threatens </span>your objectivity. <span>A performance appraisal </span>meeting<span> should be a two way </span>process<span>.</span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • What kind of printer is used with multipart forms such as those with point of sale machines?A) dot-matrixB) daisy-wheelC) inkjet
    5·1 answer
  • What is the term used for a set of programs that acts as an interface between the applications that are running on a computer an
    13·1 answer
  • which one of the following word process feature saves you the most time when you keying in a document
    9·1 answer
  • Which of the following is a good precaution to take when making online purchases? (1 point)
    15·1 answer
  • What is the final value for X ?<br><br> x= 1<br><br> x=13<br><br> x= x+3<br><br> x=0
    9·1 answer
  • Anyone wanna join zoo m???????​
    10·2 answers
  • Discuss how printing, publishing, and e-learning industries have transformed on evolved due to developments and advances the fie
    14·1 answer
  • Select the correct answer.
    10·1 answer
  • What is the effects of computer and internet attacks​
    11·2 answers
  • Porque es importante la tecnología?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!