1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vredina [299]
3 years ago
11

Anybody know this? Read the following scenario. Using complete sentences, explain which part of the CIA triad has been broken. M

ake sure to explain your answer.
Cynthia is working on her college applications online when the admissions website crashes. She is unable to turn in her college application on time.
Computers and Technology
1 answer:
Sergio039 [100]3 years ago
3 0

Answer:

Availability

Explanation:

You might be interested in
Drag the tiles to the correct boxes to complete the pairs.
Nady [450]

Explanation:

Drag the tiles to the correct boxes to complete the pairs.

Match each story-boarding technique with its appropriate description.

hierarchical

linear

webbed

wheel

The order of page navigation is inconsequential.

The flow of information is sequential.

The technique requires navigating back to the main page.

The technique orders content from generic to specific topics.

8 0
3 years ago
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
Natasha_Volkova [10]

Answer:

A zero-day attack.

Explanation:

A Zero-day vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, the security community or software developer or even the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.

An exploit directed at a software with zero-day vulnerability & exploiting this vulnerability is called a zero-day exploit, or zero-day attack.

3 0
3 years ago
HELP!!!
jeyben [28]

Answer:

A. a tool tip

Explanation:

6 0
3 years ago
Read 2 more answers
In this problem you are to compare reading a file using a single-threaded file server and a multithreaded server. It takes 12 ms
borishaifa [10]

The answer & explanation for this question is given in the attachment below.

3 0
3 years ago
Which sentence best descibes an activity stream
Marina CMI [18]

Answer: a list of recent activities performed by an individual, typically on a single website.

Explanation:

7 0
3 years ago
Other questions:
  • Which of the following is a Microsoft solution that runs on a Microsoft Terminal Services server but appears, to end users, as i
    10·1 answer
  • How do u feel about distance learning in a paragraph?
    6·2 answers
  • Let L be any r.e. language. We know that there is an unrestricted grammar for L. Show that L can be generated by an unrestricted
    10·1 answer
  • What is the advantage of video conferecing
    13·2 answers
  • Given the following code, what are the dimensions, in pixels, of the shape created? import tkinter class myShape: def __init__(s
    6·1 answer
  • AYYOOOO CAN YOU HELP A GIRL OUUTT???
    11·1 answer
  • While using a web-based order form, an attacker enters an unusually large value in the Quantity field. The value he or she enter
    15·1 answer
  • Need answer ASAP
    14·1 answer
  • MyProgramming Lab
    5·1 answer
  • how does the use of data abstraction manage complexity in program code? how does using lists make a program easier to develop an
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!