1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
7

For what reason can security risks never be fully eliminated?​

Computers and Technology
1 answer:
raketka [301]3 years ago
7 0

Answer:

A vulnerability level of ZERO can never be obtained since all countermeasures have vulnerabilities themselves. For this reason, vulnerability can never be zero, and thus risk can never be totally eliminated.

Explanation:

also we need to be protected from scams and stuff

You might be interested in
Select the correct answer.
ladessa [460]

Answer:

ask customers to use strong passwords to protect their accounts

8 0
3 years ago
Read 2 more answers
Any part of the computer that you can touch is called ________.
Mars2501 [29]
Hardware is the answer.

Software is not really tangible
Operating system is software
Input is not truly 'physical'
7 0
3 years ago
What is an unique text-based internet address corresponding to a computer's unique numeric IP address called
FromTheMoon [43]

Answer:

This is called a domain name

Explanation:

A domain name is an address used by internet users to access a website.

6 0
3 years ago
How do you tack pictures for this app
olga2289 [7]
There is a paper clip on the bottom left on your screen. When answering a question click it to apply a picture. Have a wonderful day.

(Take*)
3 0
3 years ago
How is a network address of 192.168.6.0 and a subnet mask of 255.255.254.0 written in cidr?
ZanzabumX [31]
It can be written with

192.168.6.0/23

255.255.0.0 means  /16 which is class b subnet mask so as 254 is in the third octet which means /23 so you can write it as /23.
6 0
3 years ago
Other questions:
  • How does the mantle interact with the tectonic plates at a convergent boundary?
    14·2 answers
  • OSHA's mission is to: A. Ensure that all workers receive adequate workers' compensation payments B. Esnure that all workers rece
    8·2 answers
  • Examine the following declarations and definitions for the array-based implementations for the Stack and Queue ADTs. Assume that
    14·1 answer
  • Consider a system consisting of m resources of the same type, being shared by n processes. Resources can be requested and releas
    13·1 answer
  • For some reason, Danica's classmate George could not find the registered symbol in the symbol gallery. He is selling
    14·1 answer
  • PLEASEEE HELPPP
    7·1 answer
  • Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hir
    14·1 answer
  • Which devices are used in networking
    15·1 answer
  • Vector images take up much less space when saved to a computer or storage device because computers and storage devices just need
    14·2 answers
  • Write a FOR loop that displays the following numbers exactly like this (you must use a loop):
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!