1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
postnew [5]
3 years ago
5

Which of the following statements is true?

Computers and Technology
2 answers:
nexus9112 [7]3 years ago
3 0
Gray hat hacker work at a more advanced level then white and black hat hackers
Ronch [10]3 years ago
3 0
The gray hat hackers one
You might be interested in
Please help...........​
MrMuchimi

Answer:

Explanation:

As a user of GPL v3 software, you have lots of freedom: You can use GPL software for commercial purposes. You can modify the software and create derivative work. You can distribute the software and any derivative work you produce, without having to ask for permission or pay

4 0
3 years ago
Read 2 more answers
Name two primary goals of quality assurance and control programs:
bulgar [2K]

Answer:

The two main goals are to reach CMM level 5, and when the company can be termed as optimized.

The second goal is to minimize the bugs at the current level as well. And this is important, as improvement is one thing, and ensuring you are correct at the current time is another, and which is essential for survival. And you can think of improvement only if you survive.

Explanation:

The dream of all companies is to become Optimized. And they always try to reach CMM level 5, such that they can serve their clients in the best possible manner. And it is the quality assurance team that keeps an eye on the working of the company and keeps on giving their feedback so that the team can provide better service to the clients in the future, and probably reach the CMMI level 5.

The control program makes the operating system better through the development of an environment in which one can run various other programs. And it, in general, formulates the graphical interface and leverage you to run various programs at one time in various windows. And the control programs are also being known as the operating environment.

5 0
3 years ago
What security principle does a firewall implement with traffic when it does not have a rule that explicitly defines an action fo
NemiM [27]

Answer:

Implicit deny

Explanation:

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

When a firewall encounters a traffic it does not have a rule that explicitly defines an action for that communication, it implicit deny.

7 0
3 years ago
For Subtotals to be useful and accurate, it is important that the data be ________ correctly.
Naddika [18.5K]

Answer:

The correct answer is letter "D": sorted.

Explanation:

In <em>Microsoft Office Excel</em>, subtotals are used to add numerical values from a list of data. Before applying a subtotal, the information must be sorted according to what is intended to be entered. This is the first step and one of the most important so the outcome of the subtotal will reflect correct and accurate information.

8 0
3 years ago
Which scenario describes an effect of cyberbullying?
ASHA 777 [7]
Is it multiple chose or written response?
6 0
3 years ago
Read 2 more answers
Other questions:
  • Who would be a tippee for purposes of insider trading? a. a janitor who gathers information by reading files on corporate counse
    6·1 answer
  • How do i protect my computer from electrical spikes
    14·2 answers
  • What is the local portion of the e-mail address below? <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="
    14·1 answer
  • Who is the CEO of Quora?
    15·1 answer
  • A python programmer is writing a function definition. What syntax should be used?
    6·1 answer
  • (10 points) 5.12. Discuss how the following pairs of scheduling criteria conflict in certain settings. a. CPU utilization (effic
    9·1 answer
  • Plzz help will mark brainliest
    6·1 answer
  • The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the databas
    14·1 answer
  • You want to substitute one word with another throughout your
    13·1 answer
  • How to transfer bookmarks to new computer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!