1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
3 years ago
14

While developing a network application, a programmer adds functionally that allows her to access the running program without aut

hentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe
Computers and Technology
1 answer:
Ierofanga [76]3 years ago
5 0

Answer:

Backdoor

Explanation:

Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level

The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts

You might be interested in
It is illegal to have __________ emergency lights on your vehicle.
Alexxx [7]

Answer is A. Red and Blue

This because these are the same color of emergency lights that are used on Emergency vehicles like ambulances, police cars, fire trucks, etc. We wouldn't want normal citizens confusing drivers with police officers in case of an actual emergency.

8 0
3 years ago
Read 2 more answers
Giving away free brainliest
Leni [432]

Answer:

thx

Explanation:

lol

4 0
2 years ago
Read 2 more answers
Which statement is true about the elements of the interface of a presentation program?
Anton [14]
<span>C. Rulers indicate the margins, tabs, and indents in a presentation slide.
</span>
6 0
3 years ago
Read 2 more answers
Identify a true statement about decision support systems (DSSs).
Zolol [24]

Answer:

a. facilitate improvements but do not necessarily cause them.

Explanation:

Decision Support Systems are interactive Information systems that assist  decision makers in coming up with strategies that help the organisation achieve its goals .The model base of the DSS uses mathematical and statistical models to analyse information then it generates reports and suggest possible solutions that can be implemented .The system is capable of giving a specific solution and some even allow the decision makers to give input before suggesting the most applicable solution.The effectiveness of a DSS is equally as important as its efficiency .The DSS unlike the conventional decision-making process should be able to analyse information effectively and come up with solutions in the shortest possible time frame.

7 0
4 years ago
In the formula =SUM(A6:A9), which of the following best describes A6:A9
lianna [129]

Arguments are indeed the values used by <em>functions to perform computations</em>, and the further discussion can be defined as follows:

  • <em>Functions</em> in spreadsheet programs including Excel Sheets are simply built-in formulas that perform predefined calculations.
  • In this, the majority of these functions require data to be supplied, either by the user or from another source, to deliver a result.
  • It is a real value that is provided to the function, as well as the parameters, are initialized to the value of the arguments supplied.
  • In this question, a method "SUM(A6:A9)" is declared that takes value from A6 to A9, in its parameter(Argument) that <em>adds value from</em>.  

Therefore, the final answer is "Option A".

Learn more:

brainly.com/question/12269471

6 0
3 years ago
Read 2 more answers
Other questions:
  • Is main memory fast or slow?
    9·1 answer
  • The operation:
    8·1 answer
  • )what item is at the front of the list after these statements are executed?
    15·1 answer
  • What formula would you enter to add the values in cells b4, b5, and b6?
    10·1 answer
  • Typical business cards in the U.S. are _____.
    5·1 answer
  • When you're working with a word processing document and you press the del key, what happens?
    6·2 answers
  • The ELECTRONIC COMMUNICATIONS PRIVACY ACT prohibits unauthorized eavesdropping by all persons, businesses, and the government.
    5·1 answer
  • Why does my inbox keep getting notifications and then disappearing?
    15·2 answers
  • The _____ feature will mark all changes made to a document for others to review at a later time.
    13·1 answer
  • Identify the correct answer in each item. Write your answer on the blank provided before
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!