1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
3 years ago
14

While developing a network application, a programmer adds functionally that allows her to access the running program without aut

hentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe
Computers and Technology
1 answer:
Ierofanga [76]3 years ago
5 0

Answer:

Backdoor

Explanation:

Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level

The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts

You might be interested in
A health care provider approaches Accenture to help them increase their efficiency through an advanced data science platform.Wha
Vladimir79 [104]

Accelerating output and hence, growth of an enterprise is one of the core functions of Accenture. Hence, the first step to be taken by Accenture is to design an <em>Enterprise analytic strategy assessment</em><em>.</em><em> </em>

  • Data science leverages the power of collected data combined with simple and complex machine learning algorithm in other to draw pattern and trends from data.

  • Since, the healthcare provider is a large enterprise, the first step that should be followed would be to design a strategy to the assess the data available to the organization or enterprise

Hence, the first step is to develop an <em>enterprise analytic strategy assessment</em><em>.</em><em> </em>

<em>Learn</em><em> </em><em>more</em><em> </em><em>:</em><em> </em><em>brainly.com/question/25602226</em>

3 0
3 years ago
Commercial technical data and commercial software:_________.
LUCKY_DIMON [66]

Answer:

Must be available to consumers to qualify as commercial.

Explanation:

According to Defense Federal Acquisition Regulation Supplement and Federal Acquisition Regulation Supplement technical data and software belongs to the authentic developer or the direct beneficient otherwise, if made available to consumers it will then be regarded as the "Commercial technical data and commercial software."

Hence, the right answer to the question is option C "Must be available to consumers to qualify as commercial."

4 0
3 years ago
Which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data
Katena32 [7]

Answer:

Data management.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a software that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

In conclusion, data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

7 0
3 years ago
Which PlayStation was the first to allow connection between it and computer network
Bezzdna [24]

If you're talking about connecting to the internet internet, it would be the PS2. You could buy an adapter for an ethernet cable to allow for online play.

4 0
3 years ago
2- There are many different design parameters that are important to a cache’s overall performance. Below are listed parameters f
katen-ka-za [31]

Answer:

1. 2588672 bits

2. 4308992 bits

3. The larger the data size of the cache, the larger the area of ​​memory you will need to "search" making the access time and performance slower than the a cache with a smaller data size.

Explanation:

1. Number of bits in the first cache

Using the formula: (2^index bits) * (valid bits + tag bits + (data bits * 2^offset bits))

total bits = 2^15 (1+14+(32*2^1)) = 2588672 bits

2. Number of bits in the Cache with 16 word blocks

Using the formula: (2^index bits) * (valid bits + tag bits + (data bits * 2^offset bits))

total bits = 2^13(1 +13+(32*2^4)) = 4308992 bits

3. Caches are used to help achieve good performance with slow main memories. However, due to architectural limitations of cache, larger data size of cache are not as effective than the smaller data size. A larger cache will have a lower miss rate and a higher delay. The larger the data size of the cache, the larger the area of ​​memory you will need to "search" making the access time and performance slower than the a cache with a smaller data size.

5 0
3 years ago
Other questions:
  • Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
    10·1 answer
  • Using the merge method of the Map interface, which statement correctly updates the salesTotalByDept map of type Map to update th
    7·1 answer
  • what properties are associated with all Microsoft Office files and include author, title, and subject
    5·1 answer
  • What was the impact of the rise of the Japanese auto industry and the semiconductor industry in south eastern​ Asia? A. It incre
    13·1 answer
  • A user calls the help line and ask for some help installing a new keyboard. He isn't sure how to plug the keyboard into the comp
    15·1 answer
  • _____ can render data useless to unauthorized users who might have violated some of the database security layers.
    7·1 answer
  • Define the terms of data and information .​
    6·1 answer
  • Why is science, mathematics, and technology different from engineering?
    15·1 answer
  • Describa la clasificación de los recursos educativos digitales abiertos. vea este video, para hacer eso
    11·2 answers
  • PLEASE HELP ITS CODING AND I INCLUDED A SCREENSHOT OF WHAT TO DO
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!