1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
3 years ago
14

While developing a network application, a programmer adds functionally that allows her to access the running program without aut

hentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe
Computers and Technology
1 answer:
Ierofanga [76]3 years ago
5 0

Answer:

Backdoor

Explanation:

Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level

The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts

You might be interested in
______ is a certification program that recognizes sustainable building practices and strategies. Question 1 options: A) Brundtla
Pani-rosa [81]

Answer:

(C) LEED

Explanation:

LEED certification is a recognized worldwide as symbol of viability achievement.

(Leadership in Energy and Environmental Design(LEED):- It is the most popular and widely used rating system in the world for green buildings. Available for almost all building project types, including new constructions to interior fit-outs.

8 0
3 years ago
I need help with this chart !
Alex17521 [72]

Not in high school but i tried my best to help

(Sorry that its blurry )

3 0
3 years ago
// This pseudocode segment is intended to compute and display
Finger [1]

The pseudocode to calculate the average of the test scores until the user enters a negative input serves as a prototype of the actual program

<h3>The errors in the pseudocode</h3>

The errors in the pseudocode include:

  • Inclusion of unusable segments
  • Incorrect variables
  • Incorrect loops

<h3>The correct pseudocode</h3>

The correct pseudocode where all errors are corrected and the unusable segments are removed is as follows:

start

Declarations

     num test1

     num test2

     num test3

     num average

output "Enter score for test 1 or a negative number to quit"

input test1

while test1 >= 0

     output "Enter score for test 2"

     input test2

     output "Enter score for test 3"

     input test3

     average = (test1 + test2 + test3) / 3

     output "Average is ", average

     output "Enter score for test 1 or a negative number to quit"

     input test1

endwhile

output "End of program"

stop

Read more about pseudocodes at:

brainly.com/question/11623795

3 0
2 years ago
In this exercise, your function will receive 2 parameters, the name of a text file, and a list of strings. The function will wri
diamong [38]

Answer:

# the function is defined

# it takes 2 arguments: filename and list of string

def solution(filename, listOfString):

   # the file is opened in write mode

   # so that we can write to it

   with open(filename, 'w') as file_object:

       # we loop through the entire list of string

       # this looping help us know what to write to the file

       for each_string in listOfString:

           # if the length of the string is less than 4

           # we write 'x' with a new line

           if len(each_string) < 4:

               file_object.write("x\n")

           # else if the length of the string is greater than equals 4

           # we write the fourth character

           # and also add new line

           else:

               file_object.write(each_string[3])

               file_object.write("\n")

Explanation:

The function is written in Python. It takes two argument; filename and list of string.

It opens the file in write mode and then loop through the list of string. During the loop, we know what to write to the file.

In the length of a string is less than 4; we write 'x' else we write the fourth character in the string. The fourth character has an index of 3 because string uses zero index counting like a string. Starting from zero; 0, 1, 2, 3, 4... the fourth character has an index of 3.

5 0
3 years ago
)In a vector implementation of a stack ADT, you add an entry to the top of a stack using which vector method?
kotykmax [81]

Answer:

B.add.

Explanation:

boolean add(element)

The add method in java inserts an element in the vector.It's return type is Boolean it returns true if the element is successfully inserted in the vector and false if the operation is unsuccessful.There is no Push operation in vector.Hence we conclude that the answer is add.

8 0
3 years ago
Other questions:
  • Which best describes inserting a table using the Table Gallery
    10·2 answers
  • Which of the following things must you do if you are parked on a rural highway?
    8·1 answer
  • The phrase has become an Internet buzz word. It refers to a top-level domain name for communications organizations.TrueFalse
    12·1 answer
  • Explain and give examples of at least two search engines.
    9·1 answer
  • AP CSP - Write a program that takes 10 random numbers from 1 to 12 inclusively and averages them together.
    8·1 answer
  • Expain the application areas of ICT in education sector and E-commerce​
    12·1 answer
  • Hewo everyone look at me I look ugly don't I<br>​
    6·2 answers
  • when files on storage are scattered throughout different disks or different parts of a disk, what is it called
    10·1 answer
  • A(n) _____ is a computerized system by which subscribers are able to communicate to all other subscribers by sending a transmiss
    5·1 answer
  • Create a timeline of the evolution of computers and their impact on society
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!