1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
3 years ago
14

While developing a network application, a programmer adds functionally that allows her to access the running program without aut

hentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. Which type of security weakness does this describe
Computers and Technology
1 answer:
Ierofanga [76]3 years ago
5 0

Answer:

Backdoor

Explanation:

Backdoors are a method of covertly allows a users that are either authorized or unauthorized to bypass the measures put in place for security and obtain access to a network, computer system, embedded system or software, at a high level known as root access level

The uses of backdoors includes computer remote access security (access to remotely obtain passwords or delete hard drive data), and having access to a cryptographic system stored plain texts

You might be interested in
True or False? A supervisory control and data acquisition (SCADA) device is a computer that controls motors, valves, and other d
Gekata [30.6K]

Answer:

The correct answer to the following question will be "True".

Explanation:

SCADA is a hardware and software elements program that permits industrial enterprises to:

  • Agricultural processes are regulated locally or globally.
  • The human-machine interaction program specifically interfaces with equipment such as cameras, switches, generators, motors and much more.
  • Track, store, and process the data in real-time.

Therefore, the given statement is true.

4 0
3 years ago
What programs are most likely affected by a macro virus?
Iteru [2.4K]

Answer:

Macro viruses usually infect Microsoft Office apps like Word and Excel.

Explanation:

7 0
2 years ago
What is output by the following program?
zubka84 [21]

The output of the program is 10.

def mult(a, b = 1, c = 1):

    print(a * b * c)

mult(2, 5)

<h3>Code explanation:</h3>

The code is written in python.

  • A function is declared named "multi" and the function has parameter of a, b and c. The default value of b and c are 1.
  • Locally, we print the product of a, b and c.
  • Finally, we call the function with its inputted parameters. Notice we only had 2 argument while calling the function. This simply implies that the default value for c is used. Therefore,  we will have 2 × 5 × 1 = 10

learn more on python here: brainly.com/question/22796383

8 0
2 years ago
$2,000 is deposited into a savings account that receives 4% annual interest . How long will it take for the amount of money in t
anzhelika [568]
The answer would be 25 years is what it would take for it to double 2000x.04=80 . The interest would add up to 80 for 1 year. Multiple 80 by 25 and you get 2000.
8 0
3 years ago
Define the following terms: data model, database schema, database state, internal schema, conceptual schema, external schema, da
PolarNik [594]

Answer:

Following are the solution to the given terms:

Explanation:

Data Model: A set of concepts that are ideal for describing the layout, computational tools, relations, semantics, constraints on accuracy.

Database Scheme: It is also known as the overall design of the database.

Database State: It is the data in the database at a particular moment in time.

Internal Schema: The physical structure of the database is defined.

Conceptual Schema: It hides the details of physical storage.

External Schema: It describes the part of the database the user group sees. In other words, we can say that it is a view of the database.

Data Independence: The ability to modify the schema at a single level while modifying the schema at a higher level is often recognized.

DDL: It stands for the Data Definition Language, which is used by DBA and dev use for creating With particular scheme.  

DML: It refers to the Data Manipulation Language, which is used to manipulate, add, recover, insert, remove, and alter data.  

SDL: It stands for the storage definition language, in which the internal schema of the database is applied for storage description.  

VDL: The view definition language specifies the user to view and mapping their conceptual schema.

Query Language: It is just an independent, dynamic, high-level dialect used during manipulation.  

Host Language: It is also the machine language, that would be incorporated into the general programming language by low-level data handling commands.  

Data sublanguage: It uses for embedding in the last language.  

Database Utility: It is a program, which helps to handle the database with DBA's modules.  

Catalog: The entire structure and constraints of the database is defined.

client/server architecture: The design of the database server system that device usability: model user, model server (landless storage) software Government computer design in which many users (remote processors) demand a central server to receive service (host computer).  

Three-tier architecture: It is the application, data, user interface.

n-tier architecture: multiple levels. The nth level must only be able to handle the n+1 application and transmit it to the n-1 point.

3 0
3 years ago
Other questions:
  • A drivers touches a cars steering wheel on a hot day which term refers to the way heat is transferredd to the drivers hand
    6·2 answers
  • divide the input array into thirds (rather than halves), recursively sort each third, and finally combine the results using a th
    15·1 answer
  • Which skill refers to the ability to visualize and implement possible business solutions to problems?
    6·1 answer
  • You need to find out how much ram is installed in a system. what command do you execute to launch the system information utility
    12·1 answer
  • What happens if the user sysadmin invokes the mail command interface and there are no unread mail messages?
    13·1 answer
  • When a hoverboard's battery dies, does the hoverboard battery life get impacted the next time the battery is full?
    12·1 answer
  • 1. Discuss the pros and cons of human-computer interaction technology?
    6·1 answer
  • Which of these is an example of input?
    6·1 answer
  • Identify and explain five areas where computers are used to process <br> data
    12·1 answer
  • Resource _____ let you view, manage, and automate tasks on multiple aws resources at a time.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!