1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
10

Should the security researcher have published exploit code that affects every version of Windows and cannot be patched

Computers and Technology
1 answer:
grandymaker [24]3 years ago
8 0

Answer:

No.

Explanation:

This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.

The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.

You might be interested in
Match terms in the first column with the order descriptions in column two.
vichka [17]

Answer:

2 to A

1 to C

3 to B

Explanation:

4 0
3 years ago
If a person communicates indirectly and attaches little value to
Mars2501 [29]

Answer: B. Low-context

5 0
3 years ago
Which is a monthly cost associated with renting a house?
Evgesh-ka [11]
The answer is a. utility bills
8 0
3 years ago
Read 2 more answers
What is an analog computer?<br>​
tigry1 [53]

Answer:

It is a computer that is used to process analog data.

7 0
3 years ago
Read 2 more answers
Explain why the computer is powerful working tool???​
notsponge [240]

Answer:

here ya go

Explanation:

A computer is a powerful tool because it is able to perform the information processing cycle operations (input, process, output, and storage) with amazing speed, reliability, and accuracy; store huge amounts of data and information; and communicate with other computers.

8 0
3 years ago
Other questions:
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • The data in a data warehouse have which of the following characteristics?
    13·1 answer
  • Given the following class import java.util.ArrayList; public class RectangleTester { public static void main(String[ ] args) { A
    7·1 answer
  • Which file extension indicates that a file is an Adobe Acrobat document?
    13·1 answer
  • Smoking is a REALLY good example of a choice that can have negative effects on the smoker's health, AND the well-being of others
    9·1 answer
  • What are some strategies that you can use when you debug a program?
    11·1 answer
  • Besides the Computer Inventory and Maintenance form, what other documentation should you keep on each computer? How might you st
    8·1 answer
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • Busco a talcotalco38
    14·2 answers
  • When passing a list of parameters to a stored procedure by name, you can omit optional parameters by:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!