1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scZoUnD [109]
3 years ago
7

Yo need help can someone plz help

Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
5 0
Boolean search would be the answer
You might be interested in
___________ is some danger that can exploit a vulnerability.
andreyandreev [35.5K]

<u>Threat </u>is some danger that can exploit a vulnerability.

<h3>What is Threat?</h3>

Threat  is seen as Anything that can be able to take advantage of a vulnerability, intentionally as well as  accidentally, and take or damage, the  asset of a person.

Note that a threat is that which a person or firm is protect against and Vulnerability is seen as Weaknesses.

Therefore, <u>Threat </u>is some danger that can exploit a vulnerability.

Learn more about vulnerability from

brainly.com/question/25633298

#SPJ1

8 0
2 years ago
Most computers include a network card designed to connect a computer to the net using standard telephone service. True or False?
navik [9.2K]
I believe the answer is false
6 0
3 years ago
A(n) ______ database stores data in tables that consist of rows and columns.
melisa1 [442]
The answer is a spreadsheet.
4 0
4 years ago
Read 2 more answers
Plagiarism occurs when writers
Law Incorporation [45]
The answer is A. <span>Use others' ideas and writing as their own </span>
7 0
4 years ago
Read 2 more answers
Why do you think that backlighting is used in so much of Sheldon’s photography?
Marianna [84]

Answer:

So you see the person better

Explanation:

4 0
4 years ago
Read 2 more answers
Other questions:
  • Which data type stores images and audio visual clips?
    9·2 answers
  • NEED ASAP!!
    14·1 answer
  • Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are con
    10·1 answer
  • The first step in transforming an extended e-r model into a relational database design is to
    14·1 answer
  • Write two recursive versions of the function minInArray. The function will be given a sequence of elements and should return the
    8·1 answer
  • Why is an array like a list? How do you identify and find elements in an array? Explain the purpose of a try-catch block and giv
    5·1 answer
  • The function of network switch is to _____.
    5·1 answer
  • Emily is deciding whether to buy the same designer jacket her friends have. The jacket is much more expensive than a similar one
    8·2 answers
  • When creating a report,you can mske groups and subgroups by?​
    5·1 answer
  • What does dr. sanford say about the comparison of the genome with a computer program?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!