Discovery of any vulnerability in a software program can potentially be sold to the government: True.
<h3>What is vulnerability?</h3>
Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.
This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.
Read more on vulnerability here: brainly.com/question/25813524
#SPJ1
Based on the information given the data should be stored in flash memory.
<h3>
What is flash memory:</h3>
Flash memory is a memory storage space that is used to store data or information on a computer.
Flash memory is vital as it help to retain information or data that are stored on a computer after power is removed which inturn means that store data can be retrieve when needed.
Example of flash memory are:
Inconclusion the data should be stored in flash memory.
Learn more about flash memory here:brainly.com/question/6835146
The page setup of a worksheet defines its appearance. In page setup there are also many things like what font we are using, margins, number of cells etc.
Worksheets are used to enter, calculate and analyze data in
numbers and text, and a collection of worksheets is known as workbook. we can create worksheets in Microsoft Excel.
<span> </span>
It is a code for representing 128 English characters as numbers, with each letter assigned a number from 0 to 127. For example, the ASCII code for uppercase M is 77. Most computers use ASCII codes to represent text, which makes it possible to transfer data from one computer to another.
Answer:
A closed port that can not receive request from authorized users.
Explanation:
Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.
Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.
DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.