1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
3 years ago
12

¿los equipos de computo pueden ser vulnerables?

Computers and Technology
1 answer:
ss7ja [257]3 years ago
6 0

Answer:

Si puede

Explanation: Yes it can

You might be interested in
A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the netwo
Leno4ka [110]

Answer:

D

Explanation:

A zero-day vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network. An exploit directed at a zero-day vulnerability is called a zero-day exploit, or zero-day attack.

5 0
3 years ago
Who has the wrong anwser
Lynna [10]

Answer:

umm?

Explanation:

8 0
3 years ago
Read 2 more answers
A _____ is a modeling tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex
Shalnov [3]

A <em>"DATA FLOW DIAGRAM"</em> is a modeling tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex process into simpler, more manageable, and more understandable subprocesses

8 0
4 years ago
When an Ethernet NIC has been configured by the OS to use half-duplex, the transmit pair of the twisted-pair cable usestransmiss
zzz [600]

Answer:

C

Explanation:

When an Ethernet NIC has been configured by the OS to use half-duplex, the transmit pair of the cable uses SIMPLEX transmissions, the receive pair in the SIMPLEX transmissions, and the twisted pair cable uses HALF-DUPLEX transmissions.

Cheers

7 0
3 years ago
What command displays detail information about the OSPF interfaces, including the authentication method?
statuscvo [17]
<span>The answer is Show IP OSPF interface

Hope this helped :)</span>
8 0
3 years ago
Read 2 more answers
Other questions:
  • Food is shipped thousands of miles throughout our country using various types of transportation such as trucks, planes, and boat
    10·1 answer
  • The main differences between laptops and desktop computers other than size and portability.
    14·1 answer
  • There was an airplane crash, every single person on board died, but yet two people survived. How is this possible?
    5·2 answers
  • Storing a value in a variable<br> Exponent<br> Variable<br> Assignment<br> Operator
    13·1 answer
  • The blue bar across the top of the screen informs you of the Screen Title, or what step you are on.
    5·1 answer
  • Decision making at the executive or strategic level requires business intelligence and knowledge to support the uncertainty and
    12·1 answer
  • A _______ template is used to maintain consistency in terms of margins and page numbers .
    6·1 answer
  • What do financial planning skills ultimately enable an individual to do?
    10·2 answers
  • Who innovated an aeroplane? ​
    5·1 answer
  • he degree of operating leverage is equal to: Group of answer choices FC / OCF. VC / OCF. 1 FC / OCF. 1 VC / OCF. 1 Picture FC /
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!