1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
3 years ago
14

Mary recently read about a new hacking group that is using advanced tools to break into the database servers of organizations ru

nning public websites. In risk management language, what term is used to describe a hacking group? Group of answer choices Risk Threat Actor Vulnerability Standard
Computers and Technology
1 answer:
Liula [17]3 years ago
8 0

Answer:

Threat

Explanation:

In risk management, the hacking group would be considered a Threat. This is because a threat is anything that is able to analyze, find, and take advantage of vulnerabilities of your system. This applies regardless of the intentions of the group. In this case, the hacking group is using various tools to exploit specific existent vulnerabilities in Mary's companies database servers and would therefore classify as a Threat. In risk management, this is serious and is usually a priority that needs to be dealt with.

You might be interested in
PLEASE HELP How have phones made us spoiled? How have phones made us unhappy?
Ket [755]
Phones have made us spoiled because we have everything at our fingertips. we get what we want when we see something online and we want to get it all we do is ask and most of us receive. phone have made us unhappy mentally and physically because we see how other people have it like richer for instance and we want that and we get sad about weird things because of what we see like other peoples body’s how skinny someone is and how fat someone is it makes us sad because we just want to be like them.
3 0
3 years ago
List the seven basic internal components found in a computer tower
egoroff_w [7]
1. Motherboard (you plug all other components to it)
2. Processor (CPU)
3. Memory (RAM)
4. Graphics card
5. Sound card (sometimes integrated with motherboard)
6. Hard Disk Drive (HDD)
7. Power supply unit
6 0
3 years ago
Read 2 more answers
RDBMSs enforce integrity rules automatically. <br> a. True<br> b. False
IRINA_888 [86]

It is true. RDBMS enforce integrity rules automatically. Integrity rules are automatically enforced by RDBMSs.

Integrity rules are automatically enforced by RDBMSs. Because it contains the design choices made regarding tables and their structures, a data dictionary is frequently referred to as "the database designer's database." Any character or symbol intended for mathematical manipulation may be contained in character data.

Data points that are connected to one another are stored and accessible in a relational database, which is a form of database. The relational model, an easy-to-understand method of representing data in tables, is the foundation of RDBMS. Each table row in a relational database is a record with a distinct ID known as the key.

It is simple to determine the associations between data points because the table's columns carry the properties of the data and each record typically has a value for each property.

To know more about RDBMS click on the link:

brainly.com/question/13326182

#SPJ4

8 0
1 year ago
Date Time Manipulation Exploration If you start from Jan 1st, 1757, and repeatedly add 8 days, until you hit 1800, how many time
zimovet [89]

Answer:

from datetime import datetime, date, timedelta

def count_weekdays(start_date, add_days, stop_year, weekday):

   my_date = start_date

   m = 0  

   while my_date.year != stop_year:  

       my_date = my_date + timedelta(days = add_days)

       if my_date.isoweekday() == weekday:

           m += 1

   return m

date_val = date(1757,1,1)

try:

   date_val = datetime.fromisoformat(input("Enter date in the format yyyy-mm-dd: "))

except ValueError:

   print("Wrong isoformat string")

print(count_weekdays(date_val, 8, 1800, 1))

Explanation:

The datetime package of the python programming language has several time modules like the date, datetime, pytz, timedelta, etc, used to manipulate date and time in documents. The function count_weekdays has four parameters and returns the number of a specified weekday in a period of time.

4 0
3 years ago
Express the following Boolean function using only the NOT and the AND operation
romanna [79]
Here, you go drawn , in paint. Please note that you can simplify further more the circuit by removing any two not following each other. 

3 0
4 years ago
Other questions:
  • What is the central unit of the computer that contains the logic circuitry and carries out the instructions of the computer's pr
    13·1 answer
  • Select the focus questions that emphasizes what is more important: (Select all that apply) a.What needs to be relegated to the b
    8·1 answer
  • When naming a file you should use the _____________ instead of a space in a filename.
    6·1 answer
  • A word processing program would probably be used to: 
    8·1 answer
  • ________________ occur when a system produces incorrect, inconsistent, or duplicate data.
    6·2 answers
  • Write a program that asks the user to input
    11·1 answer
  • An ____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze the co
    10·1 answer
  • A production house needs an operating system that captures saves and generates information within a specific time. Which type of
    11·1 answer
  • You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you i
    13·1 answer
  • Why computer manufacturers constantly releasing faster computers ?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!