The answer is A) a bar graph
        
                    
             
        
        
        
Answer:
c. suffer from indefinite postponement.
Explanation:
Algorithm is a set of rules that are followed in calculations or other problem solving operation by a computer. An algorithm may execute for unknown amount of time and it may suffer indefinite postponement. Algorithm depends on random numbers and it can execute continuously.
 
        
             
        
        
        
Answer:
D
Explanation:
Cause You Have To Decode It To Get To The Memory In The First Place
 
        
             
        
        
        
Answer: True
Explanation: Ushahidi is technology that is responsible for the dividing the work and gaining the outcomes from the public accounting ,publishing, social activities for the instantly making the information available towards the world.
It is a non-profit organization that is responsible for the distribution of any products to clients for the crisis mapping mechanism and gaining the feedback reports.
 
        
             
        
        
        
Answer:
b. Customized auditing.
Explanation:
Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.
There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.
The credentialed scanning provides baseline and customised auditing features.