1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nuetrik [128]
3 years ago
13

One vulnerability that makes computers susceptible to walmare is:

Computers and Technology
2 answers:
katen-ka-za [31]3 years ago
7 0
C using old versions of software
sammy [17]3 years ago
6 0
C hope it’s right :))) !
You might be interested in
Match the function to its purpose.
schepotkina [342]

Answer:

  • Median :Calculates the average of the two  numbers in the middle of a set of even count of numbers.
  • Mode : This function shows the most frequently  occurring number in a set of numbers
  • Standard deviation : You can see how far each number  varies, on average, from the average  value of the list
  • Rank : With this function, you can determine  the position of a number in an  unarranged array or set.

Explanation:

8 0
4 years ago
If you cannot find a template on your computer that was appropriate for your task, what should you do?
DanielleElmas [232]

Answer:

The correct option for this question is File.

Explanation:

5 0
3 years ago
What is the key difference between UDP and TCP protocols in TCP/IP reference model?
g100num [7]

Answer:

TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol. The speed for TCP is slower while the speed of UDP is faster.

5 0
2 years ago
Read 2 more answers
PLEASE ANSWER ASAP
kompoz [17]
D, an acrostic is a "a poem, word puzzle, or other composition in which certain letters in each line form a word or words."
3 0
3 years ago
Read 2 more answers
Can you guys help me with this coding assignments?
kicyunya [14]

Explanation:

x ==50

while x< 100;

x -= 1

8 0
3 years ago
Other questions:
  • Why do computers need to periodically check the dns for websites you have already visited? enter your answer here?
    15·1 answer
  • Who usually signs a collection letter?
    15·2 answers
  • Find an element inside a div using javascript
    12·1 answer
  • Where do you access the status report of an assigned task that is open?
    12·2 answers
  • How can I unblock Brainly?
    12·2 answers
  • _________________ component defines the correct granularity for access controls and oversees the relationships between identitie
    13·1 answer
  • What is the grade, as a percentage with two digits after the decimal point, obtained when you graded this 101-question multiple-
    13·1 answer
  • Write any three primary activities of a program??​
    12·1 answer
  • Problem 8 - Recursive Divisible by 3 and 5 Complete the divBy3And5 function which accepts a list of integers. The function shoul
    13·1 answer
  • With social media presence growing why is cyberbullying at an all time high
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!