1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
4 years ago
9

A hacker exploited a bug in the software and triggered unintended behavior which led to the system being compromised by running

vulnerable software. Which of these helps to fix these types of vulnerabilities?
Computers and Technology
1 answer:
Tanzania [10]4 years ago
3 0

Answer:

Software patch management

Explanation:

An intruder reproduced an application bug and activated unexpected actions that resulted in vulnerable applications running into the computer being infected. Software patch management tools support to repair bugs of such kinds.

Patch management is the program that allows users to procure, check, and configure patches against current software resources on a device, allowing computers to remain upgraded on new patches, as well as to decide that patches are acceptable.

You might be interested in
In computer science how can you define "copyright, designs and patents act 1988"?​
Natali5045456 [20]

Answer:

:)

Explanation:

Copyright Designs and Patents Act

The Copyright Designs and Patents Act (1988) gives creators of digital media the rights to control how their work is used and distributed. ...

Anything which you design or code is automatically copyrighted and may not be copied without your permission, as the digital creator.

5 0
3 years ago
On what type of network can you rent things such as cars, tools, and rooms?
NeTakaya

Answer:

Sharing economy network

4 0
2 years ago
Given an alphanumeric string made up of digits and lower case ASCII characters only, find the sum of all the digit characters in
lara31 [8.8K]

Answer:

C++.

Explanation:

#include <iostream>

#include <string>

using namespace std;

////////////////////////////////////////////////////////////////////////////

int sumDigits(string alphanumeric) {

   if (alphanumeric.length() == 1) {

       if ((int(alphanumeric[0]) >= 48) && (int(alphanumeric[0]) <= 57)) {

           cout<<int(alphanumeric[0]) - 48<<endl;

           return (int(alphanumeric[0]) - 48);

       }

       else

           return 0;

   }

   else {

       if ((int(alphanumeric[0]) >= 48) && (int(alphanumeric[0]) <= 57)) {

           cout<<int(alphanumeric[0]) - 48<<endl;

           return int(alphanumeric[0]) - 48 + sumDigits(alphanumeric.substr(1, alphanumeric.length()-1));

       }

       else

           return 0 + sumDigits(alphanumeric.substr(1, alphanumeric.length()-1));

   }

}

////////////////////////////////////////////////////////////////////////////

int main() {

   cout<<"Sum: "<<sumDigits("ab1c2d3e54");

   return 0;

}

3 0
3 years ago
Python
elixir [45]

print("welcome to the bill calculator")

minutes = float(input("number of minutes you used: "))

data = float(input("the amount of data you used in GB: "))

print("your basic plan costs $39.99 per month")

mcost = (minutes - 450) * .45

print("you will be charged " +  str(mcost) + " for the minutes you used")

print("the monthly data fee is $30.00")

dcost = (data - 3) * 10

print("you will be charged " + str(dcost) + " for the extra data you used")

total = mcost + dcost + 69.99

print("your total bill is " + str(total))

the 20 value your teacher gave may be incorrect, bc 4.2-3*10 = 12 not 20, making the total 109.89

4 0
3 years ago
Adnan also wants to add a photograph of a bridge. It is on another PowerPoint presentation that is open in a different window on
iragen [17]

Answer:

C

Explanation:

On edg

3 0
3 years ago
Read 2 more answers
Other questions:
  • A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is
    9·1 answer
  • How to find something in the cloud?
    8·1 answer
  • In Windows, the log that stores events from a single application or component rather than events that might have system wide imp
    14·1 answer
  • AW Computing uses a private sharing model for cases. A select group of five users need read/write access to all cases with a spe
    8·1 answer
  • Which of the following is not a characteristic of a motorcycle?
    6·1 answer
  • What are the first steps in creating a business document
    6·2 answers
  • How many of yall are willing too sub to my channel called "Space Juice" with around 200 subs?!​
    6·1 answer
  • Full form of DVX please answer fast ​
    9·1 answer
  • How can i get games on my chromebook after my school has blocked almost everything... even zoom!
    14·1 answer
  • After reviewing device security you learn that a malicious user in an airport
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!