Answer: The following BEST describes where the administrator should look <em>to find information </em>on the attack to determine if a response <em>must be prepared </em>for the systems:
Explanation:
The n<em>umbered reference system</em> used to catalog revealed vulnerabilities is called the <em>common vulnerability and exposure system</em>.
It is a dictionary of publicly disclosed cybersecurity vulnerabilities and exposures that is free to search, use and incorporate products and services, according to the terms of use.
The CVE list <u>feeds the US National Vulnerability Database</u>.
Answer:
var distance = prompt("How far did you run? in miles");
var time = prompt("How long did you run? in hours");
function calSpeed(miles, hours){
var speed = miles / hours;
console.log(speed,"m/h")
calSpeed(distance, time);
Explanation:
The javascript uses the prompt function to get user inputs for the distance and time variables. The calSpeed function calculates and prints out the speed of the runner with the arguments, distance and time.