1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skelet666 [1.2K]
2 years ago
12

If known vulnerabilities in software are entry points for an attacker, why are the software vulnerabilities not corrected before

the software is released?
Computers and Technology
1 answer:
Evgesh-ka [11]2 years ago
7 0

Answer:

we dont knoqw

Explanation:

You might be interested in
Who is maintain data and time of computer?​
stich3 [128]

Answer:

Explanation:

Data servers like ntp pool dot org give free time data to many Linux computers. Windows computers use the Microsoft Time Servers. So it depends on which computer, its operating system, and which server it chooses to use.

NTP server stands for Network Time Protocol

7 0
3 years ago
________ are often organize commonly used commands into a set of tabs.
White raven [17]

Answer:

Ribbons

Explanation:

Ribbons are used to organize commands into a set of tabs. These tabs change based on the activity done. The settings in each ribbon can be edited, that is, more commands can be added or removed.

For instance, when working on a Microsoft word document and a shape is drawn, a 'format' ribbon automatically appears. This ribbon contains commands on adjusting this shape appropriately.

4 0
3 years ago
What is the purpose of citations?
Elina [12.6K]

Answer: Citiations areto show where you got information from.

Explanation:

6 0
4 years ago
State 2 advantages of laptops over desktop computers
PSYCHO15rus [73]
1. Laptops are portable
2. Laptops take less space
8 0
3 years ago
Read 2 more answers
Write a complete method to create an array of random integers. The method takes in three integer parameters: the array size, the
Nataly [62]
Write a complete method to create an array of random integers. The method takes in three integer parameters: the array size, the lower bound, and the upper bound. The method also takes in a boolean parameter. The method creates and returns an integer array of the specified size that contains random numbers between and lower and upper bound. If the boolean parameter is true, the upper bound is inclusive. If the boolean parameter is false, the upper bound is not inclusive (meaning it is exclusive). Note the lower bound is always inclusive. If any of the parameters are invalid, null is returned.

Hope this helps!
5 0
3 years ago
Other questions:
  • Which information technology job has the lowest predicted 10-year growth? computer programmer software developer computer suppor
    13·1 answer
  • How do you fix this windows 7 screen​
    8·1 answer
  • What product category does the brand fit into?
    7·1 answer
  • Write a recursive method int power(int i, int j which determines teh result of i^j where j>=0
    6·1 answer
  • How to do “Pseudocode” and “FlowChart” in this question ? <br><br> Please Help mee
    9·1 answer
  • You are tasked with leading a project to build a custom software testing tool for client. You have been provided with a set of p
    7·1 answer
  • You wrote a program to allow the user to guess a number. Complete the code to generate a random integer from one to 10.
    8·2 answers
  • Theresa is not sure how nondestructive editing can be helpful in her project. Which of these is accurate about nondestructive ed
    8·1 answer
  • A computer follows step-wise instructions to complete any task which is known as?
    5·1 answer
  • Any computer expert to help me answer this question plz am giving brainliest
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!