1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Furkat [3]
3 years ago
6

An example of a(n) _____ is a software defect in an operating system that allows an unauthorized user to gain access to a comput

er without a password. threat agent asset exploit (AE) vulnerability threat
Computers and Technology
1 answer:
mel-nik [20]3 years ago
7 0

Answer:

C. Vulnerability

Explanation:

Vulnerabilities

Vulnerabilities involve bugs in software. <em>Bugs</em> are coding errors that cause the system to make an unwanted action. All software has bugs of one form or another. Some bugs cause the system to crash, some cause connectivity to fail, some do not let a person to log in, and some cause printing not to work properly.  Some bugs create information leakage or elevate user privileges or grant otherwise unauthorised access. These are security vulnerabilities. If all software has bugs and it is inevitable that some bugs will be security vulnerabilities, all software will have security vulnerabilities

You might be interested in
Steve is happy today but he ____ yesterday​
suter [353]

steve is happy today but he wasn't yesterday

3 0
3 years ago
Read 2 more answers
What do we call the two parts of lift that goes down a mine
Blababa [14]
The sheave wheel is a pulley wheel that sits above the mine shaft. The hoist cable passes over the sheave wheel and then down the shaft of the mine.
(copied from google)
4 0
3 years ago
Read 2 more answers
A production house needs an operating system that captures, saves, and generates information within a specific time. Which type
bearhunter [10]
Windows and linux are best in my opinion! Linux is not used by many people but a lot of apps can't be used for linux so best is to use windows. But Mac is not bad too. Hope I helped and have a nice day!
4 0
3 years ago
What is a major benefit of working with a ready-to-use cloud-based Artificial Intelligence (AI) vendor service?
Gwar [14]

Answer:

Follows are the solution to this question:

Explanation:

The simple economy is the greatest incentive to join AI and the cloud. The cloud framework enables consumers to buy processing only after traditional installation costs are eradicated. Each company could use these earnings for the advancement of the AI using this model, that's why the dedicated infrastructure is a key advantage of continuing to work via artificial intelligence (AI) cloud-service fully prepared platform.

4 0
3 years ago
In Python, if var1 = “Happy” and var2= “Birthday” and var3 = (var1+var2) *2, then var3 stores the string
-Dominant- [34]

Answer:

A

Explanation:

var3 is happy + birthday, ×2

l.e happy birthday happy birthday

3 0
4 years ago
Other questions:
  • If you ping a device, you are using the______protocol
    11·1 answer
  • Select the correct answer. What has enabled engineers to design slim and sleek television sets? A. using Nipkow disks B. increas
    7·1 answer
  • Some commands listed in a menu cannot be selected.<br><br><br> True or False
    13·2 answers
  • Write a function in Java to implement the following logic:
    13·1 answer
  • What function is used to return the results in column D?
    11·1 answer
  • What is the value of the variable result after these lines of code are executed? &gt;&gt;&gt; a = 5 &gt;&gt;&gt; b = 2 &gt;&gt;&
    8·2 answers
  • WHAT ARE SOME PROS AND CONS OF HYDROGEN FUELL CELLS
    11·1 answer
  • Task 2
    6·1 answer
  • 84 104 101 32 97 110 115 119 101 114 32 105 115 32 53 48 33 There's a way to make this meaningful; find it!
    14·1 answer
  • Why is technology bad for you
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!