1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Komok [63]
3 years ago
13

A __________ is a thorough examination of each aspect of a network to determine how it may be compromised.

Computers and Technology
1 answer:
Lunna [17]3 years ago
3 0

Answer:

A posture assessment. :3

You might be interested in
Variables defined inside a member function of a class have: Block scope. Class or block scope, depending on whether the binary s
Snowcat [4.5K]

Answer:

The answer is "Block scope".

Explanation:

In the programming, the scope is a code, in which it provides the variable ability to exist and not be retrieved beyond variable. In this, the variables could be defined in 3 locations, that can be described as follows:

  • Inside a method or the block, which is also known as a local variable.
  • Outside of the method scope, which is also known as a global variable.
  • Defining parameters for functions known as formal parameters.
8 0
4 years ago
Which of the following is NOT one of the MOST common uses of Twitter?
I am Lyosha [343]
Which of the following is NOT one of the MOST common uses of Twitter? b . Making a business contact.
5 0
3 years ago
What types of disasters might be most likely to affect your community? Type your answers in the space provided. When you are fin
Irina18 [472]
N͟a͟t͟u͟r͟a͟l͟ d͟i͟s͟a͟s͟t͟e͟r͟s͟. Specifically, things such as hurricanes, earthquakes, and tsunamis.
6 0
4 years ago
Read 2 more answers
If you inadvertently rename a file that is associated with certain apps, the apps may not be able to find the file and may not r
ad-work [718]
No.... This wont happen.... The computer only renames the file and dont let those apps go....in easy words We can say that the comp tells the apps to stay here...
7 0
3 years ago
Read 2 more answers
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
3 years ago
Other questions:
  • Is there anyone willing to sign into my google classroom account and help with my work :( i had surgery on monday and have about
    14·2 answers
  • The main purpose of a constructor is to initialize the data members at the moment that an object is created. true or false?
    8·1 answer
  • Sheila is using a process of saving files to her desktop and then renaming them. She is
    13·2 answers
  • Select the organizational skills that can help with
    6·1 answer
  • Seven Features of computer aids design software
    6·1 answer
  • Does anyone have a pdf of the greatest by eddie van der meer????
    15·1 answer
  • Question 8 of 10
    12·1 answer
  • Can someone help me?
    14·1 answer
  • Before entering an intersection, the safest searching process is to search ________. right, left, right, center left, center, ri
    5·1 answer
  • To what extent do you agree with the assertion that “Collection development begins with community analysis”. (Give reasons to bu
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!