1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liq [111]
3 years ago
10

A primary mailing list for new vulnerabilities, called simply __________, provides time-sensitive coverage of emerging vulnerabi

lities, documenting how they are exploited and reporting on how to remediate them. Individuals can register for the flagship mailing list or any one of the entire family of its mailing lists.
1. Bug
2. Bugfix
3. Buglist
4. Bugtraq
Computers and Technology
1 answer:
wariber [46]3 years ago
8 0

Answer:

The answer is 4. Bugtraq

Explanation:

You might be interested in
The first window displayed when you install opensuse is the ____ window.
Jlenok [28]
Is the <span>Boot Options window.</span>
3 0
3 years ago
Match each operating system drawback to its respective operating system.
Lena [83]

Answer:

Microsoft Windows - More susceptible to viruses

Linux - Limited support system

Apple - Fewer compatible applications

Explanation:

Generally windows is more susceptible to viruses.

Linux is open source meaning it's up to the community to help you.

Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.

4 0
3 years ago
Read 2 more answers
Deb needs to add borders on the cells and around the table she has inserted into her Word document.
slavikrds [6]

Answer:

Design tab

Explanation:

  1. Select the call or table that you will like to use
  2. Then select the <em>design tab</em>
  3. In the group <em>page background</em> select <em>Page Borders</em>
  4. There you will have multiple choses for where you want your border
  5. You can even customize your border by pressing <em>Custom Border </em>at the bottom of the list for <em>Page Borders</em>
4 0
3 years ago
Read 2 more answers
How can you stay safe on the Internet? Check all that apply.
Harlamova29_29 [7]

Answer:

all of the above

Explanation:

7 0
3 years ago
Read 2 more answers
What is another name for “low-angle lighting”?
lys-0071 [83]
<span>another name for “low-angle lighting” is "</span>under-lighting"
4 0
3 years ago
Other questions:
  • Which of the following lists contains the five essential elements of a computer?
    5·1 answer
  • Someone please help fast! I’m taking the test rn and I don’t understand this!!!!!!
    15·1 answer
  • Data that are collected on large populations of individuals and stored in databases are referred to as _____.
    15·1 answer
  • What are the three parts of a Function
    12·1 answer
  • Write regular expressions for the following languages:
    5·1 answer
  • You’ve found the file you’ll be working with. Next, you decide to move the file to your Desktop so it will be easier to get to i
    14·1 answer
  • Which of the following is not System Software?
    5·1 answer
  • A user attempts to log in to a Windows PC, but the computer returns to the login screen after entering the correct username and
    12·1 answer
  • What is the best wi-fi name you have ever seen?
    10·1 answer
  • Which of the following is not related to text formatting?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!