1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
3 years ago
9

A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as a

/an ____ .
Computers and Technology
1 answer:
Anna11 [10]3 years ago
3 0

Answer: vulnerability

Explanation:

You might be interested in
The Internet began when a large company wanted to sell products online
aalyn [17]
No!The internet began in the 1950s when the US government was trying to use connected computers to compete with the Soviet Union's Sputnik. Hope this helps :)
6 0
3 years ago
What are the three main sub-sectors in the IT-BPM industry?<br>IT class 9​
sergeinik [125]

Answer:

Business Process Managment.

Software Products.

Engineering Research and Development

8 0
3 years ago
Thanks to technology, long gone are the days of the photo finish, which is now replaced by slow motion cameras.
amid [387]

Answer:

True

Explanation:

7 0
4 years ago
a ____ is a feature that finds a list potential design problems associated with your document brainly.com
andrezito [222]
1. eliminating some diseases
2. improving certain species (like growing bigger apples)

8 0
3 years ago
Every dimensional model is composed of one ---------tableo Centralo Parallelo Verticalo Horizontal
gulaghasi [49]

Answer: Central

Explanation: Dimensional model is the model that is created for the requirement of analysis of a particular business such as data warehouse. It is usually referred as the fact table as well.  Dimensional model has one major table known as central table and multi-part tables connected with it.The combination of the smaller tables are known as the dimension tables also.

8 0
4 years ago
Other questions:
  • The Modified Greiss chemical test is used to detect the presence of what chemicals that indicate muzzle to target distance?
    11·1 answer
  • A ____ in Excel is like a notebook.
    8·1 answer
  • What is the slide sorter view used for?
    11·1 answer
  • What is logical memory?
    15·1 answer
  • Suction cup-type headlamp aiming equipment may be used on:
    11·1 answer
  • Weak Induction
    8·1 answer
  • To ensure rapid recovery and security of data, backup data should be ________.
    11·1 answer
  • What is the difference between a hard drive and a tape drive? Hard drives use magnetic heads and are fast to write data; tape dr
    7·1 answer
  • A Python keyword ______________.
    15·1 answer
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!