1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
3 years ago
9

A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as a

/an ____ .
Computers and Technology
1 answer:
Anna11 [10]3 years ago
3 0

Answer: vulnerability

Explanation:

You might be interested in
Keyshia is preparing a report about the different tools that are used in a science laboratory. She wants to edit a picture of gl
Nastasia [14]

Answer:

She should select the picture.

Explanation:

If you select the picture you can go right to the tools for the picture. You can use a picture editor or just the main picture tools depending on what type of computer you use.

3 0
3 years ago
Read 2 more answers
An online travel agency such as Travelocity is an example of a(n) _____.
dezoksy [38]

An online travel agency such as Travelocity is an example of a intermediary.

3 0
3 years ago
Modify the Eggs program to create a new one named EggsInteractive that prompts the user for and accepts a number of eggs for eac
rjkz [21]

Please provide the eggs program!

7 0
3 years ago
"what is the #1 resource used when researching a product online?"
BARSIC [14]
I believe it would be customer reviews.
6 0
3 years ago
Which of these is an application to control
N76 [4]

Not sure if your asking what certain application or the definition. But the definition: A security practice that blocks or restricts unauthorized applications from executing in ways that put data at risk.

6 0
3 years ago
Other questions:
  • What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?
    11·1 answer
  • This one too its from computer engineering
    6·1 answer
  • One of the main purposes of special effects is to accomplish shots that would be too expensive, too dangerous or just plain impo
    9·2 answers
  • 40 points to answer ALL
    9·2 answers
  • A __________ is when the sender cryptographically marks a message with its private key, which is achieved by a cryptographic alg
    12·1 answer
  • Which of the following files has the Ionic styles? ionic.bundle.css ionic.js ionic.css ionic.bundle.js
    13·1 answer
  • Anyone follows abhay​
    10·1 answer
  • Which of the following best describes the existence of undecidable problems? *
    6·1 answer
  • which of the following is a likely problem for a driver in an urban area? A. fame animals on the roads B.not finding a gas stati
    6·1 answer
  • Discuss why it is important to know the history of social media​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!