1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
2 years ago
9

A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as a

/an ____ .
Computers and Technology
1 answer:
Anna11 [10]2 years ago
3 0

Answer: vulnerability

Explanation:

You might be interested in
9. A change in the appearance of a value or label in a cell
alexandr402 [8]

Answer:

format

alignment

excel

=

Explanation: i'm an accountant

4 0
3 years ago
What is MS Paint ?<br><img src="https://tex.z-dn.net/?f=%20computer" id="TexFormula1" title=" computer" alt=" computer" align="a
nignag [31]

Answer:

Microsoft Paint, also known as Paint, is a simple program that allows users to create basic graphic art on a computer. Included with every version of Microsoft Windows since its inception. Paint provides basic functionality for drawing and painting in color or black and white, and shaped stencils and cured line tools.

4 0
3 years ago
Waht is the difference between authorization and access control? Access control specifies what a user can do, and authorization
spayn [35]
<h2>Answer:</h2>

Authorization specifies what a user can do, and access control enforces what a user can do.

<h2>Explanation:</h2>

Authorization is simply granting access to an authenticated user of an application. It specifies what a user can and/or cannot do. For example, for a user to access their banking details in an online banking service, they have to be authorized by first authenticating them to prove their identity. Another example is in an organizational system where some users (normally called admins) can access certain database info whereas some other users (normally called the regular users) cannot.

Access control is used to enforce the policies dictated by authorization. In other words, access control enforces the policy of what a user can and/or cannot do. Access control makes authorization possible. It is sometimes called privileges or permissions. For example, the <em>security tab </em>in the operating system of Windows, allow to set access privileges for certain files and/or folders. Another example is in an organizational system where some files on the organization's server are configured in such a way that access to it is restricted and dependent on some further authorization.

5 0
3 years ago
Read 2 more answers
Give reasons why you care for your sense organs​
Cerrena [4.2K]

HI!the resaon why should you care for you sense organs is that they help us to contact with our surroundings.

8 0
2 years ago
Read 2 more answers
Two floating point numbers, A and B, are passed to a recursive subroutine.
Mnenie [13.5K]
The answer is (c) infinite loop
6 0
3 years ago
Other questions:
  • Write a Tip Calculator in code in VMware Fusion
    13·1 answer
  • Write Java program to allow the user to input the amount of deposit, yearly interest rate (percentage), and income tax(percentag
    9·1 answer
  • Which windows tool can you use to find out if the hard drive is slowing down windows performance?
    9·1 answer
  • In a _____ network, each device on the network is attached to a central router. If the router fails, then the other devices will
    13·1 answer
  • ___________ is a computer processor which incorporates the functions of a computer's central processing unit (CPU) on a single i
    15·2 answers
  • Which of the following allows data to coordinate activity between devices? Select one: a. Address bus b. Collisions c. Data bus
    10·1 answer
  • Plz tell the answer I I'll mark u as the brainliest
    14·1 answer
  • What is the answer only right answers<br>​
    7·2 answers
  • TRUE OR FALSE: THE BUILDER'S CLUB IS A PAID SUBSCRIPTION.
    9·2 answers
  • Explain to Alana why she might not want to blast her boss on social media just yet.<br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!