1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
2 years ago
9

PLEASE ANSWER AND HURRY I'LL MARK YOU BRAINLIEST!!​

Computers and Technology
1 answer:
anastassius [24]2 years ago
8 0

Answer:

what's the question?

Explanation:

I see no question.

You might be interested in
Who is typically considered to be the father of computing
Tanzania [10]
Charles Babbage is most often considered to be the father of computing after his invention of the  Analytical Engine in 1837 which contained <span>Arithmetic Logic Unit (ALU), basic flow control, and integrated memory which served as a general-purpose computer concept (and also very ahead of time in 1837).</span>
7 0
3 years ago
The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
gayaneshka [121]

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

5 0
3 years ago
How to make logo black and white in paint?
Pie
Change the color to black and white
7 0
3 years ago
Internet control message protocol (icmp) is a method of ip address assignment that uses an alternate, public ip address to hide
Elanso [62]
B False





---------------------------------
3 0
3 years ago
What kind of device is a printer? output or input
ANEK [815]
A printer is output. :)
8 0
2 years ago
Other questions:
  • Technology progresses so new needs can be satisfied.<br><br> A. true<br><br> B. false
    12·2 answers
  • Write an algorithm in pseudocode (following the style of the Minimax pseudocode) that will always make an optimal decision given
    13·1 answer
  • str1=”Good” str2=”Evening” Does the concatenation of the above two strings give back a new string or does it concatenate on the
    14·1 answer
  • Video-sharing sites such as youtube and vimeo provide a place to post short videos called clips, true or false?
    10·1 answer
  • 11) A single inheritance model means: * A) A class can only have one parent class (superclass) B) A class can only have one chil
    7·1 answer
  • ________ are the symbolic codes used in assembly language?​
    6·1 answer
  • Does any of yall play rob lox?
    5·2 answers
  • Write a program to test if an integer input from the keyboard is odd or even. Sample Run 1: Enter a Number: 78 Even Sample Run 2
    7·1 answer
  • When the CPU performs the work described in the commands,
    11·1 answer
  • you are setting up an active directory environment for a business that has three locations and 300 users. you want the users to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!