1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Georgia [21]
2 years ago
13

________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulner

ability
Computers and Technology
1 answer:
Norma-Jean [14]2 years ago
4 0

Answer:

Hi there it is A vulnerability

Explanation:

You might be interested in
A computer can function in the absence of software true or false​
NISA [10]

Answer:false

Explanation:

7 0
3 years ago
Read 2 more answers
The term ________________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, se
Vinvika [58]

Answer:

The term "Local storage"denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term "hosted storage," "Internet storage" or "cloud storage." denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network

4 0
3 years ago
Read 2 more answers
Most wires are covered in rubber to insulate them and keep people safe from electricity and heat true of false
daser333 [38]

Answer:

I think it is true...

Explanation:

Hope its right

3 0
3 years ago
blank protects equipment from too much current by tripping a switch that breaks the circuit, stopping the flow of electricity
e-lub [12.9K]

FUSE! (BRAINLIEST PLEASE)


4 0
3 years ago
Mad libs are activities that have a person provide various words, which are then used to complete a short story in unexpected(an
Vsevolod [243]

did you just put random a*s word together and expect us to know the ¨answer¨

5 0
3 years ago
Other questions:
  • you want to discard your old computer ,want to securely erase that data from your hard drive. what can you use to do this and wh
    12·1 answer
  • Why do clocks tick-toc?
    5·2 answers
  • Explain Cascading Style Sheets and what they do. Describe their primary function, two effects that this function has on programm
    11·1 answer
  • Suppose you have the following declaration.char[] nameList = new char[100];Which of the following range is valid for the index o
    7·1 answer
  • -Which of the following is true about Web services?
    10·1 answer
  • Select the correct answer. Vlad wants to include his goals and target in his résumé. He also wants to add how he can be benefici
    12·1 answer
  • Which of these parts serves as the rear cross structure of a vehicle?
    12·1 answer
  • Which term is used in object-oriented programming to reference characteristics of an object?
    15·1 answer
  • 我对汉语的兴趣 làm đoạn văn theo đề trên​
    14·1 answer
  • GUYS THERE IS A HACKER IN BRAINLY PLEASE DONT PRESS ON THE WEBSITE THEY WILL HACK YOU.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!