1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexira [117]
4 years ago
15

An attempt to exploit a vulnerability of a computer or network component is the definition of ________.

Computers and Technology
2 answers:
maxonik [38]4 years ago
7 0
Attack is the answer. Hope this helps.
Sergio039 [100]4 years ago
4 0
Attack

Hope this helps : )
You might be interested in
Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
lutik1710 [3]
 "Hackers" who work for companies to expose security flaws are definitely good, they're helping protect systems, often referred to as "white-hat" hackers. Many companies hire people like these or offer bounties for such people who can find vulnerabilities. One could say that even without permission, people who hack with the intent of demonstrating holes in security or improving a service could be considered good.

However, I don't believe that as firstly, they are breaking the law, and secondly, they are stealing data and invading people's privacy. One might as well break into somebody's house to say their security is bad! 


7 0
3 years ago
Human-centered technology often recommends _______ao
lidiya [134]

Answer:

Creating objects which people are going to interact with, designers have to be aware of those traits and take them into account in the process. ... Continuing the theme, user-centered design is more focused and concise version of human-centered design with deeper analysis of target audience.The user interacts directly with hardware for the human input and output such as displays, e.g. through a graphical user interface. The user interacts with the computer over this software interface using the given input and output (I/O) hardware.Human-centered design is a creative approach to problem solving and the backbone of our work at IDEO.org. It's a process that starts with the people you're designing for and ends with new solutions that are tailor made to suit their needs. ... Human-centered design consists of three phases.

Explanation:

3 0
3 years ago
Read 2 more answers
In which type of situation would it make sense to use edge computing?
ZanzabumX [31]

A type of situation in which it would make sense to use edge computing is: b. where critical decisions must be made on a split-second basis.

<h3>What is edge computing?</h3>

Edge computing can be defined as a distributed computing system that involves the deployment of computing and storage resources closer to the sources of data, so as to save time and enhance the decision-making process.

This ultimately implies that, a type of situation in which it would make sense to use edge computing is a scenario where critical decisions must be made on a split-second basis.

Read more on edge computing here: brainly.com/question/23858023

#SPJ1

<u>Complete Question:</u>

In which type of situation would it make sense to use edge computing?

a. where data is uploaded to a server at a scheduled time each week

b. where critical decisions must be made on a split-second basis

c. where users are in close proximity to the central data server

d. where there are few or no digital devices to capture

e. i don't know this yet

4 0
2 years ago
Name three situations when a copy constructor executes.
Vesna [10]

Answer:

1. When an object of the class is passed (to a function) by value as an argument.

2.  When an object is constructed based on another object of the same class.

3. When compiler generates a temporary object.

Explanation:

7 0
3 years ago
Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to
ivann1987 [24]

Answer:

A. Domain-level group policies

Explanation:

Because domain-level polices are automatically implement all users that are login on the PC and PC is connect to the domain. From domain polices you can set what user can open and what can not open, Joe Windows PC he is using automatically locks also through domain policy, Administrator set the time when any end-user leave their PC automatically after the time set administrator screen saver run and asked password of that user to return back in the windows.

6 0
3 years ago
Other questions:
  • Which of the following is the definition of Internet Protocol Security ( IPSec)? A remote access client/server protocol. It is a
    13·2 answers
  • While Joe's wife Molly and daughter Sunny did not mind moving,his son Daniel was not too happy with the sudden change in their l
    12·1 answer
  • Which tool is used to plan a web site?<br> HTML<br> Storyboard<br> Text editor<br> WYSIWYG
    5·2 answers
  • A ____ error occurs when an instruction does not follow the grammar of the programming language
    6·1 answer
  • Which option is considered a part of the document that is used to collect specific and predefined information?
    7·1 answer
  • What function does an extranet perform?
    5·1 answer
  • Which situation is the best choice for using telehealth?
    12·1 answer
  • Write javascript code for the form that appears in the image below. you are expected to add validation to the name field, email
    10·2 answers
  • If a company saw an online photo of you playing basketball, it might try to sell
    5·1 answer
  • PYTHON!
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!