A _________________is a weakness that can be exploited either because it is protected by insufficient security controls, or because existing security controls are overcome by an attack. A. Confidentiality B. Integrity C. Authenticity D. Vulnerability

Answers

Answer 1
Has to be D. Vulnerability

If you really had no idea look at your options and notice that D is the only noun too

Related Questions

Harry learned how to design and build computer games from his programming foundations class in college and wants to tackle creating his first
mobile app game. What essential tools does Harry need if he already has the skills?
A OA storyboard, computer hardware, music and sound effects, and programming code.
B
60
o A mobile tablet, game engine software, and programming code.
Co A computer hardware, game engine software, graphical art design application, and programming code.
Do Programming code, game engine software, and game design.

Answers

Coded information is needed to create a program like OS or other applications. Essential tools required by Harry are hardware, gaming software, graphical art designing tool, and programming codes.

What are programming codes?

Programming codes are the set of instructional data and rules in the programming language used to create operating systems and applications based on games, learning, entertainment, etc.

To create a gaming application one must have program codes or rules, computer hardware for storing and writing data, gaming engine software, and designing applications to develop the graphics of the game.

Therefore, Harry needs option C. hardware, software, graphical app, and programming codes.

Learn more about programming codes here:

https://brainly.com/question/14378523

#SPJ1

When an element is added to a queue, it is added to the rear. When an element is removed from the queue, it is removed from the

Answers

It gets removed from the front

o access an array element, use the array name and the element's ________. a. data type b. subscript c. value d. name e. None of these

Answers

Depends, it could be name, but it depends on how you are accessing the array.

Personally, I’d say None of them, since you access an array element/item with an index (the number that the element can be referred with).

E.g. In Python…

arr = [“a”, “b”, “c”]
print(arr[0] == “a”) # Output: “True”

Write a statement that defines a Product structure variable named chips.

Answers

The statement that declares the variable using the  Product structure is: Product chips;

How to define the structure variable?

The product structure definition is given as:

Product {

.........

};

To declare a variable named chips, we use the following syntax:

Structure-name Variable-name;

The structure name is Product and the variable name is chips

Hence, the statement that declares the variable is: Product chips;

Read more about variables at:

https://brainly.com/question/15683939

Most operating systems include security features, such as an integrated ____, to protect against unauthorized access via the Internet.

Answers

Hello!

The answer would be: firewall.

I hope that this helps you!

Imagine a piece of graph paper situated behind an image and think about how all the
tiny squares sit in proximity to one another. Next, imagine an invisible force behind
the grid pushing and pulling the little squares so they appear blown up or minimized
--what concept does this represent?

A. Manipulation

B. Watermarking

C. Image cropping

D. Imagine distortion

Answers

The scenario where qn invisible force behind the grid pushes the little squares so they appear blown up or minimized is known as C. Image cropping.

What is image cropping?

It should be noted that image cropping simply means improving the framing and composition of an image.

It's the scenario where an invisible force behind the grid pushes the little squares so they appear blown up or minimize.

Learn more about image on:

https://brainly.com/question/26307469

JAVA
Write a method that makes the input string of sentences ending with '.' and combines them into a single sentence. The result should keep the final period.

For example,
runOnSentence("A sentence. That runs on.")
returns
"A sentence that runs on."

Answers

When did you post this? Just wondering cuz I’m about to take a test tomorrow and need fast response times, not sure if this site is reliable for that.

Every HTML will be marked as html document at the very beginning.


1. True


2. False

Answers

Answer:

True

Explanation:

HTML will be marked as HTML document

what is internet filtering

Answers

Explanation:

internet filtering is a technology that stops users from viewing certain URLs or websites by preventing their browsers from loading pages from these sites.

Answer:  by specifying content patterns – such as text strings or objects within images – that, if matched, indicate undesirable content that is to be screened out.

Explanation:

So it blocks things so they can not be looked at.

Which type of internet connection allows for high-speed bi-directional data communication over a hybrid fiber-coaxial (HFC) connection

Answers

The type of internet connection that allows for high-speed bi-directional data communication over a hybrid fiber-coaxial (HFC) connection is A cable modem.

What is a cable modem?

A cable modem is known to be a type  of network bridge that assist in the area of bi-directional data communication through the use of radio frequency channels found or seen in any hybrid fiber-coaxial (HFC).

Note that the use of a modem is often in the area of connecting a said computer to any network through the use of a cable television line.

Learn more about  internet connection  from

https://brainly.com/question/529836

Why, during the final stage of the multistage model for e-commerce, is comprehensive customer information captured in the supplier's database

Answers

The reason why, in the final stage of the model for e-commerce, to captured in the supplier's database is  because it hasten customer service after an order had been delivery.

What is e-commerce?

The word electronic commerce  is often known as e-commerce. It is a term that connote a type of business model that gives room for firms and people to buy and sell goods and services using the Internet.

Note that the reason why during the final stage of the multistage model for e-commerce, a comprehensive customer information captured in the supplier's database is important because it boast or make faster customer service when an order have been delivery.

Learn more about  e-commerce from

https://brainly.com/question/23369154

_____is an early-stage software acceptance testing; performed to identify possible issues/bugs before showing the product to everyday users or the general public

Answers

I’d say alpha/beta testing

An error message is displayed during Windows startup about a service that has failed to start, and then the system locks up. You try to boot into Save Mode, but get the same error message. What do you try next

Answers

What you should try next are:

Try and Boot to Windows RE and carry out a Startup Repair.Do click on the Last seen Good Configuration seen on the Advanced Boot Options menu.

What is Startup error?

When a system is said to be having issues in starting, it may be due to display error messages that is on its startup.

Note that these messages can come as a result of system BIOS or can be due to the Windows. Know that these error messages shown by the BIOS can be due to Boot failure or others.

Learn more about error message  from

https://brainly.com/question/25671653

Computer-aided design software is used by ________.

Answers

Answer:

by Architects?

Explanation:

not sure

When heading styles have been applied to a document, the user has the option to navigate through the document using which tab on the navigation pane?.

Answers

When heading styles have been applied the user can nagivigate documents using the Headings tab

What is mearnt by the term Navigation?

In Computing, navigation is use to mean routing or moving from one screen or one page on a website to another.

There are different types of navigation depending on the use case, they are:

Drawer NagivigationBottom NavigationTab Navigation etc.

Learn more about Navigation here:

https://brainly.com/question/2191665

#SPJ2

What specific type of Windows Servers are used to authenticate user accounts and contain most of the information that attackers want to access

Answers

Windows Servers are the platforms that are the operating system of networking and services. Domain Controllers are used to authenticating accounts.

What are Domain Controllers?

Domain Controller is a windows server that gives access to the user's accounts upon receiving a request by verifying the account and details. It acts as the gatekeeper to guard the accounts.

Domain Controller (DC) responds to the Windows Server domain's request to give access and in this way protects the account from unauthentic access and theft of information from unauthorized sources.

Therefore, Domain Controller a type of Windows Server is used to authentic account.

Learn more about windows servers here:

https://brainly.com/question/15687746

#SPJ1

What type of task can be defined to allow you fine-grained control over the management tasks a user can perform in an OU

Answers

The type of task can be defined to allow you fine-grained control over the management tasks a user can perform in an OU is custom.

What is custom priority in Outlook tasks?

Outlook is known to have a  New Tasks window that often shows a created-in Priority field that has  Low, Normal, and High setting.

This setting above is a custom one and it is one where a person can sort tasks by using its priority level instead of due date. This help to have  more perspective and one can reorganize their tasks when needed.

Learn more about task  from

https://brainly.com/question/12831236

Brief description of RAM?
brief description of how RAM has evolved?
What is the functionality of RAM?
What are the benefits of RAM to the computer system?

Answers

RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor

The first form of RAM came about in 1947 with the use of the Williams tube. It utilized a CRT (cathode ray tube); the data was stored on the face as electrically charged spots. The second widely used form of RAM was magnetic-core memory, invented in 1947

The computer memory RAM ( Random Access Memory ) is a store any types of data for a short time. It means RAM memory is used for short-term data. The main purpose of RAM in a computer is to read and write any data. RAM memory works with the computer's hard disk

RAM allows your computer to perform many of its everyday tasks, such as loading applications, browsing the internet, editing a spreadsheet, or experiencing the latest game. Memory also allows you to switch quickly among these tasks, remembering where you are in one task when you switch to another task

Answer:It makes the computer better your wlcome give me brilint

Which two statements describe the design principle of unity??
a. Uses opposing elements to draw attention to a specific message.
b. Assigns relationships between elements based on their size.
c. Conveys a consistent message to users.
d. Is a point around which elements mirror each other.
e. Displays order in its layout, style, and structure. ​

Answers

I think it is D
Hope this help you?!

Answer:

C- Conveys a consistent message to users.E- Displays order in its layout, style, and structure.

Drag each label to the correct location on the image.
Classify the examples based on knowledge representation.
salary information
different ways of reaching
a destination
students' marks in
different subjects
bank statement
shortest time or path
for network connection
different ways to cook
a meal in the given time
the options are which go under number or graph

Answers

Answer:

where is the image

Explanation:

A rating determined by a search engine based on the number of links to a particular site and the qualities of those links is called _______.

Answers

The links are the url that divert the individual to the particular site. The rating based on the link to the particular search engine is termed as link popularity.

What is a link in computer?

The link or the hyperlink in the computer is given as the reference to the data used by the user for the access to the anchor text.

The development of the high rating to the link at the search engine delivers the popularity of the link.

Learn more about computer link, here:

https://brainly.com/question/14569984

#SPJ1

While shopping for new computers for his photography studio, Mel paid close
attention to select computers with a lot of RAM, or internal memory, to run software
and data. What is he MOST LIKELY trying to do for his post-production editing
process?
A. make it more organized and constrictive

B. make it faster and more efficient

C. make it slower and less efficient

D. make it more complicated and arduous

Answers

Answer:

b make it faster and more efficient

3D printers, also known as ________, create three-dimensional shapes by adding very thin layer after layer of material until the final shape is fully formed.

Answers

Answer:

Additive Manufacturing

Hope this Helps!

3D printers, also known as additive manufacturing create three-dimensional shapes by adding very thin layer after layer of material until the final shape is fully formed.

What is additive manufacturing?

This is known to be tool that is often used to make three-dimensional shapes as  the process of makes an object by building it one layer at a given time.

Therefore,3D printers, also known as additive manufacturing create three-dimensional shapes by adding very thin layer after layer of material until the final shape is fully formed.

Learn more about additive manufacturing from

https://brainly.com/question/19484863

#SPJ9

Which statements describe the use of style in word

Answers

Answer:

can be used to make Word documents look the same

saves the user time when doing formatting tasks

allows for the definition of reusable formatting

can be applied to paragraphs and fonts

Using the drop-down menu, complete these sentences about forums and blogs.

Developer forums are not always open to the general public, but they do have

information for developers.

Developer blogs contain

on a variety of topics that are of interest to programmers.

Developer forums and blogs can provide

information for programmers.

Developer forums are useful, because they can provide

Answers

Answer:

Using the  drop-down menu, complete these sentences about forums and blogs.

Developer forums are not always open to the general public, but they do have

✔ useful

information for developers.

Developer blogs contain

✔ posts

on a variety of topics that are of interest to programmers.

Developer forums and blogs can provide

✔ important

✔ timely

information for programmers.

Developer forums are useful, because they can provide

✔ reliable information

.

Explanation:

Edge 2022

Influencers are trusted above many other information sources because of their perceived ______ and ______.

Answers

Influencers are trusted above many other information sources because of their perceived  Authenticity  and Transparency.

Who is an influencer?

An influencer is known as a person that does the work of exerting their influence on a product or services.

Note that they help or act as guides or they inspire the actions of others and as such Influencers are trusted with lots of information sources because of their perceived  Authenticity  and Transparency.

See options below

Influencers are trusted above many other information sources because of their perceived ______ and ______.

a. Authenticity.

b. Transparency.

c. Expertise.

d. A & B.

e. A & C.

Learn more about Influencers from

https://brainly.com/question/26242633

The events that happen in a story are called the _________________.
A) setting
B) plot
C) diagram
D) prewriting

Answers

Plot like what he said

the user reports intermittent Wireless connectivity on a new mobile phone other users do not report any issues using mobile devices connected to 3 access points in the office the protocol in use is WPA2 /AES what is most likely the cause

Answers

The most likely the cause is that the mobile or client system is moved too far away from the access point.

What is wireless connectivity?

A wireless network is known to be a form of  computer network where one uses  only Radio Frequency (RF) connections instead of the use of wires or antennae.

Note that the most likely the cause is that the mobile or client system is moved too far away from the access point and as such when the user is close to the Wireless connectivity, it will work very fine.

Learn more about Wireless connectivity from

https://brainly.com/question/25633298

1. What is the difference between background sound and nat sound

Answers

Answer:

(nat) sound punctuates your piece between interview clips and helps to drive your narrative arc. Background sound can help to set the mood and give a sense of place to your viewer. If you record sound too loudly or too softly, the quality diminshes.

Explanation:

What are the supercomputers and where are they used? ​

Answers

Answer:

Giant Tech Company mostly

Explanation:

they used it as their server or storing data, right now example we googling by that we send the requests from our computer to supercomputers and those computer will find that information your and send back the respond (e.g. website Brainly). Supercomputers = computers sample as that.

Other Questions
Solve for X question 14 How do you write 7.72 102 in standard form? Please dont answer random only for the points because if you do that I am gonna report you and your gonna lose points.Please answer all the question And for receive the brainliest has to answer all the question! Short answer: in what way does this lesson connect to your life? Determine the VOLUME of the solid. Round answer to the nearest hundredthnecessary).15 in7 in What natural factors influenced the settlements in Ontario?? Which statement best explains why the virus that causes dog flu does not infect humans? In other words, why is this type of flu specific to dogs?The dog flu virus does not often come into contact with human cells.The replication cycle of dog flu virus is must slower inside a human cell.The dog flu virus interacts specifically with receptors on the surface of dog cells.The toxins produced by the dog flu virus are not toxic to human cells. what is 340 to nearest hundred Carmen buys 153 shares of cawh consolidated banks, each of which pays a constant yearly dividend of $7.14. after six years, how much has carmen received in dividends? a. $5,783.40 b. $1,820.70 c. $1,092.42 d. $6,554.52 please select the best answer from the choices provided a b c d The foramen ovale and the ductus arteriosus are both examples of __________. The Lost Horse Trail is 6.43 kilometers long. Last month, Jason hiked the trail 9 times. How many kilometers did Jason hike on the Lost Horse trail last month? A. 5.787 kilometers B. 57.87 kilometers C. 578.7 kilometers D. 5,787 kilometers pls help i have the first part done its just confusing The letters Cu, C, and Ca are all chemicals for elementsTrue or false Three local stores are each selling their videos game consoles for the same price the table below shows how many consoles have been sold at each of the stores and the total sales dollars for the consoles. please helppppppppp.. A card is drawn from a standard deck, put aside, and then another card is drawn. What is the probability that the first card is a king and that the second card is a queen?FRACTION FORM Write the radical expression as an exponential expression.6 The more time Paula studies for a test, the fewer mistakes she makes. What is the pattern of association between time studied and number of mistakes ?A. Negative associationB. Positive association C. Varied association D. No association Find the circumference of the circle. Round your answer to two decimal places, if necessary. A Add commas where they are needed. Not every sentence needs a comma.1. Bike riding brisk walking and swimming are good forms of exercise.2. The victims of the hurricane were stunned for they had lost everything.3. Crabs and lobsters are both shellfish.4. The quiet obedient dog is a pleasure to be around.5. The pilot boarded the plane checked her instruments and prepared for takeoff.6. The tornado took a heavy toll in lives and property.7. Susan wanted to explore the cave but her parents had forbidden it.8. He and his wife skied in the Alps and enjoyed it very much.9. We had lessons in swimming canoeing and archery.10. The radio announcer warned of the storm but no one paid any attention. Trevor is dilating a figure on the coordinate plane by a scale factor of 9/5#1: The original figure will be enlarged by the dilation.#2: The image and the pre-image will be similar figures.#3: The corresponding angles of the figures will be congruent.#4: The corresponding sides of the figures will be congruent.