A security hole is a(n): Group of answer choices packet-level firewall small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system

Answers

Answer 1

Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

Explanation:

A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.

A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.


Related Questions

_______________is the career cluster that medical professionals are under.

Answers

I think the answer is Doctor ?

List two examples of following types of communication

Answers

Verbal Communication. Verbal communication occurs when we engage in speaking with others. ...
Non-Verbal Communication. What we do while we speak often says more than the actual words. ...

Answer:

Explanation:

sign language is communication

touch is communication

Match each operating system drawback to its respective operating system.

1. more susceptible to viruses Linux. Operating System
2. fewer compatible applications Microsoft Windows Operating System
3. limited support system Apple Operating System

Answers

Answer:

Microsoft Windows - More susceptible to viruses

Linux - Limited support system

Apple - Fewer compatible applications

Explanation:

Generally windows is more susceptible to viruses.

Linux is open source meaning it's up to the community to help you.

Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.

Answer:

1. Microsoft Windows is more susceptible to viruses

2. Mac OS X (Apple OS) has fewer compatible applications

3. Linux OS has a limited support system.

Two parter:

A.) What is wrong with the program segment below? The program does not contain syntax errors.

B.) Fix the programming error(s)

num = 1;

while (num < 9)
{
cout << num;
num = num - 1;
}

Answers

Answer:

the variable num is not declared so the compiler doesn't define it.

add int before num:

int num = 1;

while (num < 9)

{

cout << num;

num = num - 1;

}

now the code will run but it won't stop as it will never break the condition (num < 9).

Low-level programming languages are (5 points)
a
closer to human languages
Ob
less readable by humans
O
C
more readable by humans
Od
written in human languages

Answers

Answer:

Low-level programming languages are essentially written as the computer interprets them (examples would be assembly and machine language), so the answer is B.

Explanation:

You are the network administrator for a city library. Throughout the library, there are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do to fix this problem

Answers

Answer: Configure port security on the switch

Explanation:

Since there need to be a restriction on access to the network so that the library computers will be the only ones that are allowed connectivity to the internet, the thing that can be done to fix the problem is to configure a port security on the switch.

When a port security is configured, it helps in securing the network and this will in the prevention of unknown devices from being connected to the network.

Three types of common program errors are syntax, runtime, and logic. (5 points)
O True
O False

Answers

Answer:

True

Explanation:

True,My good sir/maam

Drag the tiles to the correct boxes to compete the pairs. Identify the types of chemical reactions occurring in the chemical equations.

Answers

The question is incomplete. The complete question is :

Drag the tiles to the correct boxes to compete the pairs. Identify the types of chemical reactions occurring in the chemical equations.

combustion reaction , photosynthesis , respiration

water + carbon dioxide + sunlight → oxygen + glucose

methane + oxygen → water + carbon dioxide + heat

glucose + oxygen → carbon dioxide + water + energy

Solution :

The chemical reactions that is occurring in the following chemical equations are :

Photosynthesis

water + carbon dioxide + sunlight → oxygen + glucose

Plants uses the light energy from the sun in the presence of water and carbon dioxide produces food by the process of photosynthesis. It produces glucose and oxygen.

Respiration

glucose + oxygen → carbon dioxide + water + energy

The cellular respiration process produces ATP with the breakdown of the glucose and oxygen. During respiration process, carbon dioxide is obtained along with water and energy.

Combustion reaction

methane + oxygen → water + carbon dioxide + heat

Combustion reaction is a chemical reaction in which methane is the main ingredient. Combustion takes place as things burn in the presence to methane and oxygen to form carbon dioxide, water and heat.

What is the difference between electrical and electronic devices?

Answers

Answer:

A difference is that the electrical devices makes the electrical energy into the other forms of energies, such as heat, light, sound, gravitational, and nuclear. . . The electronic device controls the flow of electrons for performing the task.

Answer:

the different between electrical and electronics devices is the electricity and the power of inside of some devices which are considered most powerful electronics from, because the difference is the battery.

Explanation:

i hope it helps ;)

Columns are identified by numbers (1,2,3,4,5....) and Rows are identified by letters (A,B,C,D,E.....) True False

Answers

The answer would be true. Hope this helps you

In python please!! Write the definition of a function named countPos that needs integer values from standard input until there are none left and returns the number that are positive. The function must not use a loop of any kind.

Answers

Answer:

Explanation:

The following code is written in Python it doesn't use any loops, instead it uses a recursive function in order to continue asking the user for the inputs and count the number of positive values. If anything other than a number is passed it automatically ends the program.

def countPos(number=input("Enter number: "), counter=0):

   try:

       number = int(number)

       if number > 0:

           counter += 1

           newNumber = input("Enter number: ")

           return countPos(newNumber, counter)

       else:

           newNumber = input("Enter number: ")

           return countPos(newNumber, counter)

   except:

       print(counter)

       print("Program Finished")

countPos()

9.6 Code practice Edhesive

Answers

Answer:

N = [1,1,1,1,1],

[2,2,2,2,2],

[3,3,3,3,3],

[4,4,4,4,4]

def printIt(ar):

   for row in range(len(ar)):

       for col in range(len(ar[0])):

           print(ar[row][col], end=" ")

       print("")

           

N=[]

for r in range(4):

   N.append([])

   

for r in range(len(N)):

   value=1

   for c in range(5):

       N[r].append(value)

       value=value + 1

           

printIt(N)

print("")

newValue=1

for r in range (len(N)):

   for c in range(len(N[0])):

       N[r][c] = newValue

   newValue = newValue + 1

       

printIt(N)

Explanation:

I got 100%.

In this exercise we have to use the knowledge of computational language in python to write the code.

We have the code in the attached image.

The code in python can be found as:

def printIt(ar):

  for row in range(len(ar)):

      for col in range(len(ar[0])):

          print(ar[row][col], end=" ")

      print("")        

N = [1,1,1,1,1], [2,2,2,2,2], [3,3,3,3,3], [4,4,4,4,4]

for r in range(4):

  N.append([])

for r in range(len(N)):

  value=1

  for c in range(5):

      N[r].append(value)

      value=value + 1

printIt(N)

print("")

newValue=1

for r in range (len(N)):

  for c in range(len(N[0])):

      N[r][c] = newValue

  newValue = newValue + 1

printIt(N)

See more about python at brainly.com/question/26104476


what is the answer???​

Answers

Answer:

I think it should be C

Explanation:

A group of two or more computers that are link together.

You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing

Answers

Answer:

The right approach is Option b (volume testing).

Explanation:

A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.

Other options are not related to the given query. So the above is the right response.

how important the role of valet and butler service in the hospitality

Answers

very important bc they help you with what you need.

Hardware failure, power outages, and DOS attacks will affect:

data confidentiality.

data integrity.

data verification.

data availability.

Answers

Answer:

The answer should be data availability

also have a good day people !!

Answers

Answer:

Thx u2!!

Explanation:

Everyone have a good day!

Answer:

You too and thank you for 50 points!!

Explanation:

When comparison shopping, all of these hint at a good deal EXCEPT_____________________.

Answers

Answer:

lower-priced models offer more features

Explanation:

Type the correct answer in the box. Spell all words correctly.
Alan maintains the efficiency of a printing plant by supervising plant operations and implementing safety procedures. What does he work as?
Alan is working as a _____________.

Answers

Answer:

Alan is a Maintenance Supervisor.

Explanation:

Answer:

printing plant manager

Explanation:

Other Questions
Complete the missing value in the solution to the equation.y=-2x+4 Write an inequality for the sentence below and then solve and check it. The sum of w and nine is less than 18 need help I will give brainiest 1. (The First Tuesday) How does Mitch feel about men crying? Which of these examples can be categorized as external disasters?A. liquid spill, earthquakeB. equipment failure, hurricaneC. liquid spill, equipment failure,D. flood, earthquake What are the most important ideas in stanzas 1 and 2 of "" At first"" ? A circle has a radius of 8 centimeters. The measure of the arc of theshaded region is 72. Which is closest to the area of the shaded sectionof the circle?1. 40.2 2. 160 3. 50.3 4. 10.1 ??? Help!!Please answer real if not report40 points!! The number of copies made each week by teachers at Lamley High School follows a bell-shaped distribution with amean of 550 copies and a standard deviation of 185 copies. Mr. Thomas made 782 copies last week. His Z-score is1.25. Which of the following statements best interprets this value?O Mr. Thomas made 125 more copies, on average, than the mean number of copies of teachers at Lamley HighSchool.O The number of copies Mr. Thomas made is 1.25 standard deviations less than the mean number of copies ofteachers at Lamley High School.O The number of copies Mr. Thomas made is 1.25 standard deviations more than the mean number of copies ofteachers at Lamley High School.O The number of copies Mr. Thomas made is 1.25 standard deviations less than the median number of copies ofteachers at Lamley High School.O The number of copies Mr. Thomas made is 1.25 standard deviations more than the median number of copies ofteachers at Lamley High School. Pls solve will give brainlest What is the area of this figure? Enter your answer in the box. Obsidian _____.is formed from sand and quartzcools very quicklyhas large mineral crystalscools very slowly John painted 10 walls in 2 hours. Write an equation comparing wallspainted to hours. Explain why John can use this equation to find thenumber of walls he could paint in one hour. Then solve. what safety protocols do we need to practice when playing Pickleball? Read the passage from An Ecclesiastical History of the English People, Book I, excerpted from "The Arrival in Kent of the missionaries By Pope Gregory the Great." Please help with this question ASAP!! What is the role of business in a global economy? A right triangle is shown below.48.5What is the value of x? Enter your value as a decimal rounded to the nearest tenth, The base of all ocean food chains are formed by 1. An atom that loses electrons has a ________________________ charge and an atom that gains electrons has a ___________________________ charge.Charged atoms are called ___________________. 2. What is an insulator? Give 4 examples. 3. What is a conductor? Give an example. 4. How can we move electrons from one place to another? What actually causes the electrons to move? 5. Static electricity is ______________________________________________________________________ _______________________________________________________________________________________ 6. Explain the attraction and repulsion of charges. 7. Why does a balloon stick to the wall? 8. Why does your hair stand up when you take off your hat? 9. Why do you get a shock when you walk across a carpet? 10. When is static electricity most noticeable and why?11. State the Principle of Conservation of Charge. 12. The invisible electric force field around charged objects depends on __________________________, __________________________, and _____________________________. 13. What is the relationship between the charges and the field strength? What is the relationship between the field strength and the distance between the charges? 1. What is DC? What is AC? 2. Name 3 ways to get DC. 3. What is an electrical circuit? 4. What is voltage? What is current? What is resistance? What causes heat and light in a wire? COPY THE TABLE comparing water in a hose-DC-units 5. Which electricity do we use in our homes? CLICK ON ALTERNATING CURRENT 1. Explain AC. 2. Who invented the light bulb? 3. Who really invented AC? 4. Who discovered the advantages of AC over DC? 5. How is AC made? 6. What is the main advantage of AC over DC?