1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
2 years ago
7

Which type of data is most sensitive and should be protected from malware?

Computers and Technology
1 answer:
Dennis_Churaev [7]2 years ago
5 0
The correct answer is “C. The credit card number that you use to make an online purchase”
You might be interested in
What is thhe name of service included with windows server operating systemthat manages a centralized database containing user ac
kogti [31]

Answer:

The active directory (AD)

Explanation:

Included in the operating system of Windows server is a primary feature called Active Directory which essentially manages a centralized database containing user account and security information such as password.

The AD is created by Microsoft and allows users (typically admins) to manage network and IT resources and application data of a system running the Windows operating system. AD can be used to create users, authenticate users and authorize users to be able to access servers and applications on the system.

4 0
3 years ago
In a car crash, wearing a seat belt __________________.
Bad White [126]

In a car crash, wearing a seat belt

A. Keeps you from being thrown from the car

B. can reduce injuries

The answer is : C. all of the above

<h3>Further explanation </h3>

In Newton's law, it is stated that if the resultant force acts on an object of magnitude is zero, it can be formulated:

<h3>∑F = 0 </h3>

This value is for stationary objects or objects that move in a straight line

So if the resultant force on an object is zero, the object that was initially stationary will continue to remain stationary, and the object that was initially moving will continue to move at a constant speed

The size of inertia is proportional to mass, the greater the mass of the object, the greater the inertia of the object.

In objects with mass that move translatively, the object will maintain its linear velocity

When we are in a vehicle that moves forward, then we will still maintain a state of forwarding motion. If our vehicle stops suddenly, then we keep moving forward so we will be pushed forward. From this point, the use of a safety belt serves to hold back our movements so that there are no fatal injuries or collisions.

<h3>Learn more </h3>

Newton's law of inertia

brainly.com/question/1412777

example of Newton's First Law of inertia

brainly.com/question/1090504

law of motion

brainly.com/question/75210

Keywords: inertia, Newton's First Law, collisions, injuries, car accident, crash

7 0
3 years ago
Read 2 more answers
Based on the current economic situation do you expect the employment demand for graduating engineers to increase or decrease? Ex
Delicious77 [7]

Answer: the employment demand would increase.

Explanation:

Several factors affect the employment demand especially in a field as peculiar as engineering, the cumulative build up of unemployed graduates and the skill set required to fit into the present working structure is also of Paramount importance. The evaluation method for recruitment seeks to function based on this rationale by selecting a few amongst many.

8 0
3 years ago
Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
enyata [817]

Discovery of any vulnerability in a software program can potentially be sold to the government: True.

<h3>What is vulnerability?</h3>

Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

4 0
2 years ago
( Game Design) The companies who get video games out to consumers are called:
Bad White [126]

Answer:

They are called video game publishers

Explanation:

A video game publisher is responsible for financing a video game’s development, marketing, and release of the game to the consumers. Basically, they are the ones who manage the business end of the gaming field. If the video game company is well established, the publishers of that company will be the ones to distribute while some smaller companies will hire distribution companies to distribute the games for them

3 0
3 years ago
Other questions:
  • A bitmap picture can be represented by hexadecimal numbers. Each two-digit hexadecimal number represents a row. To convert a num
    14·1 answer
  • If your BAL is .10 you can expect a _______ drop in complex performance compared to the sober level
    6·1 answer
  • What are the useful techniques in program design?
    12·1 answer
  • The Business Information Building Block feature is available in the _____ grouping on the Insert tab.
    13·1 answer
  • A Raycast returns a float that tells you how far away an Object is
    8·1 answer
  • What is the difference between digital art and digital design?
    8·1 answer
  • "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
    10·2 answers
  • Describe your ideas for a keyboarding game that would help someone improve their skills.
    6·1 answer
  • When network traffic is encrypted, it is invisible and its content and purpose are masked.
    12·1 answer
  • Why womt this code work????
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!