1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
2 years ago
7

List at least three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential c

ompany materials.
Computers and Technology
1 answer:
Mamont248 [21]2 years ago
3 0

The  three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials are:

  • Embarrassment and also the loss of customers as a result of data loss.
  • The loss of what we call a proprietary information.
  • The loss of what we call the sensitive business strategy information (such as  planned acquisitions, and other.).

<h3>What is E-espionage? </h3>

This  term e-Espionage is known to be a form of an unauthorized and it is often seen as a criminal access to a lot of confidential systems and information and it is one whose purpose is that they have or gain a lot of commercial or political advantage.

Hence, the types of espionage are:

  • Clandestine cell system.
  • Counterintelligence, etc.

Therefore, The  three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials are:

  • Embarrassment and also the loss of customers as a result of data loss.
  • The loss of what we call a proprietary information.
  • The loss of what we call the sensitive business strategy information (such as  planned acquisitions, and other.).

Learn more about electronic espionage from

brainly.com/question/312313

#SPJ1

You might be interested in
Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other
dezoksy [38]

Answer: False

Explanation:

 The given statement is false, as the alarm filtering is the process of classifying the various type of IDPS alert in the system and it can be managed more efficiently.

The IDPS administrator can easily set an alarm filtering in the running system. It can generate the various types of positive tract in the system and then adjust the different alarm classifications. Alarm filters are same as the packet filter in which they can easily filter the items from the source and destination IP address.

3 0
3 years ago
Edward is a composer and needs to listen to the most accurate music files to create his compositions. What audio file type shoul
svetoff [14.1K]

Answer:

MP3

Explanation:

From the question we are informed about Edward who is a composer and needs to listen to the most accurate music files to create his compositions. In this case, the audio file type he should use to record his music is MP3 format. MP3 format Is an audio format which is a coding use in digital audio with high quality that can be used to store songs on the computer without taking much space, but with good quality. MP3 offer to listen to his/her music clearly.

4 0
3 years ago
Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of ________ computing operations
Pavlova-9 [17]

Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of <u>fog</u>  computing operations.

The correct option is C.

<h3>What is computing operations?</h3>

An action that is taken in computing to complete a certain task is referred to as an operation. The five fundamental categories of computer operations are input, processing, output, storing, and control. The five major functional components of a computer system each carry out one or more computer activities.

<h3>What are the basic computing operations?</h3>

Arithmetic and logical operations are the two primary sorts of work that CPUs carry out. In contrast to logical operations, which compare two numbers, arithmetic operations involve basic math concepts like addition and subtraction.

<h3>What is  fog  computing operations?</h3>

Both 5G and fog computing

Fog computing refers to a type of computer architecture in which a network of nodes continuously collects data from Internet of Things (IoT) devices. These nodes have millisecond response times and process data in real-time as it comes in. Every so often, the nodes communicate to the cloud analytical summary data.

To know more about computing operations visit:

brainly.com/question/18095291

#SPJ4

I understand that the question you are looking for is:

Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of ________ computing operations.

A) OpenStack

B) cloud

C) fog

D) RFID

8 0
2 years ago
What steps will add content to a report header section?
devlian [24]

Answer: 1. Design 2. Section divider or blank area 3. Controls 4. Property sheet

Explanation:

Edge2020

5 0
3 years ago
Read 2 more answers
Write a new program called Lab7D that will read strings from a text file and turn them into "encrypted code". Create a bool func
Aliun [14]

Answer:

I am writing a C program for the first part and Python program for the second part of the question.    

<h2>1st program:</h2>

#include <stdio.h>  //to use input output functions

#include <stdlib.h>  // used here to access exit function

void main() {  //start of the main() function body

char fname[100], character;

// fname is the name of the input file which contains characters and character //variable is used to store characters

FILE *original, *temporary;  

/* two pointers of File type: original is used for the original input file and temporary is used for a temporary file name aux.txt */

printf("Enter the name of the text file to encrypt : ");

//prompts the user to enter the name of the file to be encrypted

scanf("%s",fname); //reads the name of the file from user

original=fopen(fname, "r"); //open the input file in read mode

if(original==NULL)  {

//displays the following message if the file is empty or does not exists

 printf("Cannot open original file");  

 exit(1);  }  //program exits

temporary=fopen("aux.txt", "w");

//creates a temporary file named aux.txt and open that file in write mode

if(temporary==NULL)  { //if temporary file could not be created

 printf("Cannot create a temporary file");

 fclose(original); //closes the original input file

 exit(2);  }  //program exits

while(1)  {

 character=fgetc(original);  

/*pointer original moves through the input file and gets input from original input file one character at a time and store it in character variable */

 if(character==EOF)  

//when all characters are obtained and pointer is at end of file  {

  break;  //the loop breaks }

 else   {  //if EOF is not yet reached

  character=character+100;  

//add 100 to each character to encrypt the characters

  fputc(character, temporary);

 // fputc() writes a single character at a time to aux file } }

fclose(original);  //closes input file

fclose(temporary); //closes aux file

original=fopen(fname, "w");  //opens input file in write mode

if(original==NULL) { //if file does not exist display following message

 printf("Cannot open the original file to write");

 exit(3);  } //program exits

temporary=fopen("aux.txt", "r"); //open aux.txt file in read mode

if(temporary==NULL)  { //if pointer temporary is NULL

 printf(" Cannot open temporary file to read");

 fclose(original);  //closes input file

 exit(4);  } //program exits

while(1)  {

 character=fgetc(temporary);

//obtains every character from aux file pointed by temporary

 if(character==EOF)  //if end of file is reaced {

  break;   } //the loop breaks

 else   { //if end of file is not reached

  fputc(character, original);  

//puts every character to input file }  }

printf(" %s is encrypted \n", fname);  

//displays this message when input file is successfully encrypted

//closes input and aux text files

fclose(original);

fclose(temporary); }  

Explanation:

The program first asks the user to enter the name of the file. Then the program uses two pointers original for input file and temporary for aux text file. It first opens the file whose name is entered by the user and reads that file by getting each single character using fgetc() until the pointer reaches the end of the file. While reading each character of the input file, it encrypts every character using and puts that encrypted content in temporary file names aux.txt using fputc() until the pointer reaches the end of the file. Lastly all the encrypted strings of the are placed in the original input text file.

<h2>Second program:</h2>

# bool function that accepts character as parameter and returns true if its a #vowel and false otherwise

def isVowel(character):  

   if character.lower() in 'aeiou':  #converts uppercase char to lowercase

       return True  #return true if character is a vowel    

   else:

       return False #returns false if input character is not a vowel

The program has a function isVowel() which takes a character as a parameter to check if that character is a vowel. If character is in uppercase  letters, it handles these characters using lower() method to convert the character to lowercase and then returns true if that character is a vowel otherwise returns false. To check the working of the function you can replace True and False with print statement such as:

if character.lower() in 'aeiou':

       print("It is a vowel")

   else:

       print("It is not a vowel")

And after that you can call this function and pass a character to it as:

isVowel('i')

5 0
3 years ago
Other questions:
  • One governing factor when determining the minimum size of conduit to be used is the 
    9·2 answers
  • In the excerpt above, what can be inferred by the statement, “The Dillingham had been flung to the breeze during a former period
    13·2 answers
  • What are the set of rules to move data from one computer to another?
    11·1 answer
  • Slmething about device for defrosting windscreen?
    5·1 answer
  • Which of the following things should you do first when planning your career?
    15·2 answers
  • What will be the values of ans, x, and y after the following statements are executed? int ans = 35, x = 50, y =50; if ( x &gt;=
    7·2 answers
  • A blog is Group of answer choices a character in Lineage,
    15·1 answer
  • Construct pseudocode for a program that prints ‘Hello World’ on the screen.
    7·2 answers
  • Suppose the size of process is 10000 bytes and the relocation register is loaded with value 5000 which of the following memory a
    15·1 answer
  • Unscramble the risks of sharing files on the Intern
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!