1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna35 [415]
2 years ago
9

How serious are the risks to your computer security?

Computers and Technology
1 answer:
ASHA 777 [7]2 years ago
6 0

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

You might be interested in
What would happen if the bitmap or free list containing the information about free disk blocks was completely lost due to a cras
masha68 [24]

Answer:

It can be repaired with disk utility / recovery algorithms

In UNIX it can be done by scanning

In FAT file scan the FAT looking for free entries

Explanation:

When the crash happens, it is not a problem for UNIX and FAT file system

It can be repaired with disk utility/recovery algorithms.

The recovery algorithm is a list of all blocks in all files and takes a compliment as new free file.

In UNIX scanning can be done at all I-nodes.

In FAT file problem cannot occur because there is no free list .If there was any problem than it would have to be done to recover it to scan the FAT looking for free entries.

7 0
3 years ago
Identifying Responses and Replies
Brut [27]

Answer:

Identifying Responses and Replies by using the drop-down menus to complete the sentences about message response is written below in detail.

Explanation:

A situation like this may be:

Someone receives a bike. They travel it and all, and then all of an unexpected they fall and get injured

If you only understood the first section of how the person received a bike when you draft a response, you would only draft about that piece, but getting harm after receiving the bike is also a huge portion of the "story". You could draft like how you were so pleased when you received your first bike, but you wouldn't remember to address the time you got injured when you were riding down a hill or something.

7 0
3 years ago
Read 2 more answers
Do you hate Final Fantasy VII Remake and why
pashok25 [27]

Answer: I never watched it...looking forward to watch it.

4 0
3 years ago
Read 2 more answers
_____ is a touch screen that is up to four feet by six feet.
Leni [432]

B i'm sure of it. 99% sure

5 0
3 years ago
Read 2 more answers
The transmission control protocol (TCP) and internet protocol (IP) are used in Internet communication. Which of the following be
SpyIntel [72]

Answer:

To establish a common standard for sending messages between devices on the Internet, C

Explanation:

5 0
3 years ago
Other questions:
  • True False The explicit location always tells you where users are located when they type the query.
    10·2 answers
  • What does it mean for a school to be “accredited”?
    5·1 answer
  • Are principles which allow designers to create blank designs
    15·1 answer
  • I NEED answers for these qu plz
    5·1 answer
  • Which online article citation is correctly formatted according to MLA standards?
    15·2 answers
  • Ava is at her first job interview, and the interviewer asks her a difficult question she hasn't prepared to answer. What should
    10·2 answers
  • Java Programming
    14·1 answer
  • ....................
    5·1 answer
  • GIVING 50 POINTS!
    6·2 answers
  • 16 POINTS
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!