1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna35 [415]
2 years ago
9

How serious are the risks to your computer security?

Computers and Technology
1 answer:
ASHA 777 [7]2 years ago
6 0

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

You might be interested in
write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate cond
Anni [7]

Answer:

The algorithm is as follows:

1. Start

2. bottles = 0

3. While bottles != 500

  3.1 Create bottle

  3.2 bottle = bottle + 1

4. Switch off machine

5. Stop

<em>See attachment for flowchart</em>

Explanation:

This begins the algorithm

1. Start

This initializes bottles to 0

2. bottles = 0

The loop is repeated until 500 bottles is created

3. While bottles != 500

This creates a new bottle

  3.1 Create bottle

This increments the number of bottles by 1

  3.2 bottle = bottle + 1

This switches of the machine after all bottles are created

4. Switch off machine

End algorithm

5. Stop

<em></em>

<em></em>

7 0
3 years ago
How does so called marshalling solve the problem of different byte ordering of sender and receiver? 8. What is the purpose of a
Phantasy [73]

Marshalling solve the problem of different byte ordering of sender and receiver by:

  • By the use of Common Object Request Broker Architecture (CORBA):

<h3>What is Marshalling?</h3>

Marshalling is the act of moving and formatting a group of data structures into an external data depiction type good for transmission in a message.

A port mapper is known to be a kind of protocol that tells or map the number or the kind of version of any type of Open Network Computing Remote Procedure Call (ONC RPC) program to a port that is often used in the work of networking by that version of that given program.

Learn more about portmapper from

brainly.com/question/879750

#SPJ1

8 0
2 years ago
A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which bene
a_sh-v [17]

Answer:

Redundant paths can be available without causing logical Layer 2 loops.

Explanation:

  • Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops.
  • These loops are called physical loops.
  • When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
  • This affects the performance of the network as the result of broadcast packets flooding.
  • STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.
  • Spanning Tree Algorithm is used by STP to determine the optimal path  of switch to the network.
  • Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
  • This information helps STP to eliminate the redundant paths.
  • So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.
7 0
3 years ago
Cnt115-02* which of the following is a private ip address and can't be routed across the internet?
vichka [17]
192.168.90.100 can't be routed via across the internet
7 0
3 years ago
A circuit has a resistance of 680 ohm and a current of 0.025 A. What is the voltage of the circuit
uysha [10]
V = IR

V = 680 * 0.025

Therefore

V = 17


If this is an exam-type question, don't forget to include your units too!

<span>Ω Ohms for Resistance
</span>V Volts for Voltage
A Amperes for Current

5 0
3 years ago
Other questions:
  • HELP PLEASE ASAP brainliest to accurate
    14·2 answers
  • If num is an int which expression always evaluates to true if num holds an odd number
    15·1 answer
  • A(n) ________ is a text or image that allows the user to access that file or web page with a single click.
    15·2 answers
  • The mutating-table error is raised when a trigger attempts to execute a. an INSERT, UPDATE, or DELETE while another user is upda
    10·1 answer
  • Why does a computer need programs? ​
    8·2 answers
  • Complete the getOdds method so it returns a new ArrayList of Integers containing all odd Integers from the parameter ArrayList v
    13·1 answer
  • What is a digital dashboard, and why are they becoming an increasingly popular tool?
    15·2 answers
  • Work with a partner to answer the following question: How might learning the language
    13·1 answer
  • How to make your nest learning thermostat stop doing something
    14·1 answer
  • ANSWER QUICKLY!!!
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!