1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna35 [415]
2 years ago
9

How serious are the risks to your computer security?

Computers and Technology
1 answer:
ASHA 777 [7]2 years ago
6 0

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

You might be interested in
What is the financial aspect for a business as to what database software they will buy?
Masteriza [31]

Answer:  Database software is bought on basis of the processing, cost, requirement etc for any particular . According to the financial perspective the database  software should have the following characteristics:-

  • Database software that has most accurate and main feature according to the business requirement is selected for buying and the others with extra features are not considered as more feature cost more amount  which is not needed.
  • Database software which is still in progress to be built is pre-booked and money is invested on it because the price of the required software might increase after getting completed.
  • Scalable database software should be bought so that it can extend according to need at low cost.

 

8 0
4 years ago
What is the missing line of code? &gt;&gt;&gt;from math th import &gt;&gt;&gt; Point = [1,5) &gt;&gt;&gt; bPoint [4.9]​
Ulleksa [173]

Answer:

I believe import math.

Do let me know if its correct.

3 0
2 years ago
What are the disadvantages of using social media to communicate with colleagues?
yanalaym [24]

Answer:

The overall finding of the study is that this type of distraction can potentially decrease work performance and productivity, Increased Risk of Malware, Damaged Employee Productivity, Reduced Employee Relations, and Confidentiality and Company Image. Security. Using social media platforms on company networks opens the door to hacks, viruses and privacy breaches, Harassment, Negative exposure, Legal violations, Potential loss of productivity, and Wage and hour issues.

6 0
3 years ago
Read 2 more answers
How can you refer to additional information while giving a presentation?
dimulka [17.4K]
The most common way I've seen is to have a slide where you have the additional information. It can be phone numbers, email address, websites, books, anything you want to refer to.
People tend to photograph these slides so make sure the information is error free and that you add you own marketing info to the slide as well.

5 0
3 years ago
I need help figuring out 2 pictures with topics that I can put on a magazine about the serengeti. This is something I'm doing fo
Usimov [2.4K]

Answer:

how about lions, trees, or zebras

Explanation:

i looked it up

4 0
3 years ago
Read 2 more answers
Other questions:
  • Theâ ______ is a large worldwide collection of networks that use a common protocol to communicate with one another.
    5·1 answer
  • In the dental industry, light-activated adhesives have been used for decades to help adhere braces to teeth as well as being use
    6·2 answers
  • The force of impact is____.
    8·2 answers
  • Compute the sum of the values in data_array, instead of using the sum() function. To do this, you must "accumulate" a result, wh
    6·1 answer
  • True/False: When a programmer creates an abstract data type, he or she can decide what values are acceptable for the data type,
    8·1 answer
  • Question 19
    9·2 answers
  • music sites through schools wifi 2020 What is one thing a person should do to stay safe when exercising? 100 pts.!
    10·2 answers
  • Expalin the defference between the driver of a desktop and a laptop​
    8·1 answer
  • A(n) ________ portal offers a personalized, single point of access through a web browser to employees located inside and outside
    9·1 answer
  • Which sql keyword is used to retrieve a minimum value from an attribute in a table
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!