1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
N76 [4]
2 years ago
12

Someone put malware on your computer that records all of your keystrokes. what aspect of security was primarily attacked? choose

the best response.
Computers and Technology
1 answer:
JulsSmile [24]2 years ago
4 0

When someone put malware on your computer that records all of your keystrokes then Confidentiality of security was primarily attacked.

<h3>What is Confidentiality ?</h3>

Confidentiality refers to a set of guidelines or a commitment that, in most cases, is carried out through confidentiality agreements and that restricts access to or uses of particular kinds of information.

The law frequently requires attorneys to keep all information relating to client representation secret. The attorney-client evidentiary privilege only protects conversations between the attorney and the client; the duty of confidentiality extends much further.

Before sharing any normally confidential information, the lawyer may need to persuade the client in some jurisdictions to behave in a way that complies with the law. Even in severe situations where murderers have admitted the whereabouts of missing remains to their attorneys but the police are still seeking for those bodies, it should be noted that these exceptions often do not cover crimes that have already occurred.

To learn more about Confidentiality from the given link:

brainly.com/question/863709

#SPJ4

You might be interested in
What is the best response to cyberbullying?
astra-53 [7]
Answer is C





Braine list please:)
5 0
3 years ago
Read 2 more answers
The numbering system we commonly use is called the decimal numbering system because it uses ________ symbols to represent all po
mojhsa [17]

Answer:

10.

Explanation:

Decimal numbering system is a number system which has ten digits. These ten digits are 0,1,2,3,4,5,6,7,8 and 9. It has signed and unsigned digits. The signed digits represents negative values of digit with the minus "-" sign written before the digit. The unsigned digits have no sign before them.

Binary numbering system has only 1 and 0 digits, while the hexadecimal number system has 16 digits.

6 0
3 years ago
Which cloud computing service model will enable an application developer to develop, manage, and test their applications without
musickatia [10]

Answer:

Platform as a Service (PaaS)

Explanation:

There are three broad cloud computing service model:

  1. Infrastructure as a Service(IaaS)
  2. Platform as a Service (PaaS)
  3. Software as a Service (SaaS)

Infrastructure-as-a-Service (IaaS) is a cloud-computing service model in which a vendor provides users access to computing resources such as servers, storage and networking.

Platform as a service (PaaS) is a cloud-computing service model that provides users (mostly application developer) with a cloud environment in which they can develop, manage and deliver applications. This is the required cloud computing service model for the case in question.

Software as a service (SaaS)  is a cloud-computing service model that provides users with access to a vendor’s cloud-based software. Users do not install applications on their local devices. Instead, the applications reside on a remote cloud network accessed through the web or an API.

3 0
3 years ago
Word-processing,spreadsheets, databases, and desktop publishing are all types of _______?
vichka [17]

Answer:

software

Explanation:

5 0
3 years ago
Read 2 more answers
A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP addres
Mariulka [41]

Answer:

A Subnet Mask

Explanation:

A Subnet mask is used by the TCP/IP protocol to determine whether a host is on the local Subnet or on a remote network.

In TCP/IP, the parts of the IP address that are used as the network and host addresses are not fixed, so the destination host address 192.168.10.100 cannot be determined by the network host (192.168.10.200) unless it has more information. This information is supplied in another 32-bit number called a Subnet mask.

4 0
4 years ago
Other questions:
  • Blood alcohol level is the ratio between the alcohol consumed and the blood in the body
    10·1 answer
  • A pages visual organization is known as the
    14·2 answers
  • Who invented autonomous cars? When I look it up it comes up as William Bertelsen but he invented the idea of hovering cars. Help
    8·1 answer
  • Why is investing in a mutual fund less risky than investing in a particular company's stock? A. Mutual funds only invest in blue
    14·2 answers
  • Design a Ship class with the following members:
    13·1 answer
  • Melinda completed the Computer Programming Aptitude Test when she applied for a position with Beta Electronics. Six months later
    14·1 answer
  • 5. What is the purpose of OneDrive? A. OneDrive organizes files on an external hard drive. B. OneDrive allows the user to work o
    7·1 answer
  • What are some other ways to program a robot to navigate a complicated environment other than straight paths and right angle (90
    8·2 answers
  • If a machine cycle is 2 nanoseconds , how many machine cycles occur each second?
    7·1 answer
  • Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a tic
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!