1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
N76 [4]
2 years ago
12

Someone put malware on your computer that records all of your keystrokes. what aspect of security was primarily attacked? choose

the best response.
Computers and Technology
1 answer:
JulsSmile [24]2 years ago
4 0

When someone put malware on your computer that records all of your keystrokes then Confidentiality of security was primarily attacked.

<h3>What is Confidentiality ?</h3>

Confidentiality refers to a set of guidelines or a commitment that, in most cases, is carried out through confidentiality agreements and that restricts access to or uses of particular kinds of information.

The law frequently requires attorneys to keep all information relating to client representation secret. The attorney-client evidentiary privilege only protects conversations between the attorney and the client; the duty of confidentiality extends much further.

Before sharing any normally confidential information, the lawyer may need to persuade the client in some jurisdictions to behave in a way that complies with the law. Even in severe situations where murderers have admitted the whereabouts of missing remains to their attorneys but the police are still seeking for those bodies, it should be noted that these exceptions often do not cover crimes that have already occurred.

To learn more about Confidentiality from the given link:

brainly.com/question/863709

#SPJ4

You might be interested in
A technician needs to be prepared to launch programs even when utility windows or the Windows desktop cannot load. What is the p
ololo11 [35]

Answer:

Msinfo32.exe, cmd

Explanation:

The msinfo.exe is a tool that gathers information concerning your computer system and displays a comprehensive view of your system components, hardware, and software environment, that can later be use to diagnose computer issues.

Command Prompt is an interpreter application for command line which is available in nearly all Windows operating systems. It is utilized for executing entered commands.

6 0
3 years ago
. wireless network adapters differ from regular networkadapters because theycontain………………..
Nataly_w [17]

Answer: Transceivers

Explanation:

 Wireless network adapters differ from regular network adapters because they contain transceivers as, the transceiver is that portion of the network interface which transmitted the data by concerting digital data into the digital signals in the medium. Basically, the network adapter are responsible for connected the host in the network medium and also convert the binary form data.Transceiver signal are basically depends upon the type of the network.

8 0
3 years ago
What is 4991 rounded to the nearest thousand
evablogger [386]

Answer:

5000

Explanation:

5 0
3 years ago
Read 2 more answers
Gustavo is completing his homework online. When he uses a computer, what converts the information he inputs into instructions th
Otrada [13]
I can not understand your question, about it. What is homework of Gustavo working in, Visual or Dev C++ with any language?
4 0
3 years ago
Read 2 more answers
Translating an algorithm into the syntax of Java is the design phase of software development.
Digiron [165]

Answer:

I think it's false

Explanation:

I don't think so. What makes me hesitate is that you may have been told that in your text or in the classroom.

Here are the steps as I understand them.

  1. Understand the problem you are trying to solve.
  2. Design a solution.
  3. Draw a flow chart.
  4. Write pseudo-code.
  5. Write code.
  6. Test and debug.

I think you've done the designing long before you start writing code or even pseudo-code.

4 0
3 years ago
Other questions:
  • Su now wants to highlight several inventors in her presentation, so she decides to use the underline color option.
    11·1 answer
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • Describe the Software Development Life Cycle. Describe for each phase of the SDLC how it can be used to create software for an E
    14·1 answer
  • Help me please (program c++)
    11·1 answer
  • Which type of connection is needed to synchronize data with a cloud service?
    8·1 answer
  • "What is the difference between dialogue and debate?
    7·1 answer
  • While (e &lt; 10):<br> print (c)
    10·1 answer
  • Select the correct word to complete the sentence
    11·2 answers
  • Please solve the ones you can. Solving Both will be appreciated. thank you
    13·1 answer
  • Which term best describes these lines?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!