1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gregori [183]
1 year ago
15

What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d

ata, and equipment failures?.
Computers and Technology
1 answer:
nadezda [96]1 year ago
3 0

Modification is the name given to an attack that makes changes into original data such as users manually modifying data, programs processing and changing data, and equipment failures.

In modification attacks, only changes are made to original data without deleting it completely. Modification is basically a type of attack in the context of information security. This type of attack creates annoying situations and discords by altering existing data in data files, inserting new false information in the network and reconfiguring network topologies and system hardware.

Modification attack is mainly mounted against sensitive and historical data. Modification attacks target integrity of the original data with an intent of fabricating it.

You can learn more about ha-cker attack at

brainly.com/question/14366812

#SPJ4

You might be interested in
Jane wants to add a chart to her presentation so she’ll click the Insert tab and in the Images group, she’ll click the Chart but
kap26 [50]

(A. Stevie only) because You need to go the illustrations tab in order to click on the chart button.

Jane clicked on images tab so she was wrong.

Mark as brainlest plz :)

3 0
3 years ago
What are the arguments for writing efficient programs even though hardware is relatively inexpensive?
Ainat [17]

Answer: Even though the hardware is inexpensive the writing of program is not efficient through this method as proper development of program is necessary for the clear execution due to factors like:-

  • The facility of writing program even the cost of hardware is less but it is not a free facility.
  • It also has a slower processing for the execution of the program
  • The construction of the efficient program is necessary for the compilation and execution of it rather than poorly constructed program is worthless and inefficient in working.

7 0
3 years ago
sam is a member of a software development team. his job is to identify the system functions that must be validated, and to decid
Licemer1 [7]

Sam's role on the software development team is a Software Quality Assurance.

<h3>What is SDLC?</h3>

SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.

In Computer technology, there are seven (7) steps involved in the development of a software and these include the following;

  • Planning
  • Analysis
  • Design
  • Development (coding)
  • Testing
  • Deployment
  • Maintenance

In this scenario, we can reasonably infer and logically deduce that Sam's role on the software development team is a Software Quality Assurance because he his is saddled with the responsibility of identifying the system functions that must be validated and how to test new software.

Read more on software development here:

brainly.com/question/28262663

#SPJ1

5 0
2 years ago
Which applications run on IHGs private cloud?
Svetlanka [38]

Answer:

Applications CSS and JvaP

Explanation:

6 0
4 years ago
The desired outcome of any form of communication should always be
mezya [45]

Answer:

talk it through and look at each sides differences and take heat.

Explanation:

Most desired outcomes in any form of community should be (Im sorry for...)

or I don't understand what you mean or I missunderstood so please....

At times when people communicate things don't alwasy go as planned out so, first you must both be aware of the issue or situation and, not yell but one persons speak at a time while the other listens and then they talk

7 0
4 years ago
Read 2 more answers
Other questions:
  • The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of d
    7·2 answers
  •    In the Start menu of Windows 7, you see your name listed as an option. Where does this shortcut lead if you select it?
    8·1 answer
  • Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more pack
    7·1 answer
  • Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
    5·1 answer
  • You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customer
    13·1 answer
  • Write a program that reads a list of integers, and outputs those integers in reverse. The input begins with an integer indicatin
    6·1 answer
  • What is computer? Write is features <br><br><br><br><br>​
    14·1 answer
  • Write down the functions of network layer in your own words.ASAP
    14·1 answer
  • Which pane in PowerPoint contains images of the slides in the order they appear in the presentation
    8·2 answers
  • 1) Input - to be done in main() Prompt the user for and input the number of units. Prompt the user for and input the amount for
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!