1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr_godi [17]
3 years ago
12

The amount of interest you will earn in one year from a savings account is the _____. A) APY B) return C) IDA D) CD

Computers and Technology
2 answers:
pav-90 [236]3 years ago
7 0
B) return,<span>D) CD  i now is the </span>
levacccp [35]3 years ago
3 0

answer is a.) APY ..............................

You might be interested in
I need help with doing a debate for ela. The debate topic is "do you think we are to dependable on our laptops/cellphones. My te
Mama L [17]

Answer:

I think we are so this is hard lol

Explanation:

we are not too dependable

things that show this is library are still open, school sports teams still flourish(if we were too depending on them they wouldnt) they help us plan ways to interact in person if we were too dependent businesses would struggle more and only be online

this is hard if I can think of any others I'll come back I'm sorry if this isn't any help

7 0
3 years ago
Read 2 more answers
What are the most recent attacks on computer security that you face this month? Use the Internet to search for the latest attack
grigory [225]

Answer:

Now a days every thing can be done on the internet easily but this internet has various drawbacks with that as the most of our personal information we share on internet these days so if anyone attacks on your server then he/she can easily access all the private information including financial details and this attack is known as cyber attack. there are various ways to attack on the internet some of them are-

1.Malware- it is shortly known as the malicious software, malware can be described as worms, viruses, trojans these all are variety of malware which provide root access to the attacker by which they can control the system remotely.

2.phising- This is a technique by which the criminals craft emails to fool a target into taking some harmful action. The recipient might be tricked in downloading malware that disguised as an important document for instance or argued toclick on that link that takes them to a fake website where they can get the password which are necessary for any transaction.

3.Ransomware- This is like a malware which is stored in the computer and easily encrypt all the necessary files of the victim's computer and after that they demand some ransom to decrypt it.

4.SQL injection- This is the process by which the SQL command gets injected by the attacker into the victim's system so that the attacker can easily gather all the necessary information which they want to take control on the system.

These attacks are very dangerous for the system because the attacker can get all the necessary information about the user and can easily harm him/her by getting their personal information.

There are various steps to prevent these attacks which are-

I.secure your hardware- The user has to prevent their hardware from lost or steal. protect all devices with a complicated password, share that password with the device user only.

II.Encrypt and backup data- You have to prevent your data by making the backup of the necessary files so that if any of your information gets lost then you can retrieve it from your backup.

III. create a security focused workplace- Employees are the most common ways of breaching of the data as many don't recognise the external threats the internal one breaches the security and it cause the loss of the information.

some latest viruses are-

1.cyborg ransomware-This virus is present in the floppy disk which is used by the user and can cause the count of time the system reboot. it's new variant is present in windows 10.

2.Gobrut-This is also one of the latest viruses it is capable enough to detect weak passwords and can cause loss of information.

3.jokeroo-This virus works as the ransomware their author spread it in the computer system which will encrypt the files and for decrypting it they demand ransom for that.

4.Trojan Glupteba- Once this virus enters the system the user cannot know that the system is infected and it will slowly communicates with the IP of the system which results in loss of the confidential information.

Most vulnerable platforms are-

1.Social engineering- The social networking sites has most of your personal information of the user which can be used by the attacker to get the necessary information.

2.cloud computing services- More companies use to store their most of the information on the cloud which is used by the attacker to get the confidential passwords which can cause loss of the essential information.

Explanation:

6 0
3 years ago
2. Damaris is creating an object in Blender. He wants to change the illumination of the object that he is working on, but can’t
MariettaO [177]

The way that  Damaris can change the illumination of the object that he is working on in Blender is by:

  • First, one need to left-click on the lamp and then put  it in a place in your scene so that it can be able to illuminate the needed or required area. You can also do the above by  tweaking a lot of settings using the lamp options so that you can be able to get the lighting that you need . The most popular ones to tweak are those that have strength and color.

<h3>How do I change my light in Blender?</h3>

To view all options related to lights in Blender, enter the Object Data tab in the properties window while the lamp is still chosen.

You can alter your light kind and set energy and color settings at the top.

Therefore, The way that  Damaris can change the illumination of the object that he is working on in Blender is by:

  • First, one need to left-click on the lamp and then put  it in a place in your scene so that it can be able to illuminate the needed or required area. You can also do the above by  tweaking a lot of settings using the lamp options so that you can be able to get the lighting that you need . The most popular ones to tweak are those that have strength and color.

Learn more about Object from

brainly.com/question/2141363
#SPJ1

4 0
1 year ago
Write a SELECT statement that displays each product purchased, the category of the product, the number of each product purchased
Blababa [14]

Answer:

y6ou dont have mind

Explanation:

6 0
3 years ago
একটি ডকুমেন্ট তৈরী করে ড্রাইভে সেভ করার পদ্ধতি বর্ণনা করো
kotykmax [81]

Answer:

To create a document, you have to go into Google Docs and make a new document, and then it automatically saves to Drive for you.

Explanation:

4 0
3 years ago
Other questions:
  • The logical view of a database system refers tohow a user or programmer conceptually organizes and understands the data. how the
    5·1 answer
  • Analyze the following code (in both cases number has been declared and initialized): Code 1: boolean even; if (number % 2 == 0)
    9·1 answer
  • Noticing his reduced performance at work, Dan enrolled himself for training sessions offered by the company and saw his producti
    13·1 answer
  • Write the program to solve quadratic equations, but if the discriminant is negative, output
    9·1 answer
  • _____ is the widely used transport layer protocol that most Internet applications use with Internet Protocol (IP).
    9·1 answer
  • 13. An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to acce
    12·1 answer
  • 1) Using the density equation d=m/V: What is the density of a piece of metal with a mass o
    10·1 answer
  • What is the value of 8n when n= = 2?​
    13·1 answer
  • Which of these can be a problem for people with accessibility issues? Select 4 options.
    7·1 answer
  • What is a very important difference there between the wiring of an electromechanical thermostat and an electronic programmable t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!