1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler [38]
4 years ago
12

___ is a career discipline focusing on helping companies use computer technology effectively.

Computers and Technology
1 answer:
tamaranim1 [39]4 years ago
7 0

Answer:

Information technology

Explanation:

These other options focus on different disciplines of computers.

You might be interested in
After reviewing device security you learn that a malicious user in an airport
NARA [144]

Answer:

Sniffing.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.

Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.

A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.

Basically, an unauthorized packet sniffer is used to steal user informations.

This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.

In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.

4 0
3 years ago
What is the total utilization of a circuit-switched network, accommodating five users with equal bandwidth share, and the follow
VMariaS [17]

Answer: 49.0%

Explanation:

Given the total number of users = 5

Let the total bandwidth be 100 units

Each user share = 100/5 units = 20 units each

• 2 users are using 63% of their shared bandwidth:

This means 63% of 20 units = 0.63 *2*20 = 25.2

• 2 users are using 58% of their shared bandwidth:

This means 58% of 20 units = 0.58* 2* 20 = 23.2

• 1 user uses 3% of their bandwidth share:

This means 3% of 20 units = 0.03* 1* 20 = 0.6

Therefore, total amount of used bandwidth becomes = 25.2 + 23.2 + 0.6

Total bandwidth under usage = 25.2 + 23.2 + 0.6 = 49

Utilization becomes = (bandwidth under usage/ maximum bandwidth)*100

(49/100)*100 = 49%

I hope this helps, cheers.

4 0
3 years ago
With the _______ network topology, reliability is the major advantage while high cost is the disadvantage.
WINSTONCH [101]
<span>With the mesh network topology, reliability is the major advantage while high cost is the disadvantage.
Because of its reliability advantage mesh topology is used in backbone networks, because of the redundancy the failure of one node in the network does not result in failure of the entire network. However lot of cabling is required and the cost and maintenance requirements are high. 

</span>
7 0
3 years ago
Help on What i should say to my IT school lady? Read all three pages
avanturin [10]

Answer:

if you were to rest my would I still be able to have all my stuff that I have done if so I think you could reset it for me

hope this helps

have a good day :)

Explanation:

4 0
3 years ago
To apply a style to one or more elements on a web page, configure a css ________.
saul85 [17]
External style sheet

element {
background-color: #ffffff

}
5 0
3 years ago
Other questions:
  • The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets sho
    14·1 answer
  • What is the most important external issue when using social media in emergency management?
    6·1 answer
  • What is the minimum number of data points you should usually have to look for signs of improvement on a run chart?
    8·1 answer
  • Which line in the following program contains the prototype showDub function? 1 #include 2 using namespace std; 3 void showDub(in
    12·1 answer
  • Use the drop-down menus to complete the statements about how to crop an image in a word document.​
    5·2 answers
  • You need to design online to form in which users have to type their name and password to log into an application. The password c
    6·1 answer
  • Write any two web browers​
    10·1 answer
  • What is contained in the Open Files section of Shared Folders? ​
    13·1 answer
  • What is a list of things we use programming for??? longest gets brainly
    5·1 answer
  • "kannst du mir bitte helfen" in German-English from Reverso Context: Hier, kannst du mir bitte helfen?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!