1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scZoUnD [109]
3 years ago
7

LITERALLY PLS ANYONE!!! 90 pointsss!

Computers and Technology
2 answers:
Doss [256]3 years ago
6 0

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

krok68 [10]3 years ago
4 0

Answer:

I had this same test

Explanation:

You might be interested in
I just logged onto brainly and all my questions were deleted and i lost 2 brainliest. What has brainly done to my account I also
krok68 [10]
I’d say message Brainly directly through email!! it would be easier for them to help solve the issue since all we really can do is assume what happened, I hope you’re able to figure it out =)
5 0
3 years ago
Read 2 more answers
What are the chief contributions of philosophy to artificial intelligence?
olga nikolaevna [1]

Answer

Hi,

The chief contribution of philosophy to artificial intelligence is the knowledge of the connections between the two and the understanding of the shared concept.

Explanation

Philosophy and Artificial intelligence has a close scientific connection because they both share concepts such as action, consciousness, epistemology and free will. From the artificial intelligence perspective, theories in philosophy are important in AI as long as they provide the basis of the designs, reasons and plan. The concepts shared in AI con tribute to the realization of the philosophy of artificial intelligence.

Hope this Helps!

5 0
3 years ago
C. why do manufacturers offer hard drive diagnostic software? what are the potential benefits of doing so to the manufacturer an
Alina [70]
<span>Hard drive diagnostic software can indicate whether there is a problem with a hard drive that is hardware related rather than software related, such as bad sectors. This software is beneficial to manufacturers as it can help isolate a problem that could be related to either hardware or software, helping to decide whether hardware needs to be repaired or replaced, and thereby reducing the cost to a manufacturer. This diagnostic software is also of benefit to the customer for the same reason in deciding whether to return a hard drive to the manufacturer or seeking a software-related solution. </span>
4 0
3 years ago
Read 2 more answers
For this question you must write a java class called Rectangle and a client class called RectangleClient. The partial Rectangle
polet [3.4K]

Answer:

Java.

Explanation:

public class Rectangle {

   private int x;

   private int y;

   private int width;

   private int height;

   ///////////////////////////////////////////////////////////

   public Rectangle(int inX, inY, inWidth, inHeight) {

       x = inX;

       y = inY;

       width = inWidth;

       height = inHeight;

   }

   ///////////////////////////////////////////////////////////

   public int getX() {

       return x;

   }

   public int getY() {

       return y;

   }

   

   public int getWidth() {

       return width;

   }

   public int getHeight() {

       return height;

   }

   ///////////////////////////////////////////////////////////

   public int getArea() {

       return width * height;

   }

   public bool isSquare() {

       if (width == height) {

           return true;

       }

       else

           return false;

   }

   ///////////////////////////////////////////////////////////

   public String toString() {

       return "Rectangle located at (" + x + "," + y + ")" + "with dimensions " + width + "x" + height + "and " + getArea() + "is the area.";

   }

}

8 0
3 years ago
If a while loop iterates forever,what is the most likely cause?
miv72 [106K]

Answer:

Runtime error probably. The program won't make it past the while loop in the code.

5 0
2 years ago
Other questions:
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • Which us electronic company was the pioneer in home video game consoles?
    13·1 answer
  • Which of the following is a preferable method to secure wireless access in a SOHO?
    12·1 answer
  • Which of the following is the shortcut key combination for pasting copied text?
    11·2 answers
  • How would you define media literacy?
    12·1 answer
  • An individual involved with the aspect of a project will be concerned with budgets and the costs associated with running a busin
    10·2 answers
  • If you need to modify a features in a part created using the Mirror tool, you can make the change in the original feature and th
    14·1 answer
  • What are different sheet icons
    5·1 answer
  • Complete the sentence.
    8·1 answer
  • failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!