1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scZoUnD [109]
3 years ago
7

LITERALLY PLS ANYONE!!! 90 pointsss!

Computers and Technology
2 answers:
Doss [256]3 years ago
6 0

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

krok68 [10]3 years ago
4 0

Answer:

I had this same test

Explanation:

You might be interested in
SecOps focuses on integrating the need for the development team to provide iterative and rapid improvements to system functional
IRINA_888 [86]

Answer: (B) <em>False</em>

Explanation:

SecOps also known as the Security Operations is referred to as a collaborative or combined effort between Information Technology security and the operations teams that tend to integrate technology, tools, and processes in order to meet the collective aim goals and aim of keeping an organization and enterprise secure while on the other hand reducing risk and also improving organizations agility.

5 0
3 years ago
I damaged a k12 laptop. do I have to pay for the damage? and if so how much?
Gnesinka [82]

You explain your situation, they send you a new computer, then mail to them the broken computer and later pay a $200-350 dollar fee. I think it depends on how much damage you made to it.

5 0
3 years ago
Identify the careers that require a college degree
Vikentia [17]
Doctor or teacher or an engineer

8 0
3 years ago
Which is an example of artificial intelligence in computers? A. multimedia software B. encryption software C. voice recognition
andrezito [222]

Answer:

its option b encryption software

Explanation:

Artificial intelligence (AI) is intelligence demonstrated by machines, unlike the natural intelligence displayed by humans and animals, which involves consciousness and emotionality. The distinction between the former and the latter categories is often revealed by the acronym chosen. 'Strong' AI is usually labelled as AGI (Artificial General Intelligence) while attempts to emulate 'natural' intelligence have been called ABI (Artificial Biological Intelligence). Leading AI textbooks define the field as the study of "intelligent agents": any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals.[3] Colloquially, the term "artificial intelligence" is often used to describe machines (or computers) that mimic "cognitive" functions that humans associate with the human mind, such as "learning" and "problem solving".

3 0
3 years ago
What are some examples of environmental technology
Zarrin [17]
Some examples of environmental technology is recycling.
3 0
3 years ago
Other questions:
  • Arrange these stages of website design in the order that they follow. developing planning learning designing testing and deliver
    12·1 answer
  • When you send an echo request message with the ping program, a successful attempt will return a(n) ______ message.
    8·1 answer
  • The 2 main types of copyright relevant to the recording industry?
    5·2 answers
  • What port in your computer will you use to plug in your camera?
    14·2 answers
  • Consider the following C code fragment:
    10·1 answer
  • JUST NEED TO KNOW WHO ALL DOSE EDGINUITY
    12·2 answers
  • Write an enhanced for loop that multiplies all elements in an int[] array named factors, accumulating the result in a variable n
    11·1 answer
  • Select the correct answer from each drop-down menu. The following diagram shows four resistors. What is the effective resistance
    9·1 answer
  • To make changes to how UAC operates, you must be logged in as administrator true or false
    6·1 answer
  • sing the drop-down menu, identify the flowchart symbols. The oval represents the . The rectangle represents the . The diamond re
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!