1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
4 years ago
5

Which safety issue is considered to be a data safety issue?

Computers and Technology
1 answer:
Andrews [41]4 years ago
4 0
<span>Computer and technology-related dangers to an individual's personal, financial, emotional or physical well-being are considered as data safety issues.
There are several things you should do to prevent computer dangers: </span><span>make regular backups of files, protecting yourself against viruses (use an anti-virus software) , <span>use a  passwords so that access to data is restricted, use a firewall , </span></span>
You might be interested in
Complete the firstMiddleLast() function to return a new string with the first, middle, and last character from string. If string
morpeh [17]

public static void main()

{

String s = Console.ReadLine();

int len = s.length();

Char startletter = s[0];

Char endletter = s[len-1];

string midletter = ‘’;

if(len % 2 ==0)

midletter = s[len/2] + s[(len/2) +1]

else

midletter = s[len/2];

Console.WriteLine(startletter + midletter + endletter);

}

Here the logic is that, startletter is obtained using the index ‘0’, the last letter is obtained by calculating the “length of the string” and subtract 1 to get the “last index” of the given string.

Middle letter is calculated by first finding whether the given string length is “odd or even” and based on that index(es) are identified.

4 0
3 years ago
What are factors that limit a technological design
Oksana_A [137]
The factors that limit a technological design can be physical and social. The physical limitations are constraints due to nature itself. They  include natural laws and properties of materials.
Social limitations on the other hand <span>are limitations that arise as a result of the society we are living in and include the ease of use, safety, attractiveness, and <span>cost.</span></span>
7 0
3 years ago
Read 2 more answers
Question 2 Multiple Choice Worth 5 points)
Finger [1]

Answer:

Answer:much faster than Humans can

4 0
3 years ago
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
3 years ago
Join my among us <br><br> code GNLMJF
ryzh [129]

Answer:

i cant

Explanation:

i would but im on a chromebook rn

sorry but thanks

take care

8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the best overall approach to education and career development for IT professionals?
    14·1 answer
  • Which method is the best way to keep from running late on the day of a test
    10·1 answer
  • The narrative structure of the popular movies can be broken down into
    15·1 answer
  • The set of instructions that tells a computer
    12·2 answers
  • Which U.S. government agency first funded the development of the Internet?
    12·2 answers
  • What types of storage can be used to access your data on another computer
    5·1 answer
  • 20
    6·1 answer
  • At currents as low as
    5·1 answer
  • The best team in nba like right now
    8·2 answers
  • Why header files are needed in every c program ?expalin​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!