1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marishachu [46]
3 years ago
11

"someone has tampered with your computer and erased data". what kind of computer threat is this

Computers and Technology
1 answer:
pishuonlain [190]3 years ago
4 0
<span>So if some access your computer and erased some data without your permission or knowing then this threat is called as security threat. So you should have these stand alone systems with username and password concept that would protect your sensitive and private data and have the control over your computer.</span>
You might be interested in
What are examples of people who own the copyrights of their property? Check all that apply.
jolli1 [7]
"Nevaeh thinks of a name for her new company", "Alexis thinks of an idea for a new product" and "Josiah writes a poem" are open to copyright because they can claim that their work is original and cannot be reproduced without their consent. 
3 0
4 years ago
Read 2 more answers
What is the correct term for a piece of malware that hides inside a legitimate software program or file from trusted sources
Phoenix [80]

Answer: Trojan horse

Explanation:

Based on the Greek legend of how Greek soldiers hid in a Trojan horse to infiltrate and destroy Troy from within, Trojan horse malware mirrors this attack when attacking software.

It hides inside and disguises itself as a legitimate software program or a file from a trusted source and then when clicked on, it works to infect the software.

8 0
3 years ago
When creating an electronic slide presentation, Eliza should ensure that her presentation contains
kondor19780726 [428]

Answer: C) only one main idea on each slide.

Eliza needs to be able to use her electronic slide presentation to convey what the purpose of the presentation is. By providing one main idea on each slide, this would show the audience of Eliza exactly what she wants to convey to them. This would also help her audience get on board of what the whole idea of the presentation is.

8 0
3 years ago
1) Type a statement that gets an input value into variable numBers. Assume scnr already exists and numBers has been declared.
Sergio039 [100]

Answer:

Following are the code in the java language  

numBers = scnr.nextInt ( ) ;

Here scnr is an instance of scanner class .

Explanation:

In this code, we take the input by using the object of Scanner class i.e "scnr". The scanner class in the java programming language is used for taking the input by the user. The scnr.nextInt ( )  is taking the input which is stored in the  "numbers" variable.

So the whole program is looking like that  

import java.util.*; // import package  

public class Main

{

public static void main(String[] args) // main function

{

 int numBers; // variable declaration

 Scanner scnr=new Scanner(System.in); // create the instance of scanner class

 numBers=scnr.nextInt( ) ; // taking input

 System.out.println(numBers); // display the value of numBers

}

}

Output:

78

78

4 0
3 years ago
the corrective actions you need to perform on a computer in case it functions in an unexpected manner is called what
Vadim26 [7]
These actions are called troubleshooting. One of the first ones would be to save your work, if you can, close all open programs and then shut down your computer (not restart). Wait a couple if minutes, start and see if the problem has been alleviated.
5 0
4 years ago
Other questions:
  • Which of the following are incorrect safety precautions for equipment operators? A. Drive equipment or vehicles on grades or roa
    7·2 answers
  • Describe IT infrastructure. What is the role of business intelligence in determining the technology needs of a business?
    11·1 answer
  • You notice that it’s very easy to confuse medications at the community health center where you’re working. They are lined up on
    10·1 answer
  • Can you call a mobile a computer. It Yes<br>why? If No why​
    7·2 answers
  • You and your project team have been asked to generate a solution to a problem. The problem is not complicated, and you are sure
    6·1 answer
  • Explain how to utilize the computer in rooms management.​
    13·1 answer
  • What is the output?
    6·2 answers
  • A two-dimensional array has been defined to hold the quantity of each of 5 different healthy snack products sold in a tuckshop d
    10·1 answer
  • What is the dark web and what is the .onion domain
    15·2 answers
  • How are most databases organized?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!