1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
3 years ago
9

A company has determined that its annual profit is typically 51 percent of total sales.

Computers and Technology
1 answer:
const2013 [10]3 years ago
5 0
Congratulations to the company!

You might be interested in
Jason needs to design the colors for a web site that make it easy to read. Which should he consider using?
ololo11 [35]

Answer: Dark background and light text.

Explanation:

Assuming when you mean by "light text", you mean by white text. This should be able to be readable by users visiting the site.

4 0
2 years ago
A small business has suffered from a cyber attack, what could be the resultant damage​
frutty [35]

Answer:

Cyber Attacks can damage small or big business. Different kinds of attacks will lead to the different losses. some of the most common attacks are

  • DOS Attack
  • Bruteforce Attack
  • DDOS Attack
  • XSS Attack
  • API Attack
  • Network Attacks
  • Identity and Token theft attack
  • Man in the middle attacks
  • Application Level Attacks

Each attack can impact different domain and different level of damages. The biggest damage can be loss of reputation and monetorial losses. It can eventually invite law suites and can make company go bankrupt.

Explanation:

Following damages can be seen with cyber attacks.

<u><em>Loss of Reputation : </em></u>Loss of reputation is the worst damage that any cyber attack can create. This will  result in the business losses and also result in irreversible damage to existing customer base and also it will spoil the market value.

<u><em>Loss of Corporate Information:</em></u> Attackers can use the corporate information which can consist of customers data, unwanted lawsuits and also company’s employees details. Data recovery may not be possible once the attacker has full corporate access.

<u><em>Loss of Identity: </em></u>Once the personal information is lost then Hackers can use personal information for impersonation, and identity theft. Identity theft is more dangerous as it is used for illegal activities.

Cyber-attacks can disrupt your business activities and it will include as below

<u><em>Loss of Data : </em></u> Successful cyber attack can damage the data and even can corrupt the data which will be of no use.

<u><em>Loss of Infrastructure :</em></u> Servers, computers, databases can be disrupted with a cyber-attack which can be irreversible and even be more disastrous as physical infrastructure is impacted.

<u><em>Extortion losses :</em></u> Attackers can threaten to disclose sensitive data and can intern ask for ransom payment.

<u><em>Lawsuits : </em></u>If the customer’s data is exposed or used for illegal business then it will invite huge lawsuits.

<u><em>Notification Policy :</em></u> If data is breached then it is also important to notify the effected users and the next remedy taken to resolve it.

<u><em>Loss of Business :</em></u> Cyber attacks can create business losses and also will eventually affect existing and new customers.

4 0
3 years ago
What's the maximum number of ad extensions that can show for a particular query or device at any given time?
krok68 [10]

Answer:

Four (4) extensions.

Explanation:

Go-ogle Ads can be defined as a strategic advertising platform designed and developed by Go-ogle for use over the internet. It can be used to display product listings, services and campaigns to any web user over the internet.

Basically, for those who are relatively new to the Go-ogle Ads, the company provides a feature known as the dynamic search ads which helps various users to easily run a successful ad campaign. Through the use of machine learning, a dynamic search ad allows phrases and titles associated with a website to be automatically indexed and presented as a landing page to any user who is searching with the keywords.

The maximum number of ad extensions that can show for a particular query or device at any given time is four (4) extensions. The Go-ogle Ad extension platform is designed to display all the ads simultaneously or co-trigger and as such, the maximum number of ad extensions that are displayed per query or device are four (4).

4 0
3 years ago
Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____. a) legac
il63 [147K]

Answer:

The answer is "option c".

Explanation:

A Web-centered view ensures anything has been programmed for the Web app or program. example Webified. This is a definition, that is used for personal use only and all other duplication is strictly forbidden without the approval of the author. and other options are not correct that can be defined as:

  • In option a, the legacy system is a method that is obsoleted today.
  • In option b, The mission-critical systems are used in the navigational system.
  • In option d, A distributed system permits the sharing of information that includes software that is connected with a network.

6 0
3 years ago
FFFFFFFFFRRRRRRRRRRRRRRRRRREEEEEEEEEEEEEEEEEEEEEEE
telo118 [61]

Answer:

THANKS I NEEDED THIS SOOO MUCH!!!$

6 0
3 years ago
Read 2 more answers
Other questions:
  • Dial-up connections can be made over a(n) ____ line or phone line. isdn dsl ipx tcp/ip
    12·1 answer
  • Exit network systems, information support, and software development are all careers in which career cluster?
    10·1 answer
  • ____ are systems in which queues of objects are waiting to be served by various servers
    5·1 answer
  • Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method. T
    14·1 answer
  • Write an assembly program that will prompt the user for 3 inputs (let’s abstractly call them a, b, and c) without a leading stri
    13·1 answer
  • What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?
    14·1 answer
  • Which of the following statements are true concerning abstraction and refinement? Select 3 options:
    14·1 answer
  • Write a list comprehension statement to generate a list of all pairs of odd posi
    7·1 answer
  • What is the result of the following code?<br><br> x=7//2+10%2**4<br><br> print(x)
    15·1 answer
  • Everyone within a company needs to be aware of what data can do to improve business processes and how to make it happen. Which c
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!