1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
3 years ago
13

from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing

to attackers a range of personal electronic data, such as address, social Security numbers, health records, and credit card numbers?
Computers and Technology
1 answer:
Brums [2.3K]3 years ago
4 0
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
You might be interested in
Please help on both of these questions will give brainliest<br> !!
Alja [10]

I think the first one is All of the above

3 0
3 years ago
Read 2 more answers
Without a well-designed, accurate database, executives, managers, and others do not have access to the ____________________ they
ohaa [14]

Answer:

Information

Explanation:

Good decisions are normally based on facts which are tangible information that can be analysed to show trends of key figures such as sales, income, production that are so critical in business. A well-designed and accurate database captures and stores these figures in an organised way which will enable the information or data to be analysed to make informed decisions.

6 0
3 years ago
A device that protects electronic equipment from an increase in power, but not a decrease or outage is a ___.
Basile [38]

Answer: A) Battery backup

Explanation:

 A battery backup are used to provide the source of power backup to various hardware components and desktop computers. In many cases, the devices are plugged into UPS ( uninterruptible power supply) for backup power and it is also depend upon the size of the UPS.

All the battery backups are located inside so that is why, the devices are heavy in weight. Usually, the battery backup front required additional button for performing various functions.

And the battery backup devices are manufacture by using the varying degree of backup abilities.

8 0
3 years ago
Explain why much of social media marketing is trial and error.
Ivahew [28]
The first thing that entrepreneurs need to realize is that the process and framework for making social media marketing work are different from traditional marketing, and trial and error certainly doesn’t work. Ric Dragon, an expert in online marketing, in his new book “Social Marketology<span>,” outlined the best set of steps I have seen so far for the new world:</span>
7 0
3 years ago
Ncomputing and thin client<br>what it is <br>why is done , how it works and how it's <br> done ​
SVEN [57.7K]

The term NComputing  is known to be a form of desktop virtualization company that is said to creates hardware and software to form virtual desktops.

The term Thin clients is known to be virtual desktops. They help a lot of users at the same time to share a single operating system instance.

<h3>What is the aim of a thin client?</h3>

In Ncomputer networking, a thin client is known to be a kind of low-performance computer that is known to be optimized and used for setting up a remote connection.

It is often used with a server-based computing system. The server here is one that often does most of the work, such as launching software programs, etc.

Learn more about Ncomputing from

brainly.com/question/12629145

4 0
2 years ago
Other questions:
  • Write a void function SelectionSortDescendTrace() that takes an integer array, and sorts the array into descending order. The fu
    9·1 answer
  • ________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
    12·1 answer
  • A law office has been leasing dark fiber from a local telecommunications company to connect a remote office to company headquart
    14·1 answer
  • Indicate the time efficiency classes of the three main operations (i.e., FindMax, DeleteMax, and Insert) of the priority queue i
    11·1 answer
  • How is a microkernel architecture different from a monolithic architecture?
    5·1 answer
  • Listed here are a few camera angles and their images.
    10·1 answer
  • In what way, if any, has community building changed in the age of digital media? People’s community building has not changed in
    13·1 answer
  • You have to cut a wood stick into pieces. The most affordable company, The Analog Cutting Machinery, Inc. (ACM), charges money a
    10·1 answer
  • Short note about micro miniaturzation​
    6·2 answers
  • Can someone follow my tt its c1ndy.dont.miss
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!