1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
3 years ago
13

from january 2005 through july 2015, approximately how many electronic data records in the United States were breached, exposing

to attackers a range of personal electronic data, such as address, social Security numbers, health records, and credit card numbers?
Computers and Technology
1 answer:
Brums [2.3K]3 years ago
4 0
From January 2005 through July 2017, approximately 853 million electronic data records in the US were breached.
This allowed the attackers to take control over people's personal data, such as their various credit card numbers, and other important data, as well as their addresses, etc. The cyber police, as well as the regular police have been working hard to stop this from happening, but the hackers are very strong and smart.
You might be interested in
A window may be resized by dragging the___ or side of it
dangina [55]

top i believe is the answer


4 0
4 years ago
Read 2 more answers
A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and only 3 of
krek1111 [17]

Answer: the correct answer is D. Spectrum Analyzer tool

Explanation:

A spectrum analyzer is a piece of electronic equipment that is used to gauge the magnitude (amplitude or strength) of a given input signal set against the full frequency range of the instrument. It is mainly used to measure the strength of the range of known and unknown signals.

4 0
3 years ago
Give three reasons to use a hard drive as mass storage.
serious [3.7K]

Answer:

Every computer – whether it's a tower desktop or laptop – is equipped with an internal hard drive. The hard drive is where all your permanent computer data is stored. Whenever you save a file, photo, or software to your computer, it's stored in your hard drive

Explanation:

Backups and Archives. ...

Media Libraries. ...

Large Capacity Storage. ...

NAS Drives and Security. ...

RAID Arrays. ...

Other Uses.

8 0
3 years ago
Ep-34 where should you aim a fire extinguisher's stream when extinguishing a fire?
patriot [66]
When extinguishing a fire, the extinguisher's stream should be aimed at the base of the flame using a sweeping motion. This will allow one to kill the fire from the source. This will quickly put out the fire faster applying the extinguisher from the upside.
8 0
4 years ago
In order to write a successful algorithm, you must first be able to:
svp [43]
First define the problem
4 0
3 years ago
Other questions:
  • Write a program that lets a user enter N and that outputs N! (N factorial, meaning N*(N-1)*(N-2)*..\.\*2*1). Hint: Initialize a
    5·1 answer
  • How many values will the user submit each time this form is used? Color: RedBlueGreen Quantity:
    10·1 answer
  • There are 10 red apples and 12 green apples in a basket. If Vinta randomly selects 3 apples from the basket, what is the probabi
    15·1 answer
  • What is the real meaning of hack and crack?
    6·1 answer
  • In a stream channel what is deposited first?
    7·1 answer
  • Which one of the following UNIX utilities is purpose-built to quickly return the location (filepath) of files by querying a data
    15·1 answer
  • Consider the following methods.public void modParams(int[] x, int[] y, String[] s){x[1] = 5;y = x;s[1] = new String("five");s =
    6·1 answer
  • Urgent ..algorithm and flowchart to check weather a number is odd or even ???​
    8·2 answers
  • What do I do if my friend wants me to watch a video at my house?
    8·2 answers
  • A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!