1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
8

2a

Computers and Technology
1 answer:
zmey [24]3 years ago
7 0

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

You might be interested in
Why do you think viruses are called “viruses”? What do they have in common with the living viruses that cause diseases in humans
Vinvika [58]

Answer:

Computer viruses are referred to living viruses as they both have similar effects.

Explanation:

While living viruses invade cells and cause harmful effects on the body, computer viruses basically do the same thing. Computer viruses are a malicious code that inserts itself into a computer. It's designed to spread to one computer to another, just like a living virus.

Similarities:

  • Spreads from one host to another.
  • They both alter/harm the host.
  • Both can replicate itself.

Differences:

  • A computer virus is manmade, while living viruses aren't.
  • A computer virus needs to be removed manually through an app or software while living viruses are almost curable medicine.
  • A computer virus effects machines and software while living viruses only infect living organisms.
5 0
3 years ago
Read 2 more answers
in what way do rules and laws created to address public problems affect individuals groups and business
Anika [276]

Answer:

Explanation:

bussnise

4 0
3 years ago
\What will the weather most likely be like the day after a warm front? (4 points) The temperature will be cool or cold, and ther
poizon [28]

The temperature will be warm, and there will be no rain.

5 0
3 years ago
Read 2 more answers
110101111.11011 to decimal (base 10)
Leokris [45]
The part 110101111 is 1+2+4+8+32+128+256 = <span>431

The part after the dot is 1/2 + 1/4 + 1/16 + 1/32 = </span>0.84375

Together that's 431.84375
4 0
4 years ago
Pedro is at a conference for computer programmers and wants to attend a session on new features in software that help write code
Natasha_Volkova [10]

Answer:

1) Variable Management for Beginers

6 0
3 years ago
Other questions:
  • What is a “spoof” of an ad ?
    8·2 answers
  • A system of interlinked documents that are available on the internet is
    5·1 answer
  • You type the word "weather" when you meant to type "whether". When will Microsoft Writer or Microsoft Word flag this as a misspe
    11·2 answers
  • Which type of natural hazard is sometimes caused by human activity?
    6·1 answer
  • Explain Text align , Text Decoration, colour, Text shadow..​
    11·1 answer
  • I need the answer ASAP. I’ll mark brainliest if right
    5·1 answer
  • After Alexandra installed new software, she set it up to perform in a certain way. She is _____. changing the peripherals linkin
    10·1 answer
  • What type of software repairs or improves a larger application that is already installed on a system?
    9·2 answers
  • Sharing private information causing a person to be humiliated is considered to be doxing. T or F
    8·1 answer
  • E. Write an algorithm to show 'How to prepare a cucumber sandwich?". ​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!