1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
3 years ago
13

"You are on a service call to fix a customer’s printer when she asks you to install a software package. The software is on a per

sonally made CD with the key written on it. You suspect the software is pirated. What do you do?"
Computers and Technology
1 answer:
pickupchik [31]3 years ago
7 0

Answer:

Ask her to get a genuine software

Explanation:

if i will install, it can cause the following problems:

1. Prated software makes your system Vulnerable to the security attacks because the activities of the software are not monitored by any organization and no one is responsible for anything bad happened to your system.

2. It may stop working anytime because there would not be maintenance patches available for it so that it can work properly.

3. It cannot be updated and may cause problems in core functionalities of it.

4.Serious legal actions can be taken against anyone using them because  economy has drastic decrease due ti use of it.

You might be interested in
An intruder with malicious intent breaks into an office and steals a hard drive
Leya [2.2K]

Based on the above, the type of security is illustrated in this example is known as data security.

<h3>What is Data security?</h3>

This is known to be the act of keeping safe data from unauthorized access and its corruption in all of its lifecycle.

Note that in the case above, the intruder is interested in the companies data and as such,  the type of security is illustrated in this example is known as data security.

Learn more about  security from

brainly.com/question/15668437

#SPJ1

6 0
2 years ago
Early word processors ran on devices that look like digital
S_A_V [24]

Answer:

True

Explanation:

The word processor used to be the only office machine in the year 1960s, that combined the keyboard text-entry and various printing functions of an electric typewriter with the recording memory. And this recording unit was a tape or a floppy disk, with the simplest of processor applied for text editing. Hence, the above statement that the early word processors ran on the devices that look like digital is true.

6 0
3 years ago
Read 2 more answers
Use these sentence starters to explain how Cat Insanity is an analogy for debt repayment.
denpristay [2]

Answer: Can Insanity is like a debt repayment, if you don't pay or feed it on time they will die/ interest rate of the bank will be more and more expensive.

Explanation:

7 0
2 years ago
friend wanted us to decode this message ----- .---- ----- ----- .---- ----- ----- .---- / ----- .---- .---- .---- ----- .---- .-
hodyreva [135]

Answer:

01001001?01110111?01100001?01111001?00100000?01101001?01101011?01100101?01101100?01100001?01111001?00100000?01110101?01101110?01100001?01101100?01100001?01111001?00101110

3 0
3 years ago
What is actually hit and miss ratio in cache memory???
Irina18 [472]

choices plz ??


pplz add some choices

6 0
3 years ago
Other questions:
  • Assume that LO and HI have already been assigned as constants with LO &lt; HI, and x has been declared as DWORD in the data segm
    7·1 answer
  • Which of the following economic systems leaves production decisions completely up to the producers?
    15·2 answers
  • Write a fragment of code that will test whether an integer variable score contains a valid test score. Valid test scores are in
    6·1 answer
  • Why did artists use pinhole cameras during the renaissance?
    9·1 answer
  • Small data files that are deposited on a user's hard disk when they visit a website are called _______.
    6·2 answers
  • What stores all software and files on your computer and reads and writes data onto a spinning magnetic or optical disk?
    6·1 answer
  • In the Unified Process (UP) methodology, most of the Implementation activities occurs during the _____ phase.
    14·1 answer
  • In which generation of computers are we in?​
    9·1 answer
  • HELP ASAP DUE IN 10 MINUTES!!! HELP!!!!!<br> Problem solver<br> Logical<br> Innovative
    11·2 answers
  • The retention of encoded information over time refers to
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!