1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makkiz [27]
3 years ago
8

5. You were discussing software piracy with a friend and were surprised to learn how software piracy can impact your life every

day. What is a risk or an effect of software piracy?
Computers and Technology
1 answer:
hammer [34]3 years ago
5 0
In class we learned not to keep but so much information on software. Your information can be hacked at any given moment. Hackers can use your information to their personal used. Do not open or respond to spam emails or pop ups saying you won anything its a scam and they can send a virus to your computer only thing they need is for you to open the email. If you have a virus backup your data then reset your whole computer the virus would be gone. Software privacy can effect your life very much just watch what you put on your computer.
You might be interested in
If Scheme were a pure functional language, could it include DISPLAY ? Why or why not?​
VARVARA [1.3K]

Answer:

When Scheme is a pure functional language, it cannot include the function DISPLAY. Since the pure functional languages will return the same value whenever the same expression is evaluated, and the DISPLAY would be the output and thus it cannot be part of the purely functional language. Thus in the pure functional language we can evaluate the expressions with the same arguments and it returns the same value since there is no state to change.

Explanation:

4 0
3 years ago
ANWSER ASAP
Alona [7]

Answer:

Cell wall more selectively controls what goes in and out of the cell, it gives a plant cell its shape, is rigid.

6 0
3 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
RideAnS [48]

Answer:

True.

Explanation:

A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.

Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.

6 0
3 years ago
Draw a flowchart or write pseudocode to represent the logic of a program that allows the use to enter values for the width and l
DIA [1.3K]
In psuedocode it would be:

length = input()
width = input()

area = length * width

print(area + " sq ft");

3 0
3 years ago
Define a model or version that is used to test an idea is called a _______.
gulaghasi [49]
The answer is prototype
5 0
3 years ago
Other questions:
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • When configuring a vpn server to automatically assign ​ip addresses to remote clients, how many ip addresses are in a single poo
    10·1 answer
  • A computer consists of both software and hardware. a)Define the term software​
    5·1 answer
  • Having data in a column formatted differently based on value is known as
    7·1 answer
  • Explain what the problems with the implementation of the function are, and show a way to fix them.// return true if two C string
    7·1 answer
  • I need help <br> with a question<br> what can i write for ex when he mad
    13·2 answers
  • The ability to use various design software such as Adobe Photoshop, InDesign, and Illustrator would be MOST beneficial to which
    6·1 answer
  • Both tangible and intangible property? are not covered by intellectual property protections. are both covered by intellectual pr
    5·1 answer
  • Hello safiya77 this is for you
    6·1 answer
  • You have received an update package for a critical application you are running on a virtual machine. You have been told to insta
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!