1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
konstantin123 [22]
3 years ago
13

I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)

Computers and Technology
1 answer:
Oksanka [162]3 years ago
4 0

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

You might be interested in
. Describe a way to simplify a complex problem.
Inga [223]

Answer:

Simplify a complex problem means reduces its complexity and make it easy to understand. When we make the problem simplified then, the data become more clear and understandable.

There are many ways to simplify a complex problem as follows:

  • Organize the information and content properly and reduces the layers of complexity. Organized the content in the form of steps so that it become easy to understand.
  • Use of clear language is one of the most important part to make the content more clear and use proper formatting of the data.
  • Break the information into smaller parts to it can easy to read and looks more clearly. So, the reader finds it more comfortable and efficient.

5 0
3 years ago
Program documentation _____.
otez555 [7]

Answer:

Option A is the correct option for the following question.

Explanation:

Because Program documentation is the documentation in which contain the information about the software and also contain the logic of the modules of the program is user-friendly and convenient language about that application or the software and it is hard copy or any digital manual through which the programmer has to know about the application.

So, that's why the following option is correct.

7 0
3 years ago
What is the best option for sharing Word documents on a Microsoft network because it provides finer degrees of versioning contro
babymother [125]

Answer:

SharePoint Server

Explanation:

One drive you are not being provided with the opportunities like the versioning, check-outs and content approval. However, through SharePoint Server, you are being leveraged with all these features. Through versioning, you can update the document anytime, and also keep track of previous versions as well as the changes that you are making. Through content approval, you can ensure various members have approved permission privilege with them regarding the publication of the content.

Through checkout and check-ins the users can have control ob the new versions of the document as well as while the check-in the document, they can comment on the changes they have made.

6 0
3 years ago
Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and ins
Murljashka [212]

Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack.

<h3>What is downgrade security attack?</h3>

A downgrade attack is known  to be a kind of of cyber attack that is made up of the fact that an attacker is known to often forces a network channel to make a switch to a kind of an unprotected or one that is said to be less secure data transmission standard.

Note also that the  Downgrading of a given protocol version is said to be a key element of  a type of a  man-in-the-middle attacks, and it is known to be one that is often used to take or hijack encrypted traffic.

Hence, Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack

Learn more about Downgrade attack from

brainly.com/question/24304791

#SPJ1

3 0
2 years ago
Operating systems are designed to work with specific hardware. Which operating system works with Apple computers?
Ghella [55]
2. Mac and to be more precisely, OS X
5 0
3 years ago
Read 2 more answers
Other questions:
  • Numeric data is stored in ___________ for direct processing.
    10·2 answers
  • Suppose you send data to the 11111111 11111111 11111111 11111111 ip address on an ipv4 network. to which device(s) are you trans
    15·1 answer
  • Convert 578.2 into hexadecimal​
    13·1 answer
  • Software that manages and supports the resources of a computer is known as?
    10·1 answer
  • Assume that isIsosceles is a bool variable, and that the variables isoCount, triangleCount, and polygonCount have all been decla
    11·1 answer
  • What provides quality education for students
    14·1 answer
  • A task-oriented leader is ideal for a creative workplace.
    8·2 answers
  • which term describes the layer of software that resides between the virtual operating system and the physical hardware it runs o
    5·1 answer
  • __________ implements a security policy that specifies who or what may have access to each specific system resource and the type
    8·1 answer
  • Which response best completes the following IF-ELSE statement?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!