1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
12

An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it is known

as a(n) __________.
Computers and Technology
1 answer:
harkovskaia [24]3 years ago
5 0

Answer:

Attack.

Explanation:

Attacks can be active or passive, inten- tional or unintentional, and direct or indirect.

For example, a person who harmlessly reads sensitive information not intended for his or her use is committing a passive attack.

A hacker attempting to break into an information system is an intentional attack.

An electricity outlet spark that causes a building fire is an unintentional attack.

A direct attack is perpetrated by a hacker trying to break into a system.

An indirect attack is a hacker compromising a system and using it to attack other systems.

Direct attacks originate from the threat itself. Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat.

You might be interested in
A computer projecter is an example of a(n):<br> Input Device<br> Output Device<br> Storage Device
oee [108]

Answer:

A computer projector is an example of an output device.

Explanation:

Because it converts information into imagery humans can understand.

7 0
3 years ago
Read 2 more answers
I only want someones opinion on this not anything you would find in a book.
Hoochie [10]
As a missile training device in the 80s to help train the anti missile defense personnel to take down nuclear missiles.
4 0
4 years ago
What symbol do we use to assign a value to a variable or constant in algorithms?
jekas [21]

The symbol that we do use to assign a value to a variable or constant in algorithms is =.

<h3>What is used to assign a constant to a variable?</h3>

The const keyword is known to be one that tends to specifies a variable or object value that is known to be  constant.

In computing and computer programming, there are different kinds of variables as well as symbols that are used for different purposes.

Note that if you assign a variable, you need to use the = symbol and thus The symbol that we do use to assign a value to a variable or constant in algorithms is =.

Learn more about algorithms from

brainly.com/question/13800096

#SPJ1

3 0
2 years ago
Organizations following Waterfall methodology usually begin with requirements gathering, in which the development team attempts
Aleks04 [339]

Answer:

Project teams do smaller portions of the entire project in small sprints.

Teams can interact to handle different steps simultaneously if needed.

Documentation is still required to keep everybody on track. This documentation allows teams to keep control over what version of the project they are working on and how the project has changed along the way.

As an approach to rapid development, the focus is on development rather than planning, enabling teams to start work more quickly.

hope this helps you

:)

7 0
3 years ago
The Hazard Communication Standard, commonly called the “Right-to-Know” law, gives you the right to know what information?
AlladinOne [14]
The answer to your question is D, OSHA requires employers to let employees of any hazardous chemicals exposed,or not.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which is better to use for cleaning electronics, Ethyl alcohol vs isopropyl alcohol?
    14·1 answer
  • Required
    12·1 answer
  • Write a program that prints the following 45 pairs of numbers:
    10·1 answer
  • In two or more complete sentences, summarize the difference between renewable and nonrenewable resources? Justify your responses
    13·2 answers
  • Mrs. Johnson is here today to receive an intercostal nerve block to mitigate the debilitating pain of her malignancy. Her cancer
    13·1 answer
  • Which of the following technologies allows you to decouple the physical storage hardware from the storage requirements of the ap
    6·1 answer
  • What is a fundamental difference between the SAP platform and the AirBnB platform?
    10·1 answer
  • HOW TO CHANGE GRADE IN SKYWARD!!
    10·1 answer
  • ***URGENT***
    8·1 answer
  • What is a good indicator that someone on social media is not who he or she claims to be?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!