1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
exis [7]
3 years ago
10

An act or object that poses a danger to assets; it can be caused by a hacker (those who use their knowledge to break into comput

ers and networks for profit or for the challenge of it); and it can be caused by viruses (software written with malicious intent to cause annoyance or damage, like worms, adware, spyware and ransomware).
Computers and Technology
1 answer:
LuckyWell [14K]3 years ago
8 0

Answer:

The correct answer is "threat".

Explanation:

The threat is an object which breaks the security in the computer system The threat object is performed by the hacker. A hacker is a person who breaks the computer security and the networks for the purpose of their profit or for any challenge to doing it.

The virus is the cause of the threat.The virus is a software program written with the  malicious intent to damage the computer system . worms, adware, and ransomware, etc are the example of a virus

You might be interested in
Brainliest to whoever answers this first, i need help explaining.
Semenov [28]

Answer:

1:

MOVE_FORWARD()

MOVE_FORWARD()

MOVE_FORWARD()

MOVE_FORWARD()

ROTATE_LEFT()

MOVE_FORWARD()

MOVE_FORWARD()

MOVE_FORWARD()

MOVE_FORWARD()

2:

MOVE_FORWARD()

MOVE_FORWARD()

ROTATE_LEFT()

ROTATE_LEFT()

ROTATE_LEFT()

MOVE_FORWARD()

MOVE_FORWARD()

MOVE_FORWARD()

MOVE_FORWARD()

ROTATE_LEFT()

MOVE_FORWARD()

MOVE_FORWARD()

Explanation:

4 0
3 years ago
What major criteria must a product or process meet in order to be considered emerging technology?
STALIN [3.7K]
If I understand the question correctly it is anything you are people consider helpful or useful that makes things easier!! Hope this helped!
6 0
4 years ago
Please help me. Adnan also wants to add a photograph of a bridge. It is on another PowerPoint presentation that is open in a dif
Nana76 [90]
C. screen clipping feature
7 0
3 years ago
1024 Megabytes = ____________
UNO [17]

Answer:

1024 MB = 1 GB

plz mark me as brainliest OK

3 0
3 years ago
Internet control message protocol (icmp) is a method of ip address assignment that uses an alternate, public ip address to hide
Elanso [62]
B False





---------------------------------
3 0
4 years ago
Other questions:
  • Abigail is interested in connecting her tablet that usually connects to a wireless network, to her personal computer that usuall
    11·2 answers
  • The technology (software) that automatically downloads website information to your computer is called ________.'
    15·1 answer
  • Your grandmother was an established artist and left you several original paintings after she died. Which of these statements is
    6·1 answer
  • By default, windows does not display ____________________ in windows explorer.
    8·1 answer
  • What is the system of phonographic disc recordings paired with a projector called?
    9·1 answer
  • What are some ways tables can be inserted into a document? Check all that apply.
    5·2 answers
  • To drive defensively means taking proactive measures to avoid accident situations regardless of their potential causes.
    6·2 answers
  • Write a recursive method that receives a string as a parameter and recursively capitalizes each character in the string (change
    5·1 answer
  • Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to pi
    8·1 answer
  • Help a brotha out..................
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!