1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
3 years ago
14

A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password

s.
Computers and Technology
1 answer:
Setler [38]3 years ago
5 0

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

You might be interested in
Question 21 pts How many lines should an email signature be? Group of answer choices "5 to 6" "7 to 8" "1 to 2" "3 to 4"
Virty [35]

Answer:

"3 to 4"

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.

An email signature can be defined as a group of texts (words) that a sender adds to the end (bottom) of his or her new outgoing email message. It is considered to be a digital business card that gained wide acceptance in the 21st century. Also, an email signature is a good etiquette in all formal conversations because it provide the recipient some level of information about the sender of an email message.

Ideally, an email signature should be three to four lines and must contain informations such as name, website address, company name, phone number, logo, catch phrase or quote, social icons, etc.

Additionally, you shouldn't place an email signature at the top or anywhere else in the email except at the bottom, immediately after the closing line.

7 0
3 years ago
Where is the typical location of a touchpad inside of a laptop?
butalik [34]

Answer:

Attached to the keyboard

Explanation:

Touch pad is the type of the mouse that is located on the laptop just near the keyboard or we can say that it is attached to the keyboard of the laptop. It has almost two buttons that are used for the purpose of Left and Right Click.

The touch pad is used to move the cursor to the required position on the screen of the laptop. This will work by just moving figure on the touch pad as the cursor move on the screen in the same direction of the finger..

5 0
3 years ago
Which would increase electric current? increasing the resistance increasing the size of the wire decreasing the voltage
Neko [114]
The answer is the second answer Increasing the size of the wire.
8 0
3 years ago
The length of a pencil would most likely be measured in:
Nataliya [291]
The length of the pencil would most likely be measured in centimeters.
6 0
3 years ago
Read 2 more answers
The shortest compressed format of the ipv6 address 2001:0db8:0000:1470:0000:0000:0000:0200 is
devlian [24]

The answer is : 2001:DB80:1470::200

A double colon ( :: ) can replace any single, contiguous string of one or more 16-bit segments (hextets) which is  consist of all 0s, and it can only be used once per IPv6 address. Therefore,any leading 0s (zeros) in any 16-bit section or hextet can be omitted.

3 0
3 years ago
Other questions:
  • The front surface of the CCD is called the _________
    11·1 answer
  • Category 6 is an example of a ________ used to connect wired network devices.
    9·1 answer
  • Computer virus is a<br> a. software<br> b. hardware<br> c. bacteria<br> d. none of these
    13·1 answer
  • . Two or more functions may have the same name, as long as their _________ are different.
    9·1 answer
  • Write a program that uses these bounds and bisection search (for more info check out the Wikipedia page on bisection search) to
    8·1 answer
  • Which term collectively describes hard disks, CDs, and flash drives?
    11·2 answers
  • Please help!<br><br> What is a non-iterative programming structure?
    11·1 answer
  • Cash cows are always in
    7·1 answer
  • How to make a harmonic mean algorithm in bash Linux?
    15·1 answer
  • Choose the answer.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!