1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
3 years ago
7

Which of the following activities can cause data to be damaged or lost?

Computers and Technology
1 answer:
jekas [21]3 years ago
3 0
Illegal access to a system
You might be interested in
In the last two decades, how have cameras evolved?
Artist 52 [7]

Answer:

The Changes to Camera Technology over the last 70 years. The technology that the modern camera is based on was created several hundred years ago. ... The company would then reload the camera with new film and send it back to the consumer so they could take more pictures with it.

Explanation:

8 0
3 years ago
Read 2 more answers
You just received a message from the internet which was encrypted with asymmetric encryption. what do you need to do to read the
Bezzdna [24]
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.

a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.

c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption

d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.

So e is the only logical answer.
5 0
3 years ago
If robots can work 24 hours a day, 365 days of the year,how many hours and days can humans work.
lesya [120]
In technicality, humans can work healthily 14-15 hours a day, 365 days a year. I subtracted the hours of the day needed for sleep and feeding.
3 0
3 years ago
Read 2 more answers
Where are the instructions stored that the computer needs when it is switched on?
WARRIOR [948]
This is stored in the ROM (Read Only Memory)
I believe that is the answer, all i can come up with.
4 0
3 years ago
List the general steps that are used to configure a soho router and set up the network
marusya05 [52]
Configure the Internet connection. 

Configure the wireless router. 

Enable NAT. 

Configure DHCP

Secure the SOHO network.
7 0
3 years ago
Other questions:
  • The keyboard, mouse, trackpad, microphone, light pen, and voice recognition are examples of _____ devices.
    5·1 answer
  • You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network I
    13·1 answer
  • What is the protocol in the web search at the bottom?
    13·1 answer
  • During an interview, your non-verbal communication (body language, gestures, tone of voice, speed of talking,
    6·1 answer
  • Computer programmers often use binary codes (strings of 1s and 0s) to write programs for computers. These codes are then changed
    6·1 answer
  • *Please* read before answering.
    14·1 answer
  • Computer hardware without computer software is useless while computer software without computer hardware is meaningless. Discuss
    10·1 answer
  • How major is the technology problem in the United States?
    15·1 answer
  • Which country was the first in the world to launch a mass media campaign in response to population growth?
    14·1 answer
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!