1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
3 years ago
13

__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea

se that information. 1) Competitive intelligence 2) Espionage 3) Information extortion 4) Intellectual property
Computers and Technology
1 answer:
Ludmilka [50]3 years ago
5 0

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
You might be interested in
HELP! WILL GIVE BRAINLIEST
maw [93]

Answer:

Creative, helpful, communicative, colorful, detailed

Explanation:

6 0
2 years ago
Read 2 more answers
Discuss one simple example of hybrid computer.​
andrezito [222]

Answer:

thermometer , petrol pump

5 0
3 years ago
What will cloud cumputing offer
seropon [69]
Cloud computing allows computers from all around the world that are not being used to be able to do extra computations. This removes many of the limitations of a single computer and lets the user calculate things much faster.
6 0
3 years ago
A job placement agency helps match job seekers with potential employers. The agency would like to design a simulation in order t
g100num [7]

Answer:

B

Explanation:

The point of simulating would be to eliminate the part of having to go through un patential applications and save time.

5 0
3 years ago
When you install the ipam server feature you will be prompted to install which other features? (choose all that apply.)
Nezavi [6.7K]

If you install the IPAM  server feature you will be prompted to install the other features are:

  • Option c. Group Policy Management
  • Option d. Windows Internal Database

<h3> Which server should a person install the IPAM server feature?</h3>

IPAM Server is known to be one that need to be installed on a kind of server known as the domain member computer running Windows Server.

One can also install it its later operating system. The IPAM server is said to be made as a single purpose server and it is one that need not be installed with other form of network infrastructure roles e.g.  DNS.

Hence, If you install the IPAM  server feature you will be prompted to install the other features are:

  • Option c. Group Policy Management
  • Option d. Windows Internal Database

Learn more about server  from

brainly.com/question/15243924

#SPJ1

See full question below

When you install the IPAM Server feature you will be prompted to install which other features? (Choose all that apply.)

a. Control Flow Guard

b. Scale Out File Server

c. Group Policy Management

d. Windows Internal Database

c. Group Policy Management

d. Windows Internal Database

8 0
1 year ago
Other questions:
  • Chloe is building a kiosk-based Excel application. She wants to make some modifications to the screen elements in order to keep
    8·1 answer
  • Var cookie = "username=mike2009";
    10·1 answer
  • What are language standards? At this point in your study of programming, what do they mean to
    5·1 answer
  • Discuss a situation in which you might want to use a floating-point number with a fractional part for a loop control variable. W
    5·1 answer
  • On five lane roadways, the center lane is designated for __________ and is used by vehicles traveling in both directions.A. Thro
    15·1 answer
  • Select the best word or phrase to complete each sentence Jobs that require you to use your v are typically rewarding Individuals
    12·1 answer
  • Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current
    13·1 answer
  • Edhesive unit 4 test
    9·1 answer
  • Identify the correct answer in each item. Write your answer on the blank provided before
    13·1 answer
  • Refund please, this has not helped at all.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!