1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
3 years ago
13

__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea

se that information. 1) Competitive intelligence 2) Espionage 3) Information extortion 4) Intellectual property
Computers and Technology
1 answer:
Ludmilka [50]3 years ago
5 0

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
You might be interested in
n macOS, what launch point provides access to almost all the settings needed to administer a macOS system?
Fynjy0 [20]

Answer:

System preferences.

Explanation:

MacOS is the primary operating system designed and developed for Apple computers (MacBook).

In macOS, system preferences is a launch point that provides access to almost all the settings needed to administer a macOS system. The system preferences allow users to change various settings on their Mac computers such as changing the desktop layout, desktop picture (wallpaper), size and location of the dock, font size, appearance, energy saver etc.

5 0
3 years ago
Why I/O modules is needed between system bus<br>and I/O devices?​
beks73 [17]

Answer:

1. Processor communication -- this involves the following tasks:

<em>a. exchange of data between processor and I/O module</em>

<em>b. command decoding - I/O module accepts commands sent from the processor. E.g., the I/O module for a disk drive may accept the following commands from the processor: READ SECTOR, WRITE SECTOR, SEEK track, etc. </em>

<em>c. status reporting – The device must be able to report its status to the processor, e.g., disk drive busy, ready etc. Status reporting may also involve reporting various errors. </em>

<em>d. Address recognition – Each I/O device has a unique address and the I/O module must recognize this address. </em>

<em />

2. Device communication – The I/O module must be able to perform device communication such as status reporting.

3. Control & timing – The I/O module must be able to co-ordinate the flow of data between the internal resources (such as processor, memory) and external devices.

4. Data buffering – This is necessary as there is a speed mismatch between speed of data transfer between processor and memory and external devices. Data coming from the main memory are sent to an I/O module in a rapid burst. The data is buffered in the I/O module and then sent to the peripheral device at its rate.

5. Error detection – The I/O module must also be able to detect errors and report them to the processor. These errors may be mechanical errors (such as paper jam in a printer), or changes in the bit pattern of transmitted data. A common way of detecting such errors is by using parity bits.

5 0
3 years ago
A mail merge data source must contain
Katena32 [7]

Answer:

A. a collection of organized data.

Explanation:

It can be a data source, or a database, an excel sheet. or access database. However, it must be well-formatted and hence organized. filtering of data is not necessary, as well as it is not any barrier to the number of the set of data, or the data being sorted. Unsorted data is also fine, and multiple set of data is also fine. It must be known that a data source can be formed from multiple sets of data through the query. And the resultant data source can be used by the mail merge. However, the data source must be a collection of organized data. Hence, A is the correct answer.

5 0
3 years ago
The letters a, e, i, o and u are the only vowels. Write a function named vowelUseDict() takes a string t as a parameter and comp
Andru [333]

Please specify the programming language.


3 0
3 years ago
You place a new disc in an optical drive, and then double-click the drive in the operating system's file browser interface. An e
lidiya [134]

Answer:

Wait. Then you try it again

Explanation:

You wait and try again later and if this still persists, you may have to check the optical drive from the drive manager peradventure there is an issue there probably a software issue, also you may have to clean the optical drive using the cleaner disc, likewise you may need to test an old disc on the optical drive to be sure the fault is not from the disc you inserted.

7 0
3 years ago
Other questions:
  • Connected contacts require___ to open.
    11·1 answer
  • A program called the ______ combines the object program with other programs in the library and is used in the program to create
    5·1 answer
  • This is an electronic method used to send and receive data–voice, text, images, and video.
    13·2 answers
  • The cost of large ground based telescopes has remained the same since the 1800's costing the equivalent of about a billion dolla
    9·1 answer
  • The idea that innovations in transportation and communication technologies has changed the way we think about distance and time
    9·1 answer
  • Which functions are examples of logical test arguments used in formulas? Check all that apply. OR IF SUM COUNT NOT AND
    12·2 answers
  • Which of the following types of computers is typically used by governments and hospitals and can support hundreds of users?
    6·2 answers
  • customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft Pow
    5·1 answer
  • Select three advantages to using digital video.
    5·2 answers
  • How do you get lugia in pokemon alpha saphire
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!