1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lunna [17]
3 years ago
7

all of the following are examples of real security and privacy risks except:a. hackers spam viruses identity theft

Computers and Technology
1 answer:
jonny [76]3 years ago
7 0
All of them have to do with computers except identity theft so that's the answer
You might be interested in
Five aplications of ict​
Irina18 [472]

Answer:

MS Word, MS Excel, MS PowerPoint, Adobe Photoshop, Adobe Reader

Explanation:

8 0
3 years ago
Many people object to increased cybersecurity because _____.
yawa3891 [41]
Depending on what kind of security measures are implemented, D would definitely be a contender. However, B is also something to take into consideration. I would answer D.<span />
5 0
4 years ago
Read 2 more answers
I have no idea how to use the sep and end in Python can someone help me I have a test tomorrow
Nuetrik [128]

Answer:

The end parameter basically prints after all the output objects present in one output statement have been returned. the sep parameter differentiates between the objects.

Explanation:

Hope this helps

https://www.edureka.co/community/53505/difference-between-end-and-sep#:~:text=end%20and%20sep%20are%20optional,parameter%20differentiates%20between%20the%20objects.

4 0
3 years ago
Select the correct line of missing code to create an output of "hello."
s2008m [1.1K]

Answer:

B

Explanation:

This feels like an error on the question issuer's part.

3 0
3 years ago
Fill in the blanks in the SQL statement below that will list the invoice number, invoice total and credit which is the total sum
ki77a [65]

Answer:

Following are the query and its explanation:

Explanation:

SELECT invoice_number , invoice_total , FORMAT ((payment_total +credit_total),2) AS Credit FROM invoices;

In the above given select command it selects two columns that are "invoice_number , invoice_total" in which it uses the format method that adds "payment_total  and credit_total" parameter value and divides the value, and holds its decimal point value use by the invoices table.

5 0
3 years ago
Other questions:
  • This type of software can be described as end user software and is used to accomplish a variety of tasks. communications system
    15·1 answer
  • How does machine learning help to make modern Web Application Firewalls more effective? (Choose two.)
    5·1 answer
  • Write a program to read customer number, Name, loan amount, interest rate and time of repayment. Calculate and display the EMI .
    9·1 answer
  • Can I get some help thank you
    8·2 answers
  • Pick an appliance or an electronic device that you use at home that is powered from the wall outlet. Specify which electronics d
    10·1 answer
  • PLS HELP IMEDIATELY!!!!!
    15·2 answers
  • Item 3
    15·1 answer
  • If the larger gear is the
    15·1 answer
  • If you have an ordered list of all the states in North America, and you want to add a title "States of North America", what tag
    14·1 answer
  • The History feature of a browser enables you to retrace your browsing history over a short period of time. (1 point) True False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!