1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
15

Discuss risks associated with people in cyber threat

Computers and Technology
1 answer:
BARSIC [14]3 years ago
6 0

Answer:

1. Hacking of personal details.

2. Cyber harassment.

3. Hacking of business details.

Moreover it is a mental trauma for the victim too

Explanation:

You might be interested in
Which encryption standard uses Advanced Encryption Standard (AES), a 128-bit block cipher that is much tougher to crack than the
Alchen [17]

Answer:

Wi-Fi Protected Access 2 (WPA2)

Explanation:

The Wi-Fi Protected Access 2 (WPA2) makes some alterations to the encryption algorithm that were used in WPA and WEP to what is known as the  Advanced Encryption Standard (AES). This is a 128-bit block cipher considered to be much more difficult to crack than the usual 128-bit TKIP wrapper. However, although WPA2 offers a much more tougher encryption standard, it is important to note that it is not hack proof.

5 0
3 years ago
When conducting research on the internet, what is a starting point for determining how to start the research?
Alex787 [66]
It depends on what you're researching for.
4 0
3 years ago
Ron was asked to maintain a database to record the height of every student in class.
Fiesta28 [93]

B. =Compare(B3;B4)

hope I helped!!!

4 0
3 years ago
Read 2 more answers
Welcome to Cypres...
Debora [2.8K]

Answer:

<em>sorry</em><em> </em><em>I </em><em>don't</em><em> </em><em>know</em><em> </em><em> </em><em>I </em><em> </em><em>can't</em><em> </em><em>will</em><em> </em><em>your</em><em> </em><em>help</em>

5 0
3 years ago
What entity created the open systems interconnection (osi) seven-layer model?
sweet [91]
The ISO developed the 7 layer OSI model.
8 0
3 years ago
Other questions:
  • How to know if somebody else is listening my conversations by cellphone?
    13·1 answer
  • Programming Using OOJAVA<br> check this Atterchment and solve Exascies 1, 2, and 3
    10·1 answer
  • python Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value i
    7·1 answer
  • Which one of these is correct PI of a XML document?
    13·1 answer
  • In Windows, which menu allows you to view file characteristics?
    14·1 answer
  • The _____ of a local variable is the function in which the variable is created.
    6·1 answer
  • Write a program in qbasic to accept a character and check it is vowel or consonant​
    14·1 answer
  • Your welcome 95 points gg
    10·2 answers
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    5·1 answer
  • What's the best item in the binding of isaac?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!