1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
15

Discuss risks associated with people in cyber threat

Computers and Technology
1 answer:
BARSIC [14]3 years ago
6 0

Answer:

1. Hacking of personal details.

2. Cyber harassment.

3. Hacking of business details.

Moreover it is a mental trauma for the victim too

Explanation:

You might be interested in
To make the most informed purchasing decision, you should:
musickatia [10]

Answer:

its either A or B but im leaning more towards B

Explanation:

6 0
2 years ago
When computer network are joined together they form a bigger network called the​
Airida [17]

Answer:

A WAN can be one large network or can consist of two or more lans connected together. The Internet is the world's largest wan.

Explanation:

8 0
3 years ago
Who has played pokemon red, blue, or yellow on the gameboy
lisov135 [29]

Answer:

I didn't think this would be an actual question... I did- :3

3 0
3 years ago
Read 2 more answers
___are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard
Firlakuza [10]

Answer:

Viruses

Explanation:

virusues are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard

3 0
3 years ago
Cual es la definición de grouded ​
pochemuha

Answer:

ben bilanciato e reattivo.

(di un pilota o di un aeromobile) vietato o impedito di volare.

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Add the following functions to the code:
    9·1 answer
  • Which of the following is NOT a common GUI component? O a. Label b. Button c. Key press d. Text box
    12·2 answers
  • A company has developed a business-critical system for its core automation process with a software vendor. Which of the followin
    12·1 answer
  • Which of the following is not a general strategy for organizing and analyzing qualitative data?a.Convert the data into one or mo
    6·1 answer
  • What does it mean by MYRIAD of data?
    9·1 answer
  • Which type of image uses lossy compression to reduce file size?
    14·1 answer
  • can you give me a tip to fix my SIM card becuaus when i put it on my phone it has no signal , can anyone fix this , thank you.​
    9·2 answers
  • WHY DO YOU DElete EVERY QUESTIONS THAT IS ASKED! Im a freaking guy, yes and i wont followers for my channel so leave me alone!
    7·2 answers
  • Refers to the capacity to form bonds with particular
    11·2 answers
  • Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!