1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
8

Consider the most important item among all the categories of information stored on your personal computer. As it applies to that

item of information (your information asset), identify an example of a corresponding threat, threat agent, vulnerability, exposure, risk, attack, and exploit.
Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
5 0

Answer:

- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.

Explanation:

Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.

Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.

Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.

You might be interested in
Which describes a design theme in PowerPoint? a set of elements that unify the slides and complement the topic a printed handout
chubhunter [2.5K]

a set of elements that unify the slides and complement the topic

5 0
4 years ago
Read 2 more answers
What is a Windows feature that allows you to temporarily store text?
nata0808 [166]
This would be copy and paste.

When you select a text, you can use your keys CTRL and C to copy that same selected text. After this, you can use the paste feature by selecting CTRL and V. Doing this, your selected text will be copied and pasted to a certain location. 
3 0
3 years ago
Assume that the int variables i, j and n have been declared , and n has been initialized . write code that causes a "triangle" o
SIZIF [17.4K]

Here you go,

class Program

   {

       static void Main(string[] args)

       {          

          int n,i,j;

          Console.Write("Enter size: ");

          n = Convert.ToInt32(Console.ReadLine());

          for (i = 1; i <= n; i++)

          {

              for (j = 1; j <= i; j++)

              {

                  System.Console.Write("*");

              }

              System.Console.Write("\n");

          }          

           Console.ReadLine();

       }

   }

5 0
3 years ago
____ is a technology used in WLAN in which sending and receiving devices have multiple antennas and transmit data over multiple
matrenka [14]

Answer:

multiple input multiple output (MIMO).

Explanation:

Electromagnetic waves is a propagating medium used in all communications device to transmit data (messages) from the device of the sender to the device of the receiver.

Generally, the most commonly used electromagnetic wave technology in telecommunications is radio waves.

Radio waves can be defined as an electromagnetic wave that has its frequency ranging from 30 GHz to 300 GHz and its wavelength between 1mm and 3000m. Therefore, radio waves are a series of repetitive valleys and peaks that are typically characterized of having the longest wavelength in the electromagnetic spectrum.

Basically, as a result of radio waves having long wavelengths, they are mainly used in long-distance communications such as the carriage and transmission of data.

In Radio transmission and Networking, multiple input multiple output (MIMO) is a type of technology used in a wireless local area network (WLAN), in which both the sending (transmitter) and receiving (receiver) network devices have multiple antennas and are able to transmit data over multiple streams in a bid (effort) to send data faster with little or fewer errors and gain knowledge of the communications channel.

7 0
3 years ago
A company has recently learned of a person trying to obtain personal information of the employees illegally according to which a
wel
This is illegal. The person responsible for this could be sent to jail for a very long time. He should also be fired. 
7 0
3 years ago
Other questions:
  • When can you access the BIOS setup utility?
    14·2 answers
  • Where can you find additional commands to include in menu options?
    12·1 answer
  • What is the relationship between a tcp and udp packet?
    13·1 answer
  • Life changing technology is easy to fall in love with. Describe a feature of a product that did it for you and highlight its ben
    13·1 answer
  • Which categories format cells
    14·2 answers
  • 1. If your motherboard supports DIMM memory, will RIMM memory still work<br>on the board?​
    13·1 answer
  • A certain program takes 26.67 seconds to run on 3 processors and 16 s to run on 7 processors. Find the execution time on one pro
    10·1 answer
  • Match the protocols to their use. HTTP POP3 SMTP FTP You check email in your inbox. arrowRight You send an email to a friend. ar
    14·1 answer
  • he is trying to find information on the internet first he navigated to a search engine entered the keywords database administrat
    8·1 answer
  • Help me out-
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!