1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
3 years ago
5

What are threats to computer system

Computers and Technology
2 answers:
4vir4ik [10]3 years ago
3 0
Breach..
bugs and viruses
hack
m_a_m_a [10]3 years ago
3 0
The MAIN THREAT’s TO THE COMPUTER SYSTEM are

.........................VIRUSES

There are also other types of VIRUSES:-
BOOT SECTOR VIRUS
BOMBS
WORM
TROJAN
.................There Are TONS AND TONS of Viruses in Today’s WORLD
You might be interested in
Meta is a penetration testing engineer assigned to pen test the security firm's network. So far, she cannot tunnel through the n
Arte-miy333 [17]

In order to gain repeated and long-term access to the network system in the future, Meta should perform privilege escalation.

A penetration test is also referred to as pen test or ethical hacking and it can be defined as a cybersecurity technique that simulates a cyber attack against a user's computer system, in order to identify, test and check for exploitable vulnerabilities in the following:

  • Web software
  • Host device
  • Network

Hence, a pen test avails an end user the ability to exploit a weakness and potential security threats during vulnerability assessments of the system.

In Cybersecurity, privilege escalation can be defined as a process that involves the exploitation of a design flaw, software bug or configuration setting in a network, so as to gain repeated and long-term (elevated) access to the network or software application in the future. Thus, Meta should perform privilege escalation to enable her gain repeated and long-term access to the network system in the future.

Read more: brainly.com/question/24112967

7 0
2 years ago
What effect on total current flow will a shorted series component have in a series-parallel circuit?
Citrus2011 [14]
Im going to go with D on this one but dont rely on my answer this is just a  educated guess

7 0
3 years ago
Generally speaking, manufacturing overhead is applied to production by means of a __________ __________ __________, which is com
Mkey [24]

Answer: Predetermined Overhead Rate, Estimated Manufacturing Overhead and Annual Activity Level.

Explanation:

Generally speaking, manufacturing overhead is applied to production by means of a predetermined overhead rate, which is computed under the general formula of dividing estimated overhead rate by some measure of the annual activity level.

A predetermined overhead rate is usually calculated at the beginning of an accounting period. It is calculated by dividing the estimated manufacturing overhead by an activity driver (e.g machine hours).

5 0
3 years ago
Read 2 more answers
Which of the following shows data conversion taking place?
PSYCHO15rus [73]

Answer:

C

data converted from double to integer.

7 0
2 years ago
Which task might be suitable for moving into a separate function so you can re-use it from multiple places in your code?
Fudgin [204]

Answer:

The answer is "All of these could make good functions ".

Explanation:

In the given question some information is missing, that is options which can be described as follows:

a. Ask the user to confirm an input with a yes/no answer

b. Sort some input data into an ordered list

c. All of these could make good functions

d. Calculate a complex mathematical expression

A method is a collection of ordered code and provides a generic code, that is used to execute a single, connected operation.

  • A good function is a function, which takes values from the user and it will sort all the data and store in memory, and whenever we call the function, it will give the values.
  • It is also used to calculate some complex values,
8 0
3 years ago
Other questions:
  • From the Start screen, you can A. access recently opened Excel workbooks. B. create a document from a template. C. create new bl
    12·2 answers
  • You have a number of digital pictures you recently took on your smartphone. You would like to share these pictures with all of y
    11·1 answer
  • Fill in the blank.
    7·1 answer
  • What characters cannot be used in a filename?
    15·1 answer
  • What are some characteristics of pseudocode? Check all that apply. Pseudocode is an informal way of expressing ideas and algorit
    11·2 answers
  • Which of the following is NOT true about procedural abstraction?
    9·1 answer
  • I need some asap pls
    9·2 answers
  • How does this happen on brianly???
    5·2 answers
  • Create a Flowchart and write pseudocode for a program that allows the user to enter two integer values: a and b.
    8·1 answer
  • There are a wide variety of nonsampling errors that can occur during data collection including the first type, ________.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!