1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
3 years ago
5

What are threats to computer system

Computers and Technology
2 answers:
4vir4ik [10]3 years ago
3 0
Breach..
bugs and viruses
hack
m_a_m_a [10]3 years ago
3 0
The MAIN THREAT’s TO THE COMPUTER SYSTEM are

.........................VIRUSES

There are also other types of VIRUSES:-
BOOT SECTOR VIRUS
BOMBS
WORM
TROJAN
.................There Are TONS AND TONS of Viruses in Today’s WORLD
You might be interested in
Drag the tiles to the correct boxes to complete the pairs. Match the conversion systems with their steps. To convert a decimal f
bixtya [17]

Answer:

1

Explanation:

8 0
3 years ago
Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string
erica [24]

Answer:

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

Explanation:

Byte pair encoding is a form of encoding in which the most common pairs of consecutive bytes of data are replaced by a single byte which does not occur within the set of data.

For example, if we has a string ZZaaAb, it can be encoded if the pairs of string ZZ are replaced by X and the second pair by Y. So, our data now becomes XYAb.

To get our original data, that is decode it, we just replace the data with the keys X = ZZ and Y = aa thus allowing our original data to be restored.

Since our original string is restored without loss of data, it implies that <u>byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.</u>

8 0
2 years ago
Pseudocode for mystry algorithm
kari74 [83]

Answer:

Initially if x = a = 2437 and y = 875,  condition (1) that is x>y is true and output would be x = 1562 with y = 87

Explanation:

According to pseudo code the code will run until x becomes equal to y. Initially if x = a = 2437 and y = 875,  condition (1) that is x>y is true. So next step would be x=x-y and output would be x = 1562 with y = 875. With initial values x = a = 2437 and y = 875, x becomes equal to y after 21 iterations and output is x=y=1

                 X        Y

  1.      2437         875
  2.      1562         875
  3.       687          875
  4.       687          188
  5.       499          188
  6.       311            188
  7.       123           188
  8.       123           65
  9.       58            65
  10.       58             7
  11.       51              7
  12.       44             7
  13.       37             7
  14.       30             7
  15.       23             7
  16.       16              7
  17.        9              7
  18.        2              7
  19.        2              5
  20.        2              3
  21.        2              1
  22.        1               1
8 0
3 years ago
Write a program to play an automated game of Rock, Paper, Scissors. Two players make one of three hand signals at the same time.
zhuklara [117]

Answer:https://www.chegg.com/homework-help/questions-and-answers/program-specifications-write-program-play-automated-game-rock-paper-scissors-two-players-m-q84530098

3 0
2 years ago
Match the following unit 6 terms with their descriptions
Romashka [77]

Answer:

what are the followin six terms

Explanation:

6 0
3 years ago
Other questions:
  • What does the "configure dhcp options for proxy dhcp" option do?
    13·1 answer
  • Need answers for 11&amp;12. Due today. Thanks.
    14·1 answer
  • Which delivery model is an example of a cloud computing environment that provides users with a web based email service ?
    9·2 answers
  • One of the most studied computational problems is the ordering of a collection of values. Ordering is important because many pro
    15·1 answer
  • Typically, a programmer develops a programâs logic, writes the code, and ____ the program, receiving a list of syntax errors.
    6·1 answer
  • In ssl/tls, a specific set of protocols that a particular cryptographic system will use to provide protection is called a ______
    5·1 answer
  • )finding an unused location in the hash table is called
    5·1 answer
  • 4. Write technical term for the following statements
    15·2 answers
  • Think about how you view your emails—either the email service you use yourself or an email service you would choose to use. Desc
    15·1 answer
  • 14. How do digital libraries address the problem of digital exclusion?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!