1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
3 years ago
5

What are threats to computer system

Computers and Technology
2 answers:
4vir4ik [10]3 years ago
3 0
Breach..
bugs and viruses
hack
m_a_m_a [10]3 years ago
3 0
The MAIN THREAT’s TO THE COMPUTER SYSTEM are

.........................VIRUSES

There are also other types of VIRUSES:-
BOOT SECTOR VIRUS
BOMBS
WORM
TROJAN
.................There Are TONS AND TONS of Viruses in Today’s WORLD
You might be interested in
6. What is the difference between portrait and landscape orientation? What are the advantages of
vlabodo [156]

Answer:

PORTRAIT ORIENTATION IS VERTICAL AND LANDSCAPE ORIENTATION IS HORIZONTAL

Explanation:

PORTRAIT SETTING CAN BE USED TO DESCRIBE MEANINGS OF LETTERS IN A WORD LANDSCAPE CAN BE USED TO DIFFERENTIATE  BETWEEN WORDS MEANINGS                                                                                                                                            

3 0
3 years ago
In one week, your company received the following quantities of e-mail messages. Monday 240 Tuesday 315 Wednesday 290 Thursday 18
Vika [28.1K]

Answer:

280

Explanation:

Average = (240 + 315 + 290 + 180 + 375) ÷ 5

= 1400 ÷ 5

= 280

Cheers

3 0
3 years ago
Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to d
yulyashka [42]

Answer:

Port scanner

Explanation:

The penetration tester would most likely use a port scanner. A port scanner can be explained to be an application that is made to check a server or host for ports that are open. This application can also be used by administrators to check their security networks so as to know those network services that are running on a host and also to know existing vulnerabilities. Attackers also use this to exploit victims.

5 0
2 years ago
A) How can jitter be reduced on a user’s PC if there is jitter in incoming packets?
ELEN [110]

Answer:

a.) Incoming packets can be placed in the buffer and played back without the jitter.

b.) Buffering would increase the latency because there would be a delay in time when the packets enter the buffer and the time is released.

Explanation:

Jitter is referred technically as a packet delay variations.

It is variation in the periodicity of periodic events or a signal from target or the true frequency.

6 0
3 years ago
The VP of sales at universal containers requested that "Verbal Agreement" be added as a new opportunity stage. The Administrator
Ahat [919]

Answer:

D. Add the new value to the appropriate sales process.

Explanation:

7 0
3 years ago
Other questions:
  • Which of the following is NOT true about RMI? RMI uses the socket connection, including opening and closing the socket. RMI allo
    8·1 answer
  • What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to di
    11·1 answer
  • Which of the following methods is the easiest way to set up a VPN client on a computer for a user who is not technical?
    12·1 answer
  • What is the hexadecimal equivalent of the decimal number 256?
    11·1 answer
  • What area displays the title of the document
    14·1 answer
  • You are managing an FTP server installed in Ubuntu Server. The server has created a very large log le, vsftpd.log. Which command
    14·1 answer
  • Who plays xbox one offline and knows some multiplayer games that can be played offline.
    15·2 answers
  • Every single device can be connected to every other device on network, making the network mesh. This statement is True or False?
    8·1 answer
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    5·1 answer
  • When James added a date field to a PivotTable, Excel grouped the date values into quarters, months, and years. He does not want
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!