1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
3 years ago
8

______ is the software that prevents people from being able to access your personal information.

Computers and Technology
2 answers:
AleksandrR [38]3 years ago
8 0

Answer:

The answer is A I hope this helps, if not I apologize.

Explanation:

earnstyle [38]3 years ago
6 0
Anti spyware is the answer, B. Spyware is what hackers use to get information. B.
You might be interested in
Which of the following is a valid SQL statement?
scZoUnD [109]

Answer:

Hi!

The correct answer is B.

Explanation:

This sentence SELECT * FROM customers JOIN orders ON (customer#) selects all the columns of both customers and orders and joins by the name of the column customer.

A and B options have syntactic problems:  

  • A and C: Same alias name for multiple tables.

  • A and C: Selected columns are ambiguous.

  • C: refers to an alias not declared on the FROM sentence.

a) SELECT c.customer#, order#, orderdate, shipdate(omits aliases) FROM customers c NATURAL JOIN orders c(same aliases definiton);

c) SELECT c.customer#, order#, orderdate, shipdate(omits aliases) FROM customers c, orders c(same aliases definiton) WHERE c.customer# = o.customer#(o not declared);

6 0
2 years ago
The penalties for ignoring the requirements for protecting classified information when using social networking services are ____
Sloan [31]

Answer: the same as

Explanation: Sensitive information are usually tagged as classified and as such only individuals with the necessary security clearance have access to information of these sort. The sensitivity of these information stems from the damage that could ensue from it's leakage. Those found culpable could be sued for various degree of criminal offenses. The rules binding the rules, regulation and protection of these sensitive information is similar to those binding on other dissemination methods. This may be due to the degree of chaos and it's leakage through any channel of dissemination could be damaging. Penalties if found guilty may range from imprisonment, demotion, termination of appointment and so on.

3 0
2 years ago
Explain how a Denial of Service (DoS) attack works. After describing a DoS conduct some research and provide an example of a rea
Kay [80]

Answer:                                                                                    

  • A Denial of Service(DoS) is a cyber attack in which the attacker makes a machine or network resource unavailable to its intended users by temporarily interrupting services of a host connected to the Internet.
  • It works by flooding the targeted system or resource with redundant requests or traffic to overload systems and prevent legitimate and valid requests from being accomplished.
  • Usually the user establishes a connection by sending a request to server to authenticate it and server responses back by giving authentication permission. This permission is acknowledged by the user and then is enabled on the server.
  • Contrary to this, in a DOS attach, users send multiple authentication requests to server and these requests contain wrong return addresses so server cant identify the user in order to send permission. The server waits for some time before attempting to close the connection but before it closes the connection the perpetrator sends new set of  false requests and this process starts again.
  • DOS attacks can slow network performance, makes a certain website unavailable and not accessible.
  • BBC was attacked with a DDoS attack measuring over 600 Gbps, The motive of the attackers who claimed responsibility, was that they were just “testing.”
  • The biggest DDoS attack happened to target GitHub. This politically motivated attack lasted several days and adapted itself around implemented DDoS mitigation strategies. The DDoS traffic initiated in China and it is suspected that the Chinese Government oversaw the attack.
  • Wikipedia was brought down by DDoS attack in Germany and some parts of Europe.  
  • TalkTalk a company which provides pay television, telecommunications, Internet access, and mobile network services to  costumers in the United Kingdom was brought down by DDoS attack   by a group of teenagers purely for their own entertainment.
  • In 2000 a 15-year-old hacker known as ‘Mafiaboy’ brought down several popular websites in the world including CNN,  eBay, and Yahoo, This attack had resulted chaos in stock market.  Attacker was revealed to be a high school student named Michael Calce, attacked by hacking into the networks of several universities and using their servers to perform DDoS attack. His motive was to intimidate other hacker groups.

3 0
3 years ago
Which term means a precise set of instructions used to solve a problem or perform a calculation? programming polynomial HTML alg
noname [10]
<h2><em><u>algorithm</u></em><em><u> </u></em></h2>

Explanation:

<em><u>because</u></em><em><u> </u></em><em><u>in</u></em><em><u> </u></em><em><u>algorithm</u></em><em><u> </u></em><em><u>only</u></em><em><u> </u></em><em><u>we</u></em><em><u> </u></em><em><u>can</u></em><em><u> </u></em><em><u>perform</u></em><em><u> </u></em><em><u>calculations</u></em>

4 0
3 years ago
WHAT does a computer programmer do and what is the yearly pay
kotykmax [81]
A computer programmer basically fixes and makes computers. They make about 74,280 dollars per year, or about 7,004 dollars per month. 
Hope this helped!
;)
6 0
3 years ago
Read 2 more answers
Other questions:
  • you were discussing software privacy with a friend were surprised to learn how software privacy can impact your life everyday. w
    10·1 answer
  • Im trying to type in answers but where the text box is supposed to be it says unlock answers. What does that mean?
    11·1 answer
  • Examples of crowdfunding and crowdsourcing include
    12·1 answer
  • When evaluating mining results, data mining and evaluating becomes
    6·1 answer
  • c++ You are given an array A representing heights of students. All the students are asked to stand in rows. The students arrive
    5·1 answer
  • WHO SAYS BUP ALL THE TIME ​
    8·1 answer
  • PLEASE HURRY!!<br> Look at the image below
    15·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    12·1 answer
  • The process by which information gets into memory storage is
    10·1 answer
  • When network traffic is encrypted, it is invisible and its content and purpose are masked.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!