A. intentionally or recklessly disrupt, degrade, or destroy information or services on the computer
Answer:
<h2>
<em>Heya</em><em> </em><em>Buddy</em><em>.</em><em>.</em></h2>
Explanation:
<em>A computer program is a collection of instructions that can be executed by a computer to perform a specific task. ... A collection of computer programs, libraries, and related data are referred to as software.</em>
<em>Hope</em><em> </em><em>that</em><em> </em><em>helps</em><em> </em><em>you</em><em> </em><em>dear</em><em>.</em><em>.</em>
<em>Bye</em><em>!</em>
i = 1
while i < 10001:
total = 0
x = 1
while x < i:
if i % x == 0:
total += x
x+=1
if total == i:
print(str(i)+" is a perfect number")
i += 1
When you run this code, you'll see that 6, 28, 496, and 8128 are all perfect numbers.
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
Answer: SETA program
Explanation:
The SETA program is basically stand for the security, education, training and awareness. It is basically used to reduce the accidental security which is break by the organization member such as employees, vendors and contractors.
The SETA program provided various benefits to the organization as it improve the behavior of the employees.It basically enhance the training and education program by focus and concentrate on the information security.
It can also inform he member of the organization about the report of violating many policies.