1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
4 years ago
7

Whats the answer to this question?

Computers and Technology
1 answer:
Naddika [18.5K]4 years ago
6 0
Eat a a dong dong edi35(
You might be interested in
In 1981, Ian Murphy broke into the AT&T online computer system and changed their clocks, allowing people to make calls durin
poizon [28]
A. intentionally or recklessly disrupt, degrade, or destroy information or services on the computer
5 0
2 years ago
What do you call a collection of pre-programmed commands and functions used in programs?
Keith_Richards [23]

Answer:

<h2><em>Heya</em><em> </em><em>Buddy</em><em>.</em><em>.</em></h2>

Explanation:

<em>A computer program is a collection of instructions that can be executed by a computer to perform a specific task. ... A collection of computer programs, libraries, and related data are referred to as software.</em>

<em>Hope</em><em> </em><em>that</em><em> </em><em>helps</em><em> </em><em>you</em><em> </em><em>dear</em><em>.</em><em>.</em>

<em>Bye</em><em>!</em>

6 0
3 years ago
A positive integer is called a perfect number if it is equal to the sum of all of its positive divisors, excluding itself. For e
Ad libitum [116K]

i = 1

while i < 10001:

   total = 0

   x = 1

   while x < i:

       if i % x == 0:

           total += x

       x+=1

   if total == i:

       print(str(i)+" is a perfect number")

   i += 1

When you run this code, you'll see that 6, 28, 496, and 8128 are all perfect numbers.

5 0
3 years ago
What is the characteristics of a spear phishing message
Cerrena [4.2K]
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
7 0
3 years ago
Read 2 more answers
. The _____________ is the responsibility of the CISO, and is designed to reduce incidence of accidental security breaches by or
irinina [24]

Answer: SETA program

Explanation:

 The SETA program is basically stand for the security, education, training and awareness. It is basically used to reduce the accidental security which is break by the organization member such as employees, vendors and contractors.

The SETA program provided various benefits to the organization as it improve the behavior of the employees.It basically enhance the training and education program by focus and concentrate on the information security.

It can also inform he member of the organization about the report of violating many policies.

7 0
3 years ago
Other questions:
  • When people need information, they typically turn to:
    7·1 answer
  • What command displays a computer s network settings?
    5·1 answer
  • How to change screen resolution in windows 10?
    5·1 answer
  • Please explain why an operating system makes a great attack target.​
    9·1 answer
  • What is not true about contracts?
    12·2 answers
  • What do you think is the most fascinating aspect of the internet?
    7·2 answers
  • A type of storage which holds data on a permanent basis for later use<br><br><br><br> Help please
    8·1 answer
  • Could somebody please find the bugs and amend them? This question is worth 25 Brainly points!
    11·1 answer
  • The average number of entities completed per unit time -- the output rate -- from a process is called ____.
    9·1 answer
  • Who is big brain me or you
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!