1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
4 years ago
12

A​ ________ is a person or organization that seeks to obtain or alter data or other IS assets​ illegally, without the​ owners' p

ermission.
Computers and Technology
1 answer:
Mamont248 [21]4 years ago
3 0

Answer: Threat

Explanation:

 Threat is one of the type of possible danger occur in the computer system security and also also exploit the security system that cause various types of possible harms.

Threat is alter any type of data in an organization without the permission of the owner.  

The threat can be classified into the different types are as follows:

  • Computer worm
  • DOS attack
  • Rootkit
  • Computer viruses

You might be interested in
Jessica has pinned her favorite applications as icons on her desktop. She always clicks on these icons to work on them. Which us
Hatshy [7]

Answer:

Graphical User Interface (GUI)

Explanation:

Graphical User Interface clicking on various icons to perform a certain functionality. GUI is a form of user interface that allows users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of text-based user interfaces or command line interface where you would have to type to run the program rather than just click it.

7 0
3 years ago
You are most likely to use<br> images for photos or digital paintings.
Lubov Fominskaja [6]

Answer: Digital Paintings

7 0
3 years ago
1. Bluetooth
Elza [17]

Complete Question:

1. A wireless technology standard for exchanging data over short distances

2. A particular brand of mobile phone/PDA

3. A network that operates over a limited distance, usually for one or a few users

1. Bluetooth

2. PAN

3. Blackberry

Answer:

1. Bluetooth 2. Blackberry . 3. PAN

Explanation:

1. Bluetooth is a wireless technology standard, used in order to exchange data between mobile devices, like smartphones, tablets, headsets, wearables, over short distances in a one-to-one fashion (which means that it is not possible to build a network based in Bluetooth).

2. Blackberry is a brand of mobile phones/PDAs, very popular a decade ago, because it was the first one to allow mobile users to access e-mails and messages from anywhere, at any time.

3. PAN (Personal Area Network) is an ad-hoc network that it is only available for data exchange at a very short distance, within the reach of a person, i.e. a few meters as a maximum.

It is thought to allow someone to interact with his nearest environment (laptop, tablet, PDA) and it can be wireless (like Bluetooth) or wired (via USB cables).

4 0
4 years ago
So i am taking to edhesive computer science course in my school, and i am confused on 1.6 code practice,
elixir [45]

I included my code in the picture below. Best of luck.

5 0
3 years ago
1.<br> Why do you need to use sources of information when writing a formal business<br> document?
Lera25 [3.4K]

Answer:

You need sources of information when writing a formal business document because, if the person receiving the document would like to see the full source you got your information from it could help them understand better what they are reading. Also it looks more professional.

Explanation:

4 0
3 years ago
Other questions:
  • Allows you to manually add an entry to the arp cache that resolves the ip address inetaddr to the physical address etheraddr. wh
    13·1 answer
  • Up to 10 people is a good guideline for the size of your study group.
    15·1 answer
  • 14. What is the simplest way to permanently get rid of an unwanted file?
    9·1 answer
  • A ____ is a synonym for a virtualization application.
    5·1 answer
  • Five batch jobs. A through E, arrive at a computer center at almost the same time. They have estimated running times of 10, 6, 2
    14·1 answer
  • Examine the following class definition:
    10·1 answer
  • Write a program using integers userNum and divNum as input, and output userNum divided by divNum three times.
    7·1 answer
  • 2. 5s is a Chinese principle adapted for use in the workplace.<br>True or False​
    11·1 answer
  • What stage of the development process is often called the pre-alpha phase and is the "meat" of the design process where features
    5·1 answer
  • Select the correct answer. Nancy has made a small web page with the new features of HTML5. She has to show this web page in scho
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!