1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
3 years ago
12

A​ ________ is a person or organization that seeks to obtain or alter data or other IS assets​ illegally, without the​ owners' p

ermission.
Computers and Technology
1 answer:
Mamont248 [21]3 years ago
3 0

Answer: Threat

Explanation:

 Threat is one of the type of possible danger occur in the computer system security and also also exploit the security system that cause various types of possible harms.

Threat is alter any type of data in an organization without the permission of the owner.  

The threat can be classified into the different types are as follows:

  • Computer worm
  • DOS attack
  • Rootkit
  • Computer viruses

You might be interested in
In the world of computing,accessibility MOST often refers to what
Nutka1998 [239]

<span>Accessibility refers to access to some form of computer technology. This means that numbers are easily organized and data is easily calculated making it easier for people’s lives. It is a means of an efficient and more productive existence in the work environment.</span>

5 0
3 years ago
What was the importance of the turing machine to today’s computers?
Ronch [10]
It helps you with life and brainly
5 0
3 years ago
A mobile device you are troubleshooting is experiencing a sharp decrease in performance after an hour of operation. The user pow
Anna71 [15]

Answer:

Close or disable all unused running apps.

Explanation:

Closing programs running in the background on your computer or mobile device helps to free up system resources for your other programs. These problems can be resolved where your system is running slowly or two programs are trying to use the same device hence causing the device or system to drag.

5 0
3 years ago
What is a good coding site
Helga [31]

Sratch.com

-Agarvated

6 0
3 years ago
Kiara is using her software's graphic formats to create a line graph. As she
Ad libitum [116K]

Correct the data she entered , and the software will adjust the graph -apex

5 0
3 years ago
Read 2 more answers
Other questions:
  • List two reasons why “buying a computer is no easy task” ?
    12·2 answers
  • A(n) __________attack is designed to render the target unreachable by legitimate users, not to provide the attacker access to th
    8·1 answer
  • Some hardware can be added to the computer without having to restart or power down the computer. After a short period of time th
    5·1 answer
  • Which of the following statements best deceive the relationship between carrying capacity and population size
    12·1 answer
  • How designers have created products from waste materials?
    7·1 answer
  • Suppose we used an Internet Addressing protocol that used 4 bits to encode a single address. How many devices would be supported
    15·1 answer
  • I need help with this line of code:
    5·1 answer
  • Why do chloroplasts appear only in plant cells and lysosomes appear only in animal cells?
    13·1 answer
  • Please help me I don't understand. It's Python.
    5·2 answers
  • What are 2 ways computers can connect to a network?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!