1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DENIUS [597]
3 years ago
15

_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the

target system without authorization or payment, or to alter the integrity of data or interfere with the availability of the computer or server.
Computers and Technology
1 answer:
postnew [5]3 years ago
8 0

Answer: Computers as target

Explanation:

Whenever an authorized  access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.

You might be interested in
Database accessibility DBA writes subschema to decide the accessibility of database.
Crank
The answer would be true
8 0
3 years ago
Read 2 more answers
How do you think computers have helped to improve documentation, support and services within the healthcare industry.
AfilCa [17]
Before the use of technology such as computers, information was documented through papers separated in folders. This was a very long and complicated process as people would have to find information by hand, sorting through countless documents. Now, it is much easier and neater to keep information. It can be as easy as digitally searching for someone's name and the computer will sort through countless documents, finding the one you need almost instantly. It is also much less wasteful and safe, as before computers, the use of paper was the only way to permanently keep information, also making documents vulnerable to being lost or stolen.
4 0
3 years ago
// This pseudocode is intended to describe
ddd [48]

Applying given information of a computational language in pseudocode, a code may be written to represent computing the price of an item on sale for 10% off.

<h3>What is a pseudocode?</h3>

A pseudocode can be considered as a depiction of the steps represented in an algorithm, usually in plain (natural) language.

<em>//This </em><em>pseudocode </em><em>is intended to describe</em>

<em>//computing the </em><em>price </em><em>of an </em><em>item </em><em>on </em><em>sale </em><em>for 10% off</em>

<em>START</em>

<em>  input origPrice</em>

<em>  </em><em>discount </em><em>= origPrice * 0.10</em>

<em>  </em><em>finalPrice </em><em>= origPrice - discount</em>

<em>  output finalPrice</em>

<em>STOP</em>

<em>//This pseudocode is intended to </em><em>compute </em><em>the number</em>

<em>//of miles per </em><em>gallon </em><em>you get with your car.</em>

<em>START</em>

<em>  input milesTraveled</em>

<em>  input gallonsOfGasUsed</em>

<em>  milesPerGallon = milesTraveled / gallonsOfGasUsed</em>

<em>     //milesPerGallon is computed using </em><em>division</em>

<em>  output milesPerGallon</em>

<em>     //miles is misspelled, and the P in </em><em>milesPerGallon </em><em>should be uppercase</em>

<em>STOP</em>

<em>  //</em><em>Program </em><em>should end with stop</em>

<em>//This pseudocode is intended to describe</em>

<em>//computing the </em><em>per day cost </em><em>of your rent</em>

<em>//in a 30-day month</em>

<em>START</em>

<em>  input rent</em>

<em>  costPerDay = rent / 30</em>

<em>     // Comment indicates 31-day month</em>

<em>  output costPerDay</em>

<em>     // output should be </em><em>costPerDay</em>

<em>STOP</em>

Learn more about the pseudocode here :

brainly.com/question/13208346

#SPJ1

3 0
1 year ago
2a
zmey [24]

Answer:

See explaination

Explanation:

2a)

A hacker group hacked into the Bay Area Rapid Transit system, this was done to protest BART’s shut down of wireless communication in some BART stations. Such attacks is done mostly to stand for some situation which happened previously. Hence, we can say it is a form a hacktivism. It was not ethical as it disrupted the system for some time.But this is also a form of protest which is been done by some group of peoples.

2b)

If a foreign government launches a hacking attack, it can be considered a war.

If this type of attack happens then the repercussions may result to the war.

2c)

We gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointed out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

7 0
3 years ago
4. An abstract data type is defined as _____.
marusya05 [52]

Answer: object that persist set of values and operations as behavior

Explanation: Abstract data types(ADT)are those object value which are dependent upon the collection of the values and collection of the operations.The organization of the data object is not specified in ADT but the operations that are to be carried out are defined in it.

The implementation individuality displayed by the ADT and hiding of the representation or design makes it abstract.

8 0
3 years ago
Other questions:
  • Information management examines the organizational resource of information and regulates its definitions, uses, value, and distr
    11·1 answer
  • The dlci field in the frame relay header is _________ bits long.
    14·1 answer
  • You have just finished writing a lengthy research paper and you are ready for formatting. You insert your paragraph headings and
    15·1 answer
  • #We've started a recursive function below called #measure_string that should take in one string parameter, #myStr, and returns i
    5·1 answer
  • Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive). Sample output w
    12·1 answer
  • Can you help me, please
    10·1 answer
  • Superclass in python explanation
    7·1 answer
  • Physical Geography of the Middle East
    13·1 answer
  • Leslie works in an SDLC team. When Leslie edits a file, it gets saved as an altered version. Later all the altered versions are
    9·1 answer
  • What are the syntax of c programming language?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!