1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
4 years ago
14

A discount store chain has a data breach, which means that a hacker now has the credit card numbers of every customer who shoppe

d at that store in the last month. As a result, customers are angry with the store because they have to respond to credit card fraud, and so sales decrease at the store. Which of the following would have most likely prevented this problem?
A
investing in faster processors

B
investing in more mainframes

C
investing in better security

MULTIPLE CHOICE
Question 10
Which of the following is NOT a way that a company can improve the security of the data that it collects?
1Points
A
increasing its upload speed

B
requiring stronger passwords

C
encrypting information

MULTIPLE CHOICE
Question 11
Which of these statements describes the difference between binary and decimal numbers?
1Points
A
Binary numbers are shorter to write than decimal numbers.

B
Binary numbers use only the digits 0 and 1; decimal numbers use 0 through 9.

C
Binary numbers are easier for people to read than decimal numbers.

MULTIPLE CHOICE
Question 12
Which of these number systems uses the most unique characters?
1Points
A
binary

B
decimal

C
hexadecimal

MULTIPLE CHOICE
Question 13
If you saw the number BDB76B used to describe a color in a computer program, which number system is being used?
1Points
A
decimal

B
hexadecimal

C
Roman numerals

MULTIPLE CHOICE
Question 14
Why are hexadecimal values used to represent color in computer programs?
1Points
A
They are easier for humans to interpret.

B
They are easier for computers to interpret.

C
They are able to represent more colors than binary numbers.

MULTIPLE CHOICE
Question 15
Processor speeds are given in hertz. One hertz refers to what?
1Points
A
one transfer from binary to hexadecimal

B
one use of an input device

C
one fetch-decode-execute cycle
Computers and Technology
2 answers:
timofeeve [1]4 years ago
7 0

Answer:

1. B -  investing in more mainframes

2. A -  increasing its upload speed

3. B -  Binary numbers use only the digits 0 and 1; decimal numbers use 0 through 9.

4. A - binary

5. B - hexadecimal

6. A - They are easier for humans to interpret.

7. B -  one use of an input device

Explanation:

1. giving infromation out and anyone can just get it from the mainframe

2. increasing the upload speed is NOT a security improvement because encrypting is very hidden can be found anymore and stronger passwords are required everywhere even google account passwords so A is the answer

3. no explantion I just know thats true I swear.

4. Its A because its difficult to read so its unique. very rare people know how to read it.

5. hexadecimal is the only one that has numbers and letters together

6. Hexadecimal representations use fewer digits than binary, making it easier to express values.

7. One per second

Sloan [31]4 years ago
4 0

Answer:

C

investing in better security

A

increasing its upload speed

A

Binary numbers are shorter to write than decimal numbers.

B

hexadecimal

B

They are easier for computers to interpret.

C

one fetch-decode-execute cycle

You might be interested in
How does an Ac Machine work
Pani-rosa [81]

Answer:

In a split system, the compressor condenses and circulates the refrigerant through the outdoor unit, changing it from a gas to a liquid. The liquid is then forced through the indoor evaporator coil or cooling compartment. The indoor unit's fan circulates the inside air to pass across the evaporator fins.

Explanation:

(hope this helps)

6 0
3 years ago
A chemical found in the synaptic vesicles , which , when released . has an effect on the next cell is called a?
ruslelena [56]
Neurotransmitters is the chemical found in the synaptic vesicles that, when released, has an effect on the next cell.
7 0
4 years ago
Client/server networks are controlled by a central server that runs a specialized piece of software called
Marta_Voda [28]
It is called a wired hot spot

6 0
4 years ago
Write a SELECT statement that returns one row for each customer that has orders with these columns: The email_address from the C
bazaltina [42]

Answer:

Please find the attachment files of the queries:

Explanation:

In the all queries the select statement is used that selects the defined columns and use the function like sum, join, orderby, and groupby to perform the various operations, in which the sum is used to add columns or rows values, join is used for joining two or more tables, and orderby is used for return the table into ascending or descending order, and groupby is used for the count the value, calculate average and perform other operation and gives its return value.

7 0
3 years ago
The text discusses three approaches to combining overall cost leadership and differentiation competitive advantages. Which of th
dedylja [7]

Answer:

C. deriving benefits from highly focused and high technology markets

Explanation:

Firms that engage in cost-leadership approach seek to combine a low per-unit income with large sales for profit making purposes. Typically, but not always, they are more inclined to market their products and services to a large population base or a niche with a high demand volume. While differentiation enables a company to accomplish a competitive advantage. A Competitive advantage enables a company to achieve more strides over other companies offering related product substitutes. It is an important marketing process that is of critical economic importance to a business.

It should be noted that deriving benefits from highly focused and high technology markets is not part of the approaches to combining overall cost leadership and differentiation competitive advantages.

3 0
3 years ago
Other questions:
  • The index finger on your right hand types the _____.
    11·1 answer
  • A Windows systems administrator should use the Administrator account ________.a. As little as possible, and only when needed b.
    15·1 answer
  • ♡ Another Dum Question But Oh Wells -.- ♡
    12·2 answers
  • ________-generation languages use symbols and commands to help programmers tell the computer what to do.
    11·2 answers
  • Describe how a black and white image could be represented in binary
    11·2 answers
  • Write a program named as reverse.c that reads a message, then prints the reversal of the message. The output of the program shou
    7·1 answer
  • Sube
    10·2 answers
  • When a program uses a ____, it reads all the records in the file from beginning to end, processing them one at a time. Group of
    5·1 answer
  • PLEASE HELP URGENT!!
    5·2 answers
  • Understanding that protection of sensitive unclassified information is:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!