1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadya68 [22]
3 years ago
14

A discount store chain has a data breach, which means that a hacker now has the credit card numbers of every customer who shoppe

d at that store in the last month. As a result, customers are angry with the store because they have to respond to credit card fraud, and so sales decrease at the store. Which of the following would have most likely prevented this problem?
A
investing in faster processors

B
investing in more mainframes

C
investing in better security

MULTIPLE CHOICE
Question 10
Which of the following is NOT a way that a company can improve the security of the data that it collects?
1Points
A
increasing its upload speed

B
requiring stronger passwords

C
encrypting information

MULTIPLE CHOICE
Question 11
Which of these statements describes the difference between binary and decimal numbers?
1Points
A
Binary numbers are shorter to write than decimal numbers.

B
Binary numbers use only the digits 0 and 1; decimal numbers use 0 through 9.

C
Binary numbers are easier for people to read than decimal numbers.

MULTIPLE CHOICE
Question 12
Which of these number systems uses the most unique characters?
1Points
A
binary

B
decimal

C
hexadecimal

MULTIPLE CHOICE
Question 13
If you saw the number BDB76B used to describe a color in a computer program, which number system is being used?
1Points
A
decimal

B
hexadecimal

C
Roman numerals

MULTIPLE CHOICE
Question 14
Why are hexadecimal values used to represent color in computer programs?
1Points
A
They are easier for humans to interpret.

B
They are easier for computers to interpret.

C
They are able to represent more colors than binary numbers.

MULTIPLE CHOICE
Question 15
Processor speeds are given in hertz. One hertz refers to what?
1Points
A
one transfer from binary to hexadecimal

B
one use of an input device

C
one fetch-decode-execute cycle
Computers and Technology
2 answers:
timofeeve [1]3 years ago
7 0

Answer:

1. B -  investing in more mainframes

2. A -  increasing its upload speed

3. B -  Binary numbers use only the digits 0 and 1; decimal numbers use 0 through 9.

4. A - binary

5. B - hexadecimal

6. A - They are easier for humans to interpret.

7. B -  one use of an input device

Explanation:

1. giving infromation out and anyone can just get it from the mainframe

2. increasing the upload speed is NOT a security improvement because encrypting is very hidden can be found anymore and stronger passwords are required everywhere even google account passwords so A is the answer

3. no explantion I just know thats true I swear.

4. Its A because its difficult to read so its unique. very rare people know how to read it.

5. hexadecimal is the only one that has numbers and letters together

6. Hexadecimal representations use fewer digits than binary, making it easier to express values.

7. One per second

Sloan [31]3 years ago
4 0

Answer:

C

investing in better security

A

increasing its upload speed

A

Binary numbers are shorter to write than decimal numbers.

B

hexadecimal

B

They are easier for computers to interpret.

C

one fetch-decode-execute cycle

You might be interested in
A combination lock has the following basic properties:
fomenos

Answer:

public class CombinationLock {

   

    private int combinationNumber1 = 0;

    private int combinationNumber2 = 0;

    private int combinationNumber3 = 0;

   

   CombinationLock(int combinationNumber1, int combinationNumber2, int combinationNumber3){

       this.combinationNumber1 = combinationNumber1;

       this.combinationNumber2 = combinationNumber2;

       this.combinationNumber3 = combinationNumber3;

   }

   

   public boolean open(int number1, int number2, int number3){

       if(number1 == combinationNumber1 && number2 == combinationNumber2 && number3 == combinationNumber3)

           return true;

       else

           return false;

   }

   

   public boolean changeCombo(int number1, int number2, int number3, int newNumber1, int newNumber2, int newNumber3){

       

       if (open(number1, number2, number3)){

           combinationNumber1 = newNumber1;

           combinationNumber2 = newNumber2;

           combinationNumber3 = newNumber3;

           return true;

       }else

           return false;

   }

}

Explanation:

- <em>Three variables</em> are created to hold the combination.

- A <em>constructor</em> is created to set the combination.

- A boolean method called <em>open</em> is created to check if the given numbers are correct, and <u>returns true</u> (<u>otherwise returns false</u>).

- A boolean method method called <em>changeCombo</em> is created to check if given numbers are correct. If they are correct, it assigns new values for the combination and <u>returns true</u> (<u>otherwise returns false</u>).

5 0
3 years ago
If you want to copy data from one cel to another cell that is several rows down in a worksheet, which method should you use?
bogdanovich [222]

copy and paste

so you can keep the data in the current cell and add it to other cells that you want that data in as well

5 0
3 years ago
Which of these monitor connector types is the oldest and least desirable to use?
ella [17]

Answer:

DVI is the oldest out of the four.

Explanation:

DVI and VGA are the oldest, but DVI is oldest and least desirable to use since it is outdated.

5 0
3 years ago
Read 2 more answers
Several of the items below indicate the steps required to move a slide to a different location in a presentation. Select those s
NikAS [45]
The answer should be
2
4
3
5
1
6
8 0
3 years ago
Read 2 more answers
How would you log in as zach if you did not know his password but knew the root password?
Nuetrik [128]
You can login in root terminal and then type #sudo Zach 
8 0
3 years ago
Other questions:
  • Which commas is used to combine two or more cells together into one cell
    11·1 answer
  • Your project must satisfy the following requirements:
    7·1 answer
  • When you lost important information how do you gain the information back?
    14·2 answers
  • A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database da
    6·1 answer
  • Develop a program that will calculate the area and perimeter of a rectangle. The length and width can be given as constant.(LENG
    8·1 answer
  • ⇒PLEASE HELP ME!!!!!!!!∧_∧
    15·2 answers
  • What is included on the HP PC Hardware Diagnostics 3-in-1 USB Key that allows you to recover systems that cannot boot?
    14·1 answer
  • Hi I need help, This assignment is for Assignment 6 Question 3 in edhesive for computer science. here is the prompt:
    15·1 answer
  • 1. Distinguish between
    7·1 answer
  • Immigrants are allowed to enter the country to work when they have a(n)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!