1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
egoroff_w [7]
3 years ago
6

_______self-esteem can be a factor for individuals who are dependent on alcohol or other drugs.

Computers and Technology
1 answer:
Tatiana [17]3 years ago
6 0

low becuase you are loosing it

You might be interested in
If I use the command right(90), which way will Tracy turn?<br> If correct I mark brainlist
Kaylis [27]

Answer: Right

Explanation: If you use the Command Right (90°), it makes sense that Tracy turns right 90°...

5 0
2 years ago
A small business has suffered from a cyber attack, what could be the resultant damage​
frutty [35]

Answer:

Cyber Attacks can damage small or big business. Different kinds of attacks will lead to the different losses. some of the most common attacks are

  • DOS Attack
  • Bruteforce Attack
  • DDOS Attack
  • XSS Attack
  • API Attack
  • Network Attacks
  • Identity and Token theft attack
  • Man in the middle attacks
  • Application Level Attacks

Each attack can impact different domain and different level of damages. The biggest damage can be loss of reputation and monetorial losses. It can eventually invite law suites and can make company go bankrupt.

Explanation:

Following damages can be seen with cyber attacks.

<u><em>Loss of Reputation : </em></u>Loss of reputation is the worst damage that any cyber attack can create. This will  result in the business losses and also result in irreversible damage to existing customer base and also it will spoil the market value.

<u><em>Loss of Corporate Information:</em></u> Attackers can use the corporate information which can consist of customers data, unwanted lawsuits and also company’s employees details. Data recovery may not be possible once the attacker has full corporate access.

<u><em>Loss of Identity: </em></u>Once the personal information is lost then Hackers can use personal information for impersonation, and identity theft. Identity theft is more dangerous as it is used for illegal activities.

Cyber-attacks can disrupt your business activities and it will include as below

<u><em>Loss of Data : </em></u> Successful cyber attack can damage the data and even can corrupt the data which will be of no use.

<u><em>Loss of Infrastructure :</em></u> Servers, computers, databases can be disrupted with a cyber-attack which can be irreversible and even be more disastrous as physical infrastructure is impacted.

<u><em>Extortion losses :</em></u> Attackers can threaten to disclose sensitive data and can intern ask for ransom payment.

<u><em>Lawsuits : </em></u>If the customer’s data is exposed or used for illegal business then it will invite huge lawsuits.

<u><em>Notification Policy :</em></u> If data is breached then it is also important to notify the effected users and the next remedy taken to resolve it.

<u><em>Loss of Business :</em></u> Cyber attacks can create business losses and also will eventually affect existing and new customers.

4 0
3 years ago
True or false? Resistors regulate and limit electrical current. A. True B. False
Vikki [24]
Hello! I believe the answer for this is "True"!
3 0
3 years ago
Read 2 more answers
Match the technology with the appropriate task.
Fiesta28 [93]

Answer:

the number order is

1

5

2

4

3

Explanation:

I am sure it is correct. Thanks :)

3 0
3 years ago
The purpose of an Internet _____ is to receive packets and send them along towards their final destination.
Bumek [7]

The tool that receives packets and send them along towards their final destination is; Internet Server

<h3>Internet Servers</h3>

We are told that the tool is used to receive packets and send them along towards their final destination.

  • Now, the tool is an internet server because internet servers are softwares and hardwares that make use of HTTP and other protocols to respond to client requests that are made over the World Wide Web.

Now, the main job of an internet server is to display website content through storing, processing and delivering webpages to the final destination.

Read more about internet server at; brainly.com/question/20602197

7 0
2 years ago
Other questions:
  • You have been contracted by a local school to evaluate their computer labs for security threats. They are most worried about the
    6·1 answer
  • A user complains that his new mouse doesn't work right. He has an old system at home and when he has had this problem, he cleane
    11·2 answers
  • How is actual cost calculated?<br><br> Please answer
    12·1 answer
  • A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB seri
    5·1 answer
  • How do you respond to an email?
    6·1 answer
  • Cloud computing allows organizations to rent computing resources from providers instead of having their own locally managed ____
    7·1 answer
  • Help plz, u just gotta select all that apply :)
    15·1 answer
  • Suppose we want to select between two prediction models M1 and M2. We have performed 10-fold cross validation on each. The error
    14·1 answer
  • Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and
    13·1 answer
  • you are setting up an active directory environment for a business that has three locations and 300 users. you want the users to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!