1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sukhopar [10]
3 years ago
12

a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public

and private networks.
Computers and Technology
1 answer:
expeople1 [14]3 years ago
8 0

Answer:

The answer is "Blended Threat"

Explanation:

In the given question some information is missing that is the option of the question, which can be described as follows:

a. Firewalls.

b. Mirror disc.  

c. Threat from the backdoor.

d. blended threat.  

It includes bugs malicious content like malware, grubs, and many other scripts. It helps in remembering things when you combine multiple tasks in a processor to help learn, Its combination of stuff is produced, and other choices were false that can be described as follows:

  • In option a, It provides security to malicious, that's why it is wrong.
  • In option b, It is part of storage system, that's why it is incorrect.
  • In option c, It bypasses the normal security system, that's why it is wrong
You might be interested in
Telepresence provides the opportunity for people to work from home and attend virtually. True False
ira [324]
The answer is true.
Telepresence is essentially things like video-chat that allows people to participate in meetings even if they are not physically present.

I hope this helps! :)
~ erudite 
7 0
4 years ago
Read 2 more answers
Consider the following definitions:public boolean someMethod (int[] list, int value){ int counter; boolean flag = false; for (co
alexandr1967 [171]

Answer:

C. Under the condition that value != list[list.length − 1]

Explanation:

In the loop, the value of flag gets overwritten in each iteration, so only the last value of the list matters. Flag is true when value is not equal to the last list element, which is at position list.length-1.

4 0
4 years ago
I need help also this counts as my second giveaway and last for today
kifflom [539]

Answer:

I am pretty sure its the Visual card

8 0
3 years ago
Read 2 more answers
Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
il63 [147K]

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

7 0
3 years ago
What is the difference between a hard drive and a tape drive? Hard drives use magnetic heads and are fast to write data; tape dr
liraira [26]

Answer:

A tape drive provides sequential access storage, unlike a hard disk drive, which provides direct access storage. A disk drive can move to any position on the disk in a few milliseconds, but a tape drive must physically wind tape between reels to read any one particular piece of data.

Explanation:

Architecturally tape drives are sequential storage, meaning that if you need to access some data at the end of the tape you needed to seek to the end and retrieve it. This can take seconds or minutes. Disks, OTOH are random access. Some hard drives use rotating media and movable heads , so the seek times are instantaneous , at least compared with tape drives. However, like tapes, there is a big advantage to using a rotating hard drive as sequential storage. It takes time, measured in milliseconds, for a head to move to another track. So traditionally, random access is much slower than sequential access.

SSDs have no internal moving parts so random access occurs in the same time frame as sequential access. Moreover, these drives usually have very high performance. For example, they can saturate a SATA data link, meaning that the SATA connection to the motherboard is now a bottleneck in disk access.

At one time tape drives were very popular. They were a low-cost alternative to using disks as backup. They were especially useful when IBM invented the Winchester “fixed” drive. This meant that the hard drive is fixed within its enclosure like they are today. Prior to this one could remove the drive pack and replace it. This was helpful when upgrading to a new version of the operating system as it was simple to replace the older drive pack should there be a problem.

Tape drives can be used in larger data centers, due to the fact that tape volumes can be removed and replaced so that the actual tape drive can backup many disk sets. Also the tape volumes can be stored off-site or in a fire-proof vault so this is valuable in a data recovery scenario.

4 0
3 years ago
Other questions:
  • _____ software is used to play, create, and modify audio and video files.
    6·1 answer
  • Which statement about information published on the internet is true?
    9·2 answers
  • 1. Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bit memory address
    7·1 answer
  • Which of these is an example of open-source software?
    13·1 answer
  • 1. Provide at least two statements that explain the relationship between the position of the Earth and the seasons.
    15·1 answer
  • As featured on Wednesday's show: Researchers in Florida have observed less human impact on what kind of reptile, which nests on
    7·1 answer
  • Wanda works for a large company. She and her team maintain a set of servers that support their office, and their office is conne
    12·1 answer
  • In many UNIX/Linux data and configuration files are "fields". Sometimes these fields are separated by:
    13·1 answer
  • Power point programm<br><br>​
    11·1 answer
  • Who is the father of computer​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!