1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
12

The MAA is responsible on a daily basis to protect office computers and patient records and personal information from hackers. R

esearch using Google or another search engine and briefly explain and list two things that you can do to protect these assets while using the computer or Internet.
Computers and Technology
1 answer:
d1i1m1o1n [39]3 years ago
3 0

Two things that I can do in order to protect these assets with the use of the computer or the internet is by first, downloading and using an antivirus software where this has the ability to protect the computer from invaders, hackers and other viruses that could get into the system of the computer. Second, making the data encrypted, so that it will be protected with a code to prevent other people who are trying to get in the data.

You might be interested in
The results of the SPEC CPU2006 bzip2 benchmark running on an AMD Barcelona has an instruction count of 2.389E12, an execution t
xxTIMURxx [149]

Answer:

inside a butt whole

Explanation:

3 0
3 years ago
An attacker is preparing to perform what type of attack when the target vulnerabilities include headers and payloads of specific
kari74 [83]

An attacker is preparing to perform what Application attack  when the target vulnerabilities include headers and payloads of specific application protocols.

<h3>What Is an Application Attack?</h3>

An application attack is known to be a type of system attack which is made up of cyber criminals that is said to have access to any unauthorized points.

Note that this kind of Attackers are  the ones that start by  looking at the application layer, and then looking for any kind of application vulnerabilities that is found within the code.

Learn more about vulnerabilities from

brainly.com/question/25633298

3 0
2 years ago
Does any of yall know how to delete your account?
il63 [147K]

Answer:

No i really don't but why would you want to delete your account

8 0
2 years ago
This code is supposed to accept a word as input, and then print that word to the screen.
atroni [7]

The thing that happens if you type a number instead of a word in the given code is: The number is printed

This is because the code already assigned a variable to the input and it accepts both numbers and alphanumeric keys because it is an integer command.

<h3>What is Coding?</h3>

This refers to the use of programming that is used to give instructions to a computer system

Hence, we can see that The thing that happens if you type a number instead of a word in the given code is: The number is printed

This is because the code already assigned a variable to the input and it accepts both numbers and alphanumeric keys because it is an integer command.

Read more about coding here:

brainly.com/question/16397886

#SPJ1

3 0
1 year ago
A technician upgraded the memory on a server from two 8GB sticks to eight 32GB. The server memory is now at full capacity per th
wariber [46]

Answer:

The best answer is "D"

server needs ddr4 memory and ddr3 is installed.

Explanation:

Installing ddr4 memory and ddr3 on the server will not allow the server to recognize all of the memory installed at the same time. This will help the technician for the installation one at a time.

3 0
2 years ago
Other questions:
  • What is the maximum amount that OSHA can impose as a penalty on an employer for each Willful violation?
    11·1 answer
  • In each iteration, selection sort (small) places which element in the correct location?
    9·1 answer
  • Which of the following types of cloud platforms would a webmail service offered to the general public be considered?
    9·1 answer
  • In terms of object-oriented programming, after a class is defined,
    11·1 answer
  • discuss the benefits of normalization, and do you think we should normalize our designs to higher levels than 3NF? Why or why no
    9·1 answer
  • Which of the following are benefits of designing a scalable system? Choose 3 options.
    15·1 answer
  • Which do switches create?<br> Networks<br> Wireless access points<br> Routes<br> Collision domains
    13·1 answer
  • Write the use of these computers.
    14·1 answer
  • Explain the basic operations of a computer system​
    6·1 answer
  • A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!