1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
4 years ago
7

What is Computer security and what are the several forms of damagesthat can be done by the intruders to the computersystem?

Computers and Technology
1 answer:
alina1380 [7]4 years ago
6 0

Answer:

 Computer security are defined as, It allowed users to use the system of the computer keeps safe and secure from all the threats. It can control when we put in the place for providing the integrity and the components availability of the computer system like data and firmware.

Damages that can be done by the intruders to the computer system are:

  • Loss of the sensitive data or information to steal the internal information.
  • Caused damage and destruction of the computer system.
  • Someone can use the confidential information against any other organisation users which result in legal action.
You might be interested in
A database admin uses a SHOW statement to retrieve information about objects in a database. This information is contained in a _
vlada-n [284]

Answer:

motherboard

Explanation:

i think

3 0
3 years ago
What technological changes at the turn of the twentieth century affected american life?
daser333 [38]
The technological changes at the turn of the twentieth century that affected American life include the rise of the internet and mobile devices. The internet signaled the opportunity for immediate access of information. Paired with mobile technology, Americans were able to communicate almost instantly.
5 0
3 years ago
How to check if serial interface is dte ot DCE?
Anna11 [10]

If you can see the DTE/DCE cable, you can tell by looking which router has the DCE interface connected to it - the letters "DTE" or "DCE" will either be molded into the connector itself, or if it's an older cable there should be a little piece of tape on the cable that tells you what the interface type is.

5 0
3 years ago
Type of malware that is spread when you distribute
vladimir1956 [14]
Trojans, normal viruses, etc. Anything can and could hop on to the files you send depending on the websites and if you don't have a firewall.
3 0
4 years ago
Program Convert Measurements:
worty [1.4K]

on the truth is that the walls

6 0
3 years ago
Other questions:
  • A document repository is down when you attempt to access it. which isa principle is being violated?
    13·1 answer
  • Your friend is working on fixing their Homework assignment. They need a lot of help. You know all the bugs in the file, but due
    12·1 answer
  • Which one of the following analog VOM ranges would be selected to measure a DC
    13·1 answer
  • Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s person
    7·2 answers
  • Write a perl program that reads from a file containing a list of names and then displays that list to a user. The program should
    11·1 answer
  • A class can inherit behavior from a parent but also define its own and override parent behavior. This is called:
    8·1 answer
  • You construct a simple electrical current to boil water for tea. A battery generates positive and negative charges. A wire conne
    13·1 answer
  • Input images into a computer
    11·1 answer
  • What are common considerations businesses need to make before purchasing new computers? Check all of the boxes that apply.
    6·1 answer
  • Which statements are TRUE about web services protocols? (Select TWO responses) SOAP and REST are both web service communication
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!