1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
4 years ago
7

Why do we need to secure our information

Computers and Technology
2 answers:
ruslelena [56]4 years ago
8 0
Prevent identity theft
Identity theft occurs when someone gains access to your personal information and pretends to be you online. Individuals who have accessed your personal data can retrieve your login information for various websites or commit cyber crimes such as tax fraud, all while posing as you.
balandron [24]4 years ago
7 0

because its our privacy

You might be interested in
URGENTT 2 SIMPLE EASY QUESTIONS PLZZ HELP ION UNDERSTAND COMPUTERR ILL GIVE U BRAINLEST
nika2105 [10]

Answer:

I'll happy to help

Explanation:

Please make your clear. I couldn't understand!

8 0
3 years ago
Read 2 more answers
Write down the functions of network layer in your own words.ASAP
sergeinik [125]
Hrhnebevevebnenebebenene
8 0
3 years ago
Which recovery method allows users to back up their personal files to an external drive or network share without administrative
GarryVolchara [31]

Answer:

File history

Explanation:

File history recovery method  allows users to back up their personal files to an external drive or network share without administrative assistance. File History is a backup program that holds your personal files saved in the directories archives, desktop, favorites, and Contacts. It searches the file system regularly for changes, and copies modified files to a different location.

8 0
4 years ago
A computer has a cache and main memory. 20 ns are required to reference a word that is in the cache. If the word is in main memo
Alecsey [184]

Answer:

T_{average} =12026ns

Explanation:

Given Information:

T_{cache}=20 ns

T_{main}=60ns

T_{disk} =12ms=12,000,000ns

hit_{cache} =0.9

miss_{cache} =1-0.9=0.10

hit_{main} =0.99

miss_{main} =1-0.99=0.01

There are 3 possible cases

1. Location of reference word is in cache

T_{cache}*hit_{cache} =20*0.9=18ns

2. Location of reference word is not in cache but in main memory

(T_{cache}+T_{main})*(miss_{cache}*hit_{main}) =(20+60)*(0.10*0.99)=7.92ns

3. Location of reference word is neither in cache nor in main memory

(T_{cache}+T_{main}+T_{disk})*(miss_{cache}*miss_{main})

(20+60+12,000,000)*(0.10*0.01)=12000.08 ns

The average time required to access a referenced word on this system is simply the sum of above 3 cases

T_{average} =18+7.92+12000.08=12026ns

5 0
4 years ago
True or False. You can call/execute a function in the body of a loop
Sloan [31]

You can call/execute a function in the body of a loop is a true statement.

<h3>Can you call a function in a loop?</h3>

Yes, one can be able to call a function that is said to be inside from a loop as well. The function is known to be one that can be called each time the loop is said to have executes and it is one that will stop calling after the loop finishes.

<h3>When the loop body is executed it is called?</h3>

A single execution of the loop body is known to be what we call an iteration. The loop is one that can makes three iterations.

Hence, You can call/execute a function in the body of a loop is a true statement.

Learn more about loop from

brainly.com/question/26568485

#SPJ1

8 0
2 years ago
Other questions:
  • Among the web programming languages, css is used to define _____ of the web page
    5·1 answer
  • Write a program that asks the user to input four numbers (one at a time). After the four numbers have been supplied, it should t
    6·1 answer
  • _____ rows indicate that there is different formatting for odd and even rows.
    14·1 answer
  • Select the statement that accurately describes why the Italics function is being used in the sentences below.
    8·1 answer
  • What is better for the sd card use as portable storage or use as internal storage?
    15·1 answer
  • If you are interested in working for a specific company, what type of job site should you look at for opening?
    12·1 answer
  • Write a program that administers and grades quizzes. A quiz consists of questions. There are four types of questions: text quest
    13·1 answer
  • Place the steps for attaching a file to a message in order from top to bottom.
    12·1 answer
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
  • Programmers can use sql on systems ranging from pcs to mid-size servers.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!