1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elenna [48]
3 years ago
9

When are computers most vulnerable to threats or damage?

Computers and Technology
1 answer:
valentinak56 [21]3 years ago
8 0
With virus protection
You might be interested in
When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack"
kumpel [21]

<em>The answer is : He must consult with a lawyer. </em>

<em>Hacking is considered illegal and in other countries, it is punishable by law. Hacking is gaining unauthorized access to a network. Even when someone is giving you permission to do it, it is still wrong and illegal. Therefore, you must know of your rights and make all the party involved to signed an agreement to save yourself.</em>

8 0
3 years ago
14. Emelia is very concerned about safety and has conducted a study to determine how many bike helmets were replaced at each loc
damaskus [11]

Answer:

Explanation:

Known Variables A = max Daily Rentals

X = Damaged helmets %

lets find the formula to calculate Helmets per location :taking 1st row as an example.

412 = B - (B*13/100)

412 = (100B-13B)/100

412*100 = 87B

B= 412*100/87

Hence, the generic formula becomes : B= A*100/(100-X)

Applying the same formula for each row and then using ROUND function of excel to round off the digits

=ROUND(number,digits) where number is the number you would like to round off and the digits is the number of decimal digits for it to round off. Since we want natural numbers in our example, we will be using digits as 0.

Explanation:

See attached pictures also.

5 0
3 years ago
Read 2 more answers
Plsss help me<br>give two examples of problems that can occur when sytems do not work properly​
melomori [17]

Answer:

Explanation:

1. There can be a run out of something ex. The water cycle we could run out of water if evaporation stops happening

2. Something wont happen ex. In a shoe factory if no one is boxing the shoes the shoes don’t get boxed.

Hope this helps

6 0
2 years ago
Laurel, the manager of a software company, assumes that the male employees in his organization are more creative and innovative
grandymaker [24]

Answer:

Sterotyping

Explanation:

A stereotype is an over-generalized perception or view about a particular category of individuals or group. It is a belief that people might have concerning each and every person of a particular group. The type of expectation can differ from people to people; it can be, for instance, a belief or perception about a particular group's personality, preferences, or ability.

5 0
3 years ago
wo non-negative integers x and y are equal if either: Both are 0, or x-1 and y-1 are equal Write a function named equals that re
Mrac [35]

Answer:

Using python programming language.

Explanation:

#to define the function write as below

def equal():

    #to get the two integers from the user

#The user is asked for input in the code below.

x = int(input("Enter the value for X"))

y= int(input("Enter the value for y"))

if x==0 and y==0:

    print("both numbers are ", "0")

elif: x==1 and y==1:  #This test if both x and y are 1

    print("true")

elif: x==y: #this line test if both values are equal

    print("true")

else:

    print("False")

equal()  #end of the function

3 0
3 years ago
Other questions:
  • Which set of steps will organize the data to only show foods with more than 100 calories and rank their sugar content from great
    8·1 answer
  • ________ are found on the motherboard and are used to attach your hard disk.
    6·1 answer
  • According to COSO, which of the following components addresses the need to respond in an organized manner to significant changes
    14·1 answer
  • A _______ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to hea
    9·2 answers
  • In the ADT graph the methid addVertex has efficiency
    15·1 answer
  • Which command compiles the Java source code file Welcome.java?
    11·1 answer
  • Eight what makes one character
    14·1 answer
  • An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the req
    14·1 answer
  • Savings accounts usually offer _________ interest rates than checking accounts. It is _________ to access your money in a saving
    10·2 answers
  • How it/computing has impacted on engineering? <br><br> I need seven answers please help !
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!