1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
2 years ago
9

Joel has left his computer unattended while answering a phone call . A TV repairer in his house tries to surf through the applic

ations on his computer to find out Joel’s personal data .
Which privacy-related risk threatens him ?

Here, Joel is a victim
Of _________ .
Computers and Technology
1 answer:
Triss [41]2 years ago
5 0
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
You might be interested in
Question 24 Multiple Choice Worth 5 points)
Veseljchak [2.6K]

Answer:

ZIP

Explanation:

ZIP is a type of compression file as Jpg is a picture file, Gif is a picture file, and ODOC stands for Oklahoma Department of Corrections

TBH:

it may be O ZIP but i've never heard of it.

8 0
3 years ago
Read 2 more answers
What the difference between a samsung and a android​
Vesnalui [34]

Explanation:

Every Samsung is an example of an Android but not every android is an example of a Samsung. Androids are all phones or devices that are not made by Apple.

3 0
3 years ago
Marco makes $65,000 a year as a graphic designer. He makes a charitable donation of $1,000 each year. He also has $5,000 of busi
iogann1982 [59]
The correct answer is $59,000. 
5 0
3 years ago
Read 2 more answers
The ____ statement can be used to eliminate the use of certain (flag) variables.
Juli2301 [7.4K]

The break statement can be used to eliminate the use of certain (flag) variables.

<h3>What is break statement?</h3>

A break statement is used to terminate the execution of the nearest enclosing for, do, switch, or while statement in which it appears.

The main purpose of break statement is to destroy the loop as soon as possible. For example if the given code asks a use input a integer number x. If x is divisible by 5, the break statement is executed and this causes the exit from the loop.

The advantage of break statement is it stops the case testing inside the block and break may be used within loops to alter control flow.

Therefore, the break statement can be used to eliminate the use of certain (flag) variables.

Learn more break statement here:

brainly.com/question/15082759

#SPJ4

8 0
2 years ago
The World Wide Web was conceived at University of Utah as part of the development of the Internet. True False
kaheart [24]

Answer:

False.

Explanation:

The world wide web or the web is an information system created by Tim berners-lee in 1989, that uses the uniform resource locator to access information that are linked by hyper text transfer protocol HTTP, accessed by a web browser and hosted in software applications known as web servers.

The WWW is not synonymous to the internet, but it is accessed on it, and was developed by Tim berners Lee in Switzerland.

8 0
3 years ago
Other questions:
  • The Boffo Balloon Company makes helium balloons. Large balloons cost $13.00 a dozen, medium-sized balloons cost $11.00 a dozen,
    13·1 answer
  • Write c program to check character is alphabate or not?​
    15·1 answer
  • Multiple choice
    9·2 answers
  • What would be the results of the following code? final int SIZE = 25; int[] array1 = new int[SIZE]; … // Code that will put valu
    9·1 answer
  • Write an application that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer val
    6·2 answers
  • Eric would like to have a color textbook that makes it look as if the character in an image is speaking. Which object should he
    14·1 answer
  • Which of the following tasks can you perform using a word processor?
    8·1 answer
  • Que es una red de datos
    7·2 answers
  • How does digital and hybrid computers differ in portability​
    9·1 answer
  • A program that performs handy tasks, such as computer management functions or diagnostics is often called a/an ____________.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!