1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
3 years ago
9

Joel has left his computer unattended while answering a phone call . A TV repairer in his house tries to surf through the applic

ations on his computer to find out Joel’s personal data .
Which privacy-related risk threatens him ?

Here, Joel is a victim
Of _________ .
Computers and Technology
1 answer:
Triss [41]3 years ago
5 0
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
You might be interested in
____________ is a series of numbers that identifies a particular computer. They may or may not be a reliable way to link you to
Valentin [98]

Answer:

An IP Address

Explanation:

Every computer or networking device has its own IP address. It is a series of numbers that will uniquely identify a particular computer on the internet. Since the computer connects to the internet via a router (provided by the Internet Service Provider), it is the router's IP address (or simply the network address) that is shared on the internet. So, the IP address is not exactly a reliable way of linking you to what you do on a computer.

<em>Hope this helps!</em>

6 0
3 years ago
Structured walk-throughs take place throughout the SDLC and are called _____ reviews, depending on the phase in which they occur
Tpy6a [65]

Answer:

design

Explanation:

Based on the information provided within the question it can be said that these are called design reviews. This is one of the most important parts of the development of a system. This focuses more on answering how something is going to be done in the system as opposed to answering what is going to be done for the system depending on the questions asked in the analysis phase.

5 0
3 years ago
If you want a relatively broad, unbiased overview of a subject you should consult a/an ?
tekilochka [14]

To find a relatively broad unbiased overview of a subject in a specific field of study, it would be best to consult a: encyclopedia.
8 0
3 years ago
Read 2 more answers
Once you fix the bug in a code, what is the last thing you should do?
aleksklad [387]

Answer:

Know what the code should do

4 0
3 years ago
What a register in cpu does ?​
Rufina [12.5K]

Answer:

CPU register) is one of a small set of data holding places that are part of the computer processor. A register may hold an instruction, a storage address, or any kind of data (such as a bit sequence or individual characters). Some instructions specify registers as part of the instruction.

6 0
3 years ago
Other questions:
  • Which is better to use for cleaning electronics, Ethyl alcohol vs isopropyl alcohol?
    14·1 answer
  • What is last mile in VOIP
    13·1 answer
  • Consider the following relationship involving two entities, students and classes:A student can take many classes. A class can be
    9·1 answer
  • An example of hardware is a(n) _____.
    9·2 answers
  • How does this happen on brainly????
    12·2 answers
  • Your computer monitor’s power switch is in the ‘ON’ position; however, the display is blank. Which of the following is NOT a lik
    5·1 answer
  • FREE BRAINLIEST!!!
    14·2 answers
  • System software includes all of the following except
    10·1 answer
  • A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing
    12·1 answer
  • 1
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!