1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksju [112]
3 years ago
6

Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali

cious or not? Did the attack target you specifically or was it general and you were the unfortunate victim?
Computers and Technology
1 answer:
frutty [35]3 years ago
7 0

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

You might be interested in
An administrator helps a user obtain an Internet connection through connecting a laptop with a smartphone via a cable. What has
frez [133]
The administrator set up tethering
8 0
3 years ago
Present a detailed data model for your project scenario. You can create your data model using Microsoft Visio 2010, which you wi
Troyanec [42]

Answer:

THE FARMERS PRICE CENTER

The farmer's price center is about helping farmers acquire farm inputs easily

and conveniently. Through relevant branches and supportive statt, the farmers

price center provides a fresh perspective on the day to day hardships that farmers

Tace. The tarmer's price center is run by a practicing tarnmer with tirst hand

information as he holds a bachelors degree in agriculture. His unique perspective

allows farmers to automatically connect with his point of view. The farmer's center

is equally informal as it is also a mentor or a friend. Besides selling farm inputs,

the center guides tarmers overcome their challenges.

The tarmer's price center addresses the tarming and tarming management

sector. The people who purchase from famers price center are either practicing

tarmers or want to start a venture in agriculture. They have a natural drive to create

agricultural products and seek out professional advice. The ideal customer for the

farmer's price center would be the new farmer or investor who wants to start an

agricultural venture or manage their firm better. The farmer's price center provides

a comprehensive resource that answers the questions farmers have while at the

same time giving thema step by step way to succeed. Mostly, farmers do not have

The farrmers price center will be getting 5,000 unique customers per month

and be ranked as a pace setter and a trusted mentor and be ranked as a leader in

agricultural products and advice site. To achieve these long term goals, the

Tarmer s price center needs to apply imbound marketing te chniques to get tound.

Part or this strategy will be to contract sales representatives to market the varlous

products to the retail shops across the countryside. These sales representatives are

to be paid a retainer and commission upon hitting their sales target. The (products

are transported by our fleet of trucks to the customer's premises. Payment shall be

made on cheque at the end of the month according to the number of products

delivered. Each sales representative shall prepare a report on their daily sales with

accordance to their specitic routes.

ne raners price center is all about neiping ramers tnve n tne cndotic

world of business filled with scrupulous products. The farmer's price center will

achieve upwards of 5,000 unique customers and S10,000 in revenue per month

within the next two years.

6 0
2 years ago
A network designer wants to run a 10 gigabit backbone between two switches in buildings that are 75 m (246 feet) apart. What is
stellarik [79]

The main consideration when selecting an appropriate copper cable is that:

At that given distance, one can use some kinds of shielded or screened cat 6A or one can use a cable which is said to be needed for the installation to be in line with Ethernet standard 10GBASE-T.

<h3>What are the types of copper cables?</h3>

Copper cable are known to often electrical signals to transmit data between some or a given  networks.

Note that there are three types of copper cable which are:

  • coaxial,
  • unshielded twisted pair
  • shielded twisted pair.

Copper is said to be a kind of electrical conductor in a lot of categories of electrical wiring and so The main consideration when selecting an appropriate copper cable is that:

At that given distance, one can use some kinds of shielded or screened cat 6A or one can use a cable which is said to be needed for the installation to be in line with Ethernet standard 10GBASE-T.

Learn more about gigabit from

brainly.com/question/14312073

#SPJ1

5 0
2 years ago
I need ansers for this guys
Pani-rosa [81]

Answer:

8 is True .. For 10 about sequential structures, it makes sense to be true?

Explanation:

7 0
3 years ago
Write the interface (.h file) of a class GasTank containing: A data member named amount of type double. A data member named capa
REY [17]

Answer:

The interface(.h file) in cpp language is shown below.

#ifndef GASTANK_H

#define GASTANK_H

class GasTank

{

   //variables as mentioned

   double amount, capacity;

   //constructor

   GasTank(double p);

   //method to add gas amount

   void addGas( double g);

   //method to subtract used gas amount

   void useGas(double u);

   //method to verify if the tank is empty

   bool isEmpty();

   //method to verify if the tank is full

   bool isFull();

   //method to return current gas amount in the tank

   double getGasLevel();

   //method to return amount of gas to be filled in the tank

   double fillUp();    

};

#endif

Explanation:

1. The class GasTank ends with a semicolon.

2. The variables are declared with double datatype as mentioned.

3. The constructor is declared accepting double parameter.

4. The methods, addGas() and useGas(), accept double parameter and return no value.

5. The methods, isEmpty() and isFull() and getGasLevel() return boolean, boolean and double values, respectively.

6. The header file begins with the following keywords.

#ifndef GASTANK_H

#define GASTANK_H

7. The header file ends with the following keyword.

#endif

8. This header file is saved as GasTank.h, the name of the class with .h extension.

9. This header file is imported in the program using the following code. The header file is enclosed within quotes and not brackets like the iostream header file.

#include "GasTank.h"

10. All the code beginning with # do not end with any punctuation mark.

11. All the methods in the header file are only declared and none of the methods have any definition.

12. The program which uses this header file is responsible to define all the methods in the header file and use all the variables in the header file.

13. The cpp language does not supports interface directly. Hence, the header file is a way to implement an interface which is a feature of completely object-oriented programming languages.

14. All the requirements mentioned are implemented in the above header file.

7 0
3 years ago
Other questions:
  • Why is wearable technology important?
    12·1 answer
  • A plan to budget time for studying and activities is referred to as
    15·1 answer
  • Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
    9·1 answer
  • Circuitry can be either basic or ___________.
    14·2 answers
  • Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
    10·1 answer
  • Christina used the following expression to calculate the average ages of her three program users: average = age1 + age2 + age3 /
    13·2 answers
  • Which of the following file formats cannot be imported using Get &amp; Transform?
    6·1 answer
  • What is Digital Access, and why is it important for YOUR generation?
    9·1 answer
  • For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Als
    15·1 answer
  • Identify the programmer’s responsibility in maximizing the programs reliability by having awareness of the beneficial and harmfu
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!