1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksju [112]
3 years ago
6

Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali

cious or not? Did the attack target you specifically or was it general and you were the unfortunate victim?
Computers and Technology
1 answer:
frutty [35]3 years ago
7 0

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

You might be interested in
Explain what a hypervisor application is and what it is used for. Pick a hypervisor application and list its requirements
Masja [62]

Answer:

can u give me more details so that I can help u

8 0
3 years ago
What is the difference between business strategies and business models?
bogdanovich [222]

Answer:

A . Business strategies include long-term business plans, while business models include plans for daily business functions

7 0
3 years ago
QUESTION 4 of 10: True or False: According to the reading, investors care about your love for your business.
mixer [17]

Answer:

false

Explanation:

5 0
3 years ago
Read 2 more answers
Write a program that reads in two integers typed on the keyboard and outputs their sum, difference, and product.
dsp73
# Written in python

a = int(input("Enter an integer: "))
b = int(input("Enter an integer: "))

sum = a + b

# subtract the smaller number from the bigger
if a < b:
    dif = a - b
else:
    dif = b - a

prod = a * b

print("The sum is", sum)
print("The dif is", dif)
print("The product is", prod)
6 0
3 years ago
What is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnet
Elza [17]

Answer:

The correct answer to the following question will be "Magnetic medium".

Explanation:

Some storage device that portrays details or information using magnetic patterns is called a magnetic device.

  • Magnetic tape, and hard drives are the commonly used magnetic storage devices.
  • This will be the method by which magnetic methods are used to hold and retrieve information on tapes.

So, it's the right answer.

3 0
3 years ago
Other questions:
  • Digital manufacturing has impacted our world today! List a reasons why.
    11·1 answer
  • Can Someone give me a 5 paragraph essay about all of the uses in Microsoft Word.
    9·1 answer
  • The smallest unit of storage is​
    15·1 answer
  • If your DTP document contains watermarks on every page, where can you place them?
    10·1 answer
  • Two technicians are discussing Newton's first law of motion. Technician A says that a lightweight vehicle requires as
    8·1 answer
  • What was revolutionary about Web 2.0?
    5·1 answer
  • A simple C program to find the logarithm of any number in any base.....​
    13·1 answer
  • The technique that allows you to have multiple logical lans operating on the same physical equipment is known as a.
    6·1 answer
  • Write code that declares a variable named minutes, which holds minutes worked on a job,
    9·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!