1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slava [35]
3 years ago
7

Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali

cious or not? Did the attack target you specifically or was it general and you were the unfortunate victim?
Computers and Technology
1 answer:
Andrei [34K]3 years ago
8 0

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

You might be interested in
Implement a sublinear running time complexity recursive function in Java public static long exponentiation (long x, int n) to ca
Archy [21]

Answer:

Following are the code block in the Java Programming Language.

//define recursive function

public static long exponentiation(long x, int n) {

//check the integer variable is equal to the 0.

if (x == 0) {

//then, return 1

return 1;

}

//Otherwise, set else

else {

//set long data type variable

long q = exponentiation(x, n/2);

q *= q;

//check if the remainder is 1

if (n % 2 == 1) {

q *= x;

}

//return the variable

return q;

}

}

Explanation:

<u>Following are the description of the code block</u>.

  • Firstly, we define the long data type recursive function.
  • Then, set the if conditional statement and return the value 1.
  • Otherwise, set the long data type variable 'q' that sore the output of the recursive function.
  • Set the if conditional statement and check that the remainder is 1 and return the variable 'q'.
8 0
3 years ago
What is the most complex part of a PC?
rjkz [21]

Answer:

From a hardware standpoint, the CPU is most likely the main component. From a software standpoint, macOS and Windows are complex software systems.

Explanation:

6 0
2 years ago
What is typically unique in each database table?
andriy [413]

ID number APEX  answer

4 0
3 years ago
Read 2 more answers
Sound can be converted from the electrical energy inside a computer into the mechanical energy of soundwaves in air by using
kogti [31]

Answer:

a transducer

Explanation:

A transducer happens to be a device that is being used for converting one form of energy into another generally when converting the input energy to the output energy. And for the transduction to take place, the change of one form of energy also occurs, like the conversion of mechanical energy to the electrical energy and also from electrical energy to mechanical energy, and which is what is required here. Hence, the correct option here is the transducer.

8 0
3 years ago
Which color is considerd to be a cool color?
scZoUnD [109]
It depends on personal tastes and what it's applied on.

For example: I like Blue. I think Blue is cool! But, I also think red is cool, on a sports car. I think it would have to be Red, but thats what I think. The same with orange. Green for a T-Shirt is cool as well!

Remember that if you want to find out what color someone likes, just ask them. Generally though, Red is considered to be cool for most things.
8 0
3 years ago
Read 2 more answers
Other questions:
  • While investigating the settings on your SOHO router, you find two IP addresses reported on the device’s routing table, which is
    15·1 answer
  • which tag does not display the text in the browser window and makes the sources code mode readable ?​
    6·1 answer
  • Which of the following is not a true statement about Christopher Columbus it oko
    15·1 answer
  • Which device protects computer systems from voltage fluctuations?
    14·2 answers
  • The ____________ mechanism consists of a lever arm attached to the mousetrap spring.
    15·1 answer
  • Mobile devices need to work within limited screen space ? true or false
    9·2 answers
  • If E=mc2 then what does F equal?
    10·1 answer
  • 1. Name the first PC virus.<br> 2. In which language are viruses written for Microsoft programs?
    8·2 answers
  • Need answer ASAP.
    8·1 answer
  • what are the main technologies that have contributed to be growth and commercialization of the Internet
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!