1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
3 years ago
15

what are some of the challenges that could arise from setting up a file management system on a computer

Computers and Technology
1 answer:
seropon [69]3 years ago
7 0
A virus maybe or ransomware
You might be interested in
Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793?
Shkiper50 [21]

Answer:NULL Scan

Explanation:RFC 793(Request for comments) is a type of RFC command labeled with the number 793 which can operate with the TCP protocol.They are sort of document form which is from IETF( Internet Engineering Task Force ).

The null scan is scanning protocol used by legal as well as illegal hackers for working in the transfer control protocol architecture. It is used for the identification of the the ports and holes in TCP servers.they can also have the negative impact if used by the illegal hackers.

5 0
3 years ago
What are experts in technology who use their knowledge to break into computers and networks, for profit or just as a challenge k
insens350 [35]

Answer:

Hacker

Explanation:

Hacker -

It refers to the computer software expert , who is responsible to break into the unauthorized networks or computer , is referred to as a hacker .

The hacker is skilled with exceptional computer and computer software knowledge .

Hacking is an illegal practice , as the person is able to access some confidential and personal data and information of any other person or organisation .

Hence , from the given information of the question ,

The correct term is hacker .

3 0
3 years ago
ASAP please
Semenov [28]
I think it’s 4


a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
5 0
3 years ago
Based on the naming recommendations in the book, which of the following is a good identifier for a variable that will be used to
Mazyrski [523]

Answer:

A good identifier for a variable that will be used to hold an employee’s phone number is:

a. EmployeePhoneNumber

Explanation:

An identifier is a string that uniquely identifies or names the entity or an object.  The object or entity may be a constant, variable, structure, function, etc. Identifiers can be formed from uppercase and lowercase letters, digits, and underscores.  Meaningful identifiers mostly favor the use of long descriptive names like EmployeePhoneNumber.  However, the other options can still be used.

7 0
3 years ago
Based upon the contents of the BOOKS table, which line of the following SQL statement contains an error?
Flauer [41]

Answer:

The answer is "Option 4"

Explanation:

In the given question line 4 is incorrect because it uses the select command, which selects "pubid and cost" that is already defined inline 3. This statement selects one or more a collection of records from the tables. It also recovers more row across any table that server and correct choices can be described as follows:  

  • In the given choices, except line 3 all were correct because first, it selects column names from the table "book".
  • After selecting column names it and defines condition were pubid value is 3.
5 0
3 years ago
Other questions:
  • Write a function named print_backward that accepts a String as its parameter and prints the characters in the opposite order. Fo
    12·1 answer
  • To change a selected shape’s height or width to a specific value, type the value in the Height or Width text boxes on the
    14·1 answer
  • Which of the following is a school-to-work program that provides the student with paid employment, school credit, and school gra
    7·2 answers
  • PLEASE HELP!!! THIS IS WORTH A TEST GRADE!!!
    13·1 answer
  • ______ is a disadvantage of EDI.
    8·1 answer
  • Combining two or more cells to make one is called​
    8·1 answer
  • Is a NAS just a collection of hard drives or a computer
    10·1 answer
  • Consider the code below. When you run this program, what is the output if the temperature is 77.3 degrees Fahrenheit?
    6·1 answer
  • <img src="https://tex.z-dn.net/?f=%28a%20%2B%20b%29%20%20%7B2%7D" id="TexFormula1" title="(a + b) {2}" alt="(a + b) {2}" align
    15·1 answer
  • True/False: Each individual element of an array can be accessed by the array name and an element number, called a subscript. Tru
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!