1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lynna [10]
3 years ago
9

PLZ ANSWER THESE QUESTIONS FOR 30 POINTS AND BRAINLIEST!

Computers and Technology
1 answer:
svet-max [94.6K]3 years ago
4 0

Answer: Computer Hacking generally refers to unauthorized intrusion into a computer. One example is Trojan which is  malware disguised as harmless software. Another example is Rootkits, malicious segment of code injected into your computer system, designed to hide any unauthorized activity taking place.

Effects: Identity theft and email access

Consequences: one year in prison and a $100,000 fine.

Explanation:

You might be interested in
Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
STatiana [176]
That would be what is known as Spyware, a common form of this is known as a "Trojan Horse". This type of malware is typically latched on and hidden within files, such as when downloading a pirated version of a song, game, art-work, etc...
3 0
3 years ago
Read 2 more answers
____ is a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the dat
IgorLugansk [536]

Answer: Online analytical processing

Explanation:

Online analytical processing(OLAP) is the method through which multi-dimension analytical queries can be resolved.User can attain selected query data as per their selection and then assess and analyze them from different view point.

  • It helps in viewing and reporting , planning ,performing analytical calculation, collecting data in data cubes etc.
  • Other options are incorrect because data adjacency, Ad hoc reporting ,data segregation and E-discovery are not the mechanism through which query and storage of data in data cubes take place.
  • Thus, the correct option is online analytical processing
3 0
3 years ago
Hey yall wanna send me some just ask for my phone #
GuDViN [60]

Answer:

Send you some what?

Explanation:

the answer is 12

7 0
3 years ago
Describe Relational Query Languages and Operations.
Lelechka [254]

Answer:

Relational query language is the language that is used in the queries of the relational databases that has rows and columns in table. The user or client presents a request for gaining the information from the database. The relationships in the database are defined in numerous ways which creates the query.

This language can be procedural form or non-procedural form.The operations performed by this language are communication with the relational database, analyzing the relationships between the entities of database,splitting the request from client and then execution of that request is done by database management system(DBMS), etc.

7 0
3 years ago
A part-time job performed while in high school must have the approval of your school counselor.
Artist 52 [7]

Answer:

False, it only needs approval of your parents/guardian

May I have brainliest please? :)

4 0
3 years ago
Read 2 more answers
Other questions:
  • The n modifier after the tilde forces the index variable to expand only to the ______
    15·1 answer
  • Which of the following was one of the first internet search engines? A. archie B. google C. Yahoo D.ask
    7·1 answer
  • Analog signals consists of individual electric pulses that represents bits group together into bytes {True/False}
    13·1 answer
  • ) Which is true about the agile method?
    7·1 answer
  • A ________ is a member function that is automatically called when a class object is
    6·1 answer
  • What is your favorite food
    11·2 answers
  • If you need some one to talk to you can talk to me
    13·2 answers
  • Write a function template that accepts an argument and returns its absolute value. The absolute value of a number is its value w
    11·1 answer
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
  • A ____ is an Access feature that makes it easy to enter data.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!