1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
9

what security threats do you face in your everyday computer usage? list the current security you use on your digital devices wha

t sort of security threats specifically target networks? after reading chapter 5, how will you increase your security?
Computers and Technology
1 answer:
gulaghasi [49]3 years ago
5 0

Answer:

1. The basic threat is junk mails which contains malicious links. There can also be malicious applications on the web which when downloaded can also cause the download of malware. Zero day threats are also being used by hackers to target an OS for a single day.

2. Anti virus software such as MACFREE

3.Threats such as Computer virus, computer worms, Trojan horse, Phishing, Spyware, Rootkit etc. will targets network.

4. I will increase security by:

a) Installing a firewall

b) Updating all the applications and OS

c) Verifying applications before downloading

d) Boost access control by providing strong passwords

Explanation:

You might be interested in
You install a new driver, but your device still doesn't work. What is the first thing you should do?
Lina20 [59]

restart the computer then contact customer service

7 0
3 years ago
The Mesozoic is known as the _________
oee [108]
Known as Age of the Reptiles.

this might help out

Toward the beginning of the Mesozoic Era there was a depleted ecosystem world-wide. Many of the old life forms had just gone extinct in the Permian<span> Extinction, the world's largest mass extinction. This depleted state was followed by an explosion of new life forms, which included the dinosaurs and mammals, and later in the Mesozoic, the birds and flowering plants. </span>

7 0
3 years ago
The list listOne is a sorted list of numbers that contains 700 elements. The list listTwo is a sorted list of numbers that conta
Flura [38]

Answer:

I am pretty sure the answer is A

Explanation:

3 0
3 years ago
My friend Leo wants to have an emergency plan for his final exams on University of Southern Algorithmville. He has N subjects to
leonid [27]

Answer:

Greedy is an algorithmic paradigm that builds up a solution piece by piece, always choosing the next piece that offers the most obvious and immediate benefit. Greedy algorithms are used for optimization problems. An optimization problem can be solved using Greedy if the problem has the following property: At every step, we can make a choice that looks best at the moment, and we get the optimal solution of the complete problem.

If a Greedy Algorithm can solve a problem, then it generally becomes the best method to solve that problem as the Greedy algorithms are in general more efficient than other techniques like Dynamic Programming. But Greedy algorithms cannot always be applied. For example, the Fractional Knapsack problem (See this) can be solved using Greedy, but 0-1 Knapsack cannot be solved using Greedy.

The following are some standard algorithms that are Greedy algorithms.

1) Kruskal’s Minimum Spanning Tree (MST): In Kruskal’s algorithm, we create an MST by picking edges one by one. The Greedy Choice is to pick the smallest weight edge that doesn’t cause a cycle in the MST constructed so far.

2) Prim’s Minimum Spanning Tree: In Prim’s algorithm also, we create an MST by picking edges one by one. We maintain two sets: a set of the vertices already included in MST and the set of the vertices not yet included. The Greedy Choice is to pick the smallest weight edge that connects the two sets.

3) Dijkstra’s Shortest Path: Dijkstra’s algorithm is very similar to Prim’s algorithm. The shortest-path tree is built up, edge by edge. We maintain two sets: a set of the vertices already included in the tree and the set of the vertices not yet included. The Greedy Choice is to pick the edge that connects the two sets and is on the smallest weight path from source to the set that contains not yet included vertices.

4) Huffman Coding: Huffman Coding is a loss-less compression technique. It assigns variable-length bit codes to different characters. The Greedy Choice is to assign the least bit length code to the most frequent character. The greedy algorithms are sometimes also used to get an approximation for Hard optimization problems. For example, the Traveling Salesman Problem is an NP-Hard problem. A Greedy choice for this problem is to pick the nearest unvisited city from the current city at every step. These solutions don’t always produce the best optimal solution but can be used to get an approximately optimal solution.

6 0
3 years ago
OSHA standards appear in the ___________ and are then broken down into ____________.
Alisiya [41]
OSHA standards appear in the Code of Federal Regulations (CFR) <span>and was then broken down into two parts. It contains standards to ensure a </span>
4 0
3 years ago
Other questions:
  • A newspaper publishes a negative editorial on how local politicians are dragging their feet in building a new bridge. Select the
    5·2 answers
  • When might it be necessary or advisable to write a shell script instead of a shell function? give as many reasons as you can thi
    15·1 answer
  • Write a program that prints the following 45 pairs of numbers:
    10·1 answer
  • ?trophic levelNYIGVU.;/IO9YK7,'0;
    12·1 answer
  • Where are all of your documents saved?
    14·2 answers
  • To create bold shadows, which lighting choice would work best.
    7·1 answer
  • You have a small company and want to keep your cost low, but it is important your employees share data. which network would prov
    13·1 answer
  • If we assume the modern view of existential import, why is the following syllogism invalid? No computer is made of clay. All com
    15·1 answer
  • What ethical concerns might arise from applying new IT to law enforcement?
    5·1 answer
  • ____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!