1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vesna_86 [32]
3 years ago
7

The computer system for a major retail store was hacked. Many addresses, credit card numbers, and other pieces of customers’ per

sonal information were stolen. Which career professional would best assist the retail store from preventing loss of further information?
Computers and Technology
2 answers:
drek231 [11]3 years ago
7 0

Answer

Cyber Security professionals

Explanation

Cyber security professionals can help the company protect itself from hackers. They are experts who will install antivirus into the software used in the company to protect virus manipulation and prevent malware. They will further encrypt the websites of the company and reset the password of the computers into two-factor authentications to make the login requirements advanced.


jonny [76]3 years ago
4 0

The best career professional to deal with a hacking incident would be someone in the field of cyber security, specifically someone working as a security analyst or a cryptographer.

This individual would be able to help the retail store create a better security system to ensure that it would be more difficult for hackers to steal sensitive information from the retail store.

You might be interested in
*/ What's wrong with this program? /* public MyProgram { public static void main(String[] args); } int a, b, c \\ Three integers
gulaghasi [49]

Answer:

A lot is wrong with the program given in the question. See the corrected version below:

<em>public class ANot {</em>

<em>    public static void main(String[] args) {</em>

<em>        int a, b, c;</em>

<em>    //Three integers</em>

<em>    a = 3; b = 4; c = a + b;</em>

<em>        System.out.println("The value of c is " + c);</em>

<em>    }</em>

<em>}</em>

Explanation:

Errors:

1. The main method had a semi colon after it. This is wrong

2. An open brace was supposed to follow the main method

3. The declaration of the variables was supposed to end with a semi colon

4. the correct comment style is // and not \\

5. Initialization of variables was supposed to end with semi colons

6. The output statement had C and not c which is the declared and initialized variable..Java is strictly typed

7. Open and closing braces for the class and method wrongly placed

6 0
4 years ago
Write a C Program to Print the initial letter of Name Ferdous
Murrr4er [49]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The question is about writing a C program that prints the initial letter of Name Ferdous.

Therefore, below is the given complete code that prints the first letter of the name Ferdous.

<em>#include <stdio.h> </em><em>/*import strandard input/output library*/</em>

<em>#include<string.h></em><em> /*import string library to handle string type of data*/</em>

<em> </em>

<em>int main(void) </em><em> /*started the program execution- program entry point*/</em>

<em>{ </em>

<em>char *str = "Firdous";</em><em>   /*char to pointer str contains string "Firdous"*/</em>

<em>int len = strlen(str);  </em><em> /*this line of code is not neccary, but if you print other character for example last character of the name then you can use it*/</em>

<em>printf("First Letter of the name is: %c", str[0]); </em><em>  /*print first letter of the name*/</em>

<em>} </em><em>  /**program terminated*/</em>

5 0
3 years ago
Which of the following is a major difference between XSS attacks and remote code exploits?
Dafna1 [17]

Answer:

Option (c) Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Explanation:

  • XSS stands for Cross-site Scripting. In this types of attacks, a malicious code is injected in the trusted web sites and it sends the malicious code into the users. The users think that the genuine code was sent but not.
  • This involves sending server side scripts which are executed by the user and these may even change the html pages too.
  • Remote code exploitation means the user can inject the code and try to gain access. Usually, all the programming languages have evaluation functions if used the user can try to gain the access with this evaluation functions.
  • This can lead to the compromise of the whole web server too.So, it is not a good practice to use the evaluation functions by the developers.
  • In this type of attack, the attacker tries to inject the code remotely.
  • Option (c) is correct and options (a),(b) and (d) are wrong options.
4 0
3 years ago
How do the interests of carriers differ from the interests of websites? What are the implications for websites from a value chai
Keith_Richards [23]

Answer:

Explained below.

Explanation:

- The interest of the carriers has it's major focus on the process of getting funds from both individual customers and corporate entities that run the websites. However, the interest of websites’ has it's major focus on the process of generating funds in form of subscriptions or funds gotten from paid adverts from both individual customers and corporate entities.

- In terms of value chain perspectives; the websites experience far more pressure to keep fresh and exciting features and services on their platform while carriers don't experience that but only experience having to compete with innovations being done by their existing competitors to remain leaders in the field.

7 0
3 years ago
What type of redundant storage configuration is most common for hosting the operating system and applications on a server
Ne4ueva [31]

Answer:

RAID 1 is the redundant storage configuration

Explanation:

6 0
2 years ago
Other questions:
  • What are three settings that are available in the Properties dialog box of a message?
    9·2 answers
  • Compare and contrast between Client/Server and Peer-to-Peer networks. What are some of the business benefits of using such netwo
    9·1 answer
  • What is the default file extension for a document created in Word 2016?​
    14·1 answer
  • How do I attach a file on the computer?
    13·1 answer
  • In fixed-width files, each record is on a separate line and the fields are separated by a special character.
    7·1 answer
  • Tim is creating a page to display his poker club’s set of rules. He has main categories and subcategories along with about a par
    12·1 answer
  • Technology deals with...
    12·1 answer
  • A vending machine that serves coffee pours a varying
    10·1 answer
  • Write a program that will input two numbers and print the larger number on the screen.
    13·1 answer
  • Three negative impact of littering<br>​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!