1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tigry1 [53]
3 years ago
10

you were discussing software privacy with a friend were surprised to learn how software privacy can impact your life everyday. w

hat is a risk and or effect of software privacy
Computers and Technology
1 answer:
Slav-nsk [51]3 years ago
7 0
Those who use pirate software:<span>1)Increase the chances that the software will not function correctly or will fail completely
2)Forfeit access to customer support, upgrades, technical documentation, training, and bug fixes
3)Have no warranty to protect themselves
4)Increase their risk of exposure to a debilitating virus that can destroy valuable data
5)May find that the software is actually an outdated version, a beta (test) version, or a nonfunctioning copy
6)Are subject to significant fines for copyright infringement</span>
You might be interested in
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
rjkz [21]

Answer:

Distributed DOS attacks.

Explanation:

Computers in a network or the network itself is are prone to cyber attacks. A cyber attack is a concept of taking advantage of computer network vulnerabilities, to retrieve information from the target source. An example of these types of security attacks is the denial of service (or DOS) attacks.

The DOS  or the distributed DOS attack prevents users form accessing or requesting a service that they are legitimately allowed, by flooding the target system with superfluous resource request from millions of computers, controlled by the attacker.

8 0
2 years ago
Which of the following is not a type of bank? (Everfi)
Zinaida [17]

Answer

Pay Day Lender

Explanation

A bank is a financial institution which is authorized by the government to accept deposits inform of cash or cheque from the public who are the customers, and it creates a credit. It saves money to for the customers and also provides security for the customers money. It also lends money to the customers as loan where they pay with interest within a given time. There are many types of banks which include credit unions, online banks,industrial, agricultural, retail banks and many others.

3 0
3 years ago
Read 2 more answers
What level of system and network configuration is required for cui?
andrey2020 [161]

The level of system and network configuration is required for Cui will be "Moderate confidentiality".

  • The data that really should be safeguarded or disseminated under appropriate regulations, rules, and conservative government objectives or guidelines, would be considered as CUI.
  • The FISMA demands CUI Fundamental to somehow be safeguarded somewhere at the FISMA Conservative category and may even be labeled as CUI as well as regulated.

Thus the above answer is right.

Learn more:

brainly.com/question/14083709

4 0
2 years ago
A shopaholic has to buy a pair of jeans , a pair of shoes l,a skirt and a top with budgeted dollar.Given the quantity of each pr
Rasek [7]

Answer:

hfjgyyitjtjjtjtj*jj*jtjtjthrhrhfhffbf

4 0
3 years ago
At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?
Natalka [10]

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

6 0
2 years ago
Other questions:
  • Greg works for online games development company. He occasionally visits online literature sites and downloads e-books of his cho
    12·2 answers
  • Assembly (Procedure and Conditional Processing). For the following program, what are outputs for register EAX, EBX, ECX, and EDX
    11·1 answer
  • When reading words using a Scanner object's next method, _________. a. any characters at the beginning of the input that are con
    5·1 answer
  • Which of the following represent advantages of GPL-licensed software? Check all of the boxes that apply It is always free of cos
    12·2 answers
  • The first tools that analyzed and extracted data from floppy disks and hard disks were MS-DOS tools for ____ PC file systems.
    6·1 answer
  • Help giving points mark BRAINLEST
    5·1 answer
  • The Power of If Worksheet
    13·2 answers
  • What is the simplest form of backing up data?
    10·1 answer
  • Game Design!
    10·2 answers
  • (40 PTS) Be specific
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!