1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
3 years ago
12

Which statement is NOT a source of threats?

Computers and Technology
2 answers:
Sholpan [36]3 years ago
8 0
The answer is B because it is recovering data so it’s not a threat financial mistakes is a problem and the other one to so the answer is B.

Hope this helps :)))))
kobusy [5.1K]3 years ago
5 0

Answer:

B

Explanation:

because data is phone business

You might be interested in
Which TWO of these correctly describe a Trojan horse malware?
mina [271]
The first one and last one
6 0
3 years ago
Read 2 more answers
What can a person do to help increase their credit score?
sergeinik [125]
The person can keep up their bills and payments and send them off in time. keep your balances low and try to never go into debt. I you do get into debt than pay it off when you get the chance instead of forgetting about it. 
4 0
3 years ago
In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo
kirill115 [55]
The word DoS refers to the Disk Operating System. In the case given above, if it happens that there is a distributed DoS attack, the attacker then sends messages directly to the BOTS. Bots refer to internet or web robots. Hope this answer helps. The answer is the first option.
4 0
3 years ago
Pls answer will give brainlest dont answer if you dont know Upload your 300-word essay containing the following: the definition
Rainbow [258]

Answer: oh hello human :) also PLEASE DONT KILL ME I’m answering this because the question was already answered already on another post

6 0
2 years ago
Which of the following statements best
antoniya [11.8K]

Answer

b

Explanation:

3 0
3 years ago
Other questions:
  • You are working on an excel table and realize that you need to add a row to the middle of your table. what is one way to do this
    12·1 answer
  • You are most likely to use<br> images for photos or digital paintings.
    6·1 answer
  • What does the binary odometer show about representing large numbers?
    8·1 answer
  • While reading difficult content, you should always start witha.Surveying the chapterc.Reading the chapterb.Defining vocabulary w
    8·1 answer
  • Stephanie would like to know the average number of regular hours worked by her employees. In cell B11, create a formula using th
    8·1 answer
  • Some printers spray ink, while others use heat or lasers to create images.
    14·2 answers
  • Consider the following code segments that are potential replacements for /* missing code */.
    6·1 answer
  • Escribe 10 ejemplos de lo que consideras un byte
    5·1 answer
  • How do you delete questions you asked?
    7·2 answers
  • Bank Account Postings While reviewing your checking account balance online, you notice that debit card purchases have not posted
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!