1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
3 years ago
9

Question 1(Multiple Choice Worth 5 points)

Computers and Technology
1 answer:
vlabodo [156]3 years ago
6 0

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

You might be interested in
What is returned by datetime(1970, 1, 1).strftime('%Y-%d-%B') in Python?
slava [35]

Answer:

1970-01-January

Explanation:

Given

datetime(1970, 1, 1).strftime('%Y-%d-%B')

We start by analysing the give code segment.

date time means that we want to work with dates and time

1970,1,1 is the date time we're working with

strftime represents the format we want the time to be

('%Y-%d-%B) = Year - Day - Month as full name

Analysing the date itself, we have

(1970, 1, 1) = ('%Y-%d-%B')

By comparison

%Y = Year = 1970

%d = Day = 01

%B = Full name of the month

If month = 1, then we understand that the month is January..

So,

%B = January

Bringing the results together;

(1970, 1, 1) = ('%Y-%d-%B') = "1970-01-January"

5 0
4 years ago
anyone got a class named computer literacy? or sum similar to using Microsoft programs? i need a lotttt of help, im 3 units behi
seropon [69]

Answer:

I use google docs

Explanation:

I am in 6th grade but i am in expert in computers.

6 0
4 years ago
Read 2 more answers
The type of line shown below represents an / a:​
VikaD [51]

Answer:

esrfsrtg

Explanation:

6 0
3 years ago
Importance of availability of mobile devices content that is of interest for users.
Pepsi [2]

Answer:

 The importance of the availability of the mobile device content for the users is that during the less space in the mobile device, sometimes users want to see the useful information their mobile device so that is one of the interest of the users.

By providing the content result which the user searched for the particular information then, it is the good usuage of the device.

If we present the information or data in much precise and specific manner then, it is very helpful for the users and it also reduce the complexity in the system.

7 0
4 years ago
The Campus Housing Service helps students find apartments. Owners of apartments fill in information forms about the rental units
Alexxx [7]

Answer:

Check the explanation

Explanation:

LI system and software engineering concepts, the use cases are widely used Use case is a collection of eve. or actions steps, it mainly defining the interactions between a system and a role for achieving a specific goal.

Here the actor can he external system or a human being:

For identifying the use case, the below steps needs to he followed

• Identify the actors involved in the system.

  • In our task the actors are the student and the owners  

• Identify the actor's goals

  • Goals are the activities performed

• Identify the use case candidates

The persons who are all actively involved in the use case

• Identify the use case starting points

• Identifying the use case ending points

• rind the scope and the unit of interactions in the use case  

Identifying the steps in Housing system:

• Several implementation steps are provided in the task that needs to he identified in this particular stage

• The housing system is helping the stuck,. for finding the con. apartments which is meeting their requirements

Check the below diagram.

6 0
4 years ago
Other questions:
  • A. When executing System.out.println(a1), the toString() method in the Object class is invoked.
    14·1 answer
  • The following code in a different program is not working properly. The message should display the value of the intCounter variab
    14·1 answer
  • Please check my answer! (Java)
    6·1 answer
  • Colin is a software developer. He would like to earn a credential that demonstrates to employers that he is well educated on sof
    15·1 answer
  • Which function can you perform on a word processor but not on a typewriter?
    11·1 answer
  • What breakthrough in sound recording facilitated stereophonic recording? Ο Α. overdubbing O B. multitrack recording O C. digital
    10·1 answer
  • Write a Python program stored in a file q1.py to play Rock-Paper-Scissors. In this game, two players count aloud to three, swing
    13·1 answer
  • Pls help I will give points
    11·1 answer
  • What is a web browser​
    9·1 answer
  • Creating a website is called web ________.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!