1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodomira [7]
3 years ago
9

Question 1(Multiple Choice Worth 5 points)

Computers and Technology
1 answer:
vlabodo [156]3 years ago
6 0

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

You might be interested in
write a function named get majority last name that accepts as its parameter a dictionary from strings to strings the keys of the
wariber [46]

A function named get majority last name that accepts as its parameter a dictionary from strings to strings the keys of the dictionary represent first names and the values represent last names is python.

Python is a general-purpose, high-level programming language. Its design philosophy prioritizes code readability and heavily employs indentation. Python has dynamic typing and garbage collection. It supports a number of programming paradigms, including structured programming, object-oriented programming, procedural programming, and functional programming (especially this). It is frequently referred to as a "batteries included" language because of its large standard library.

In order to replace the ABC programming language, Guido van Rossum developed Python in the late 1980s. Python 0.9.0 was released in 1991.

Python 2.0, which was released in 2000, included brand-new features like list comprehensions, cycle-detecting garbage collection, reference counting, and support for Unicode.

To know more about python click here:

brainly.com/question/13437928

#SPJ4

5 0
1 year ago
You began a small mobile app company. To help market your apps, you create a social media site. The site allows users to join co
dem82 [27]

Answer: shared

Explanation:

Shared media simply refers to the contents that a particular brand posts to social media platforms.

In such cases, the site gives room for the users to join conversations regarding the post being shared by the brand. It is typically cost effective and used by several organizations.

3 0
3 years ago
Explain different users of computer in briefly?​
goldfiish [28.3K]

Answer:

The question is invalid; there are many types of computer user. Why on earth do you think there are five?

From the top of my head.

Casual- someone at home browsing the web, reading email.

IT Consultant. Advising people.

Software developer- writing software

Secretary - manages email for a company

Academic. Writing research papers.

Monitors. Monitor a computer system.

That’s six off the top of my head. There are probably a dozen more. So why do you think there are five?

3 0
2 years ago
Please answer immediately!!!
diamong [38]

Answer:

Please check the attachment.

Remember:

All N1, N2, N3N, N4, N5, N6, N7 and each of them are certainly like the server. Also note that Router, repeaters, switch and transmitter are not mentioned in the above diagram. Please assume it in between each location.

Explanation:

Please check the attachment. Also, Remember that Server is at the head office, and rest 7 are the 7 branches. The VOIP, video surveillance, Door security system and the computer networks are being shown in the diagram. And each location has a network of computers joined through VLAN, and each of them are given the IP addresses of Class A, Class B and class C of the iPV4(or IPV6), which can be found by the future network administer, operators through the IP address, that is assigned.  

4 0
3 years ago
Write a function solution that given an array a of n integers (between -100 and 100), returns the sign (-1,0,1) of product of al
JulijaS [17]

left[0]=a[0];

for(int i=1;i<=n-1;i++)

   left[i]=(left[i-1]*a[i])%M;

right[n-1]=a[n-1];

for(int i=n-2;i>=0;i--)

   right[i]=(right[i-1]*a[i])%M;

for query q

   if(q==0)

       return right[1]%M;

   if(q==n-1)

       return left[n-2]%M;

   return (left[q-1]*right[q+1])%M;

4 0
2 years ago
Other questions:
  • Enhancing and optimizing customer retention and loyalty is a major business strategy.
    15·1 answer
  • What is the importance of Mathematical Modeling in the field of bioinformatics.
    8·1 answer
  • Write a program with a loop that lets the user enter a series of positive integers. The user should enter −1 to signal the end o
    7·1 answer
  • Vannevar Bush imagined a desktop computing machine that would allow people to access data stored in various information centers
    13·1 answer
  • A recursive method may call other methods, including calling itself. A recursive method has:
    7·1 answer
  • A monopoly is a market that has few competing businesses. many sellers of the same item. many sellers of a variety of products.
    8·2 answers
  • 7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
    8·1 answer
  • Write python code that does the following: Ask the user to enter as many as number they want; Then find the sum and the average
    10·1 answer
  • Generally speaking, what is a “best practice"?
    13·1 answer
  • When does the following while-loop stop running?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!