1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dexar [7]
3 years ago
13

How do you see the recent IT evolution (e.g. platforms, big data, Internet of Things, etc.) affect Internet security and privacy

of internet users
Computers and Technology
1 answer:
torisob [31]3 years ago
3 0

Answer:

Answered below

Explanation:

With the evolution and growth of technology, and as we are increasingly having our everyday lives dependent on technology, there arise problems that shouldn't be ignored.

Security of people's personal data and information is of paramount importance. Access to personal information and the sale of these information to companies without the owner's permission is a breach of privacy and one of the challenges we face today.

With the growth of data, there are newer threats and attacks on software security systems to steal these data and therefore there's a need for everyday assessment and improvement in security of data.

You might be interested in
What is the different between information and data
Vika [28.1K]
Data is an individual unit that contains raw materials which do not carry any specific meaning. Information is a group of data that collectively carries a logical meaning.
7 0
3 years ago
A major ozone depletion happened in the 1900s. What was it caused by
melomori [17]
It was caused by air pollution and the extreme heat built up underneath it. <span />
3 0
4 years ago
Read 2 more answers
Tysm for Ace! :O<br> Hurray!
professor190 [17]

Answer:

Good job!! You deserve it.

Explanation:

3 0
3 years ago
Read 2 more answers
You are auditing a client's network and have gained physical access to a workstation. To prevent any security software from dete
Llana [10]

Answer:

OphCrack LiveCD.

Explanation:

The user examines that server of a client, as well as requires complete control of such a system. To avoid recognizing its invasion by certain security programs, he wants to select a LiveCD which can break Operating System's credentials,  and he would have been using OphCrack LiveCD because it used to crack the credential of the Windows user.

So, the following are the reason by which the answer is correct according to the scenario.

3 0
3 years ago
What is a distraction that you find when photographing animals at the zoo
yaroslaw [1]

D. All of the above.

<u>Reason:</u>

A. Fences can get in the way of a beautiful picture.

B: The animal's enclosure may be hard to get the perfect snap. Like a rock can be in the way of the animal. idk...lol

C. People want to see the animal as much as you do so they may block the way of a picture.

Example from Google..XD


7 0
3 years ago
Other questions:
  • Users of an extranet can access a company or organization’s entire intranet
    8·2 answers
  • Which of the following best describes the purpose of child labor laws?
    13·2 answers
  • write an algorithm that gets the price for item A plus the quantity purchased. The algorithm prints the total cost, including a
    5·1 answer
  • What font is the declaration of independence?
    9·1 answer
  • I need someone who knows HTML to finish the code.
    12·2 answers
  • What is the problem with the code snippet below? public class Test { public static void main(String[] args) { System.out.println
    6·1 answer
  • How do you freeze the total cell so that it doesn't change when copied?
    6·1 answer
  • In a dark place you have only a match , a twig , campfire logs , and oil lamp and a candle which do you literally first /
    15·1 answer
  • A list cannot use appendleft but a _____ can.
    11·1 answer
  • Which popular tool is used in agile software development TCS?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!