1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
3 years ago
6

Imagine you were trying to explain the Russian hacking incident to a child (around 10 years of age) and why it was unethical. Cr

eate an analogy of the 2016 Russian election hacking and populate your story with average people, such as you would find in a high school setting, that would help explain the issue. I just need 2 -3 paragraphs.
Computers and Technology
1 answer:
Burka [1]3 years ago
8 0

Answer:

The 2016 presidential election campaign in the USA was disrupted by hacking communications infrastructure, attacks on the US digital electoral system and false reports. According to a study commissioned by the US Senate, millions of entries on social networks were influenced in favor of Donald Trump. Former President Donald Trump has been under pressure since February 2017 because of possible illegal contacts by his campaign team to Moscow. The results of the investigation indicate that the Russian intelligence system, GRU, was behind the attacks and that the country tried to influence the presidential election in 2016 in favor of the eventual winner Trump.

You might be interested in
Blank uses computer resources from multiple locations to solve a common problem.
DedPeter [7]

Answer:

Grid computing

Explanation:

3 0
3 years ago
______ databases find the name and department name of all graduate students who work on projects that do not employ any other gr
yawa3891 [41]

Structured Query Language databases find the name and department name of all graduate students who work on projects that do not employ any other graduates from their department.

Explanation:

Structured Query Language (SQL) is a database-style intended for managing data kept in a relational database management system. SQL statements are applied to execute jobs such as update data on a database or recover data from a database. The standard SQL commands such as "Select", "Insert", "Update", "Delete", "Create", and "Drop" can be used to perform virtually everything that one requires to do with a database. According to ANSI (American National Standards Institute), it is the approved language for relational database management systems.

7 0
3 years ago
What does it mean when it says this person is unavailable on messenger.
arsen [322]

Answer:

The user has a deactivated account 

Explanation:

or the user does not have the account anymore good luck and I hope you do well <3

4 0
2 years ago
Please help me please and thank you!
MaRussiya [10]

Answer:

1. a digital designer involves movement like animations, movies, etc. A graphic designer is static for an example logos pictures etc.

2. a ux is the interaction between humans and products

3.  a ui is the design of software and machines, for an example computers, electronic devices, etc.

4.  textures, color, value, and space

5. the basics are contrast, balance, emphasis, white space, hierarchy, movement, proportion, repetition, pattern, variety, unity, and rhythm

6. the basic fundamentals are images, color theory, lay-out, shapes, and typograph  

I hope this helped you and have a great rest of your day

7 0
3 years ago
a user complains he cannot access a particular website, although he is able to access other websites. At which layer of the OSI
Usimov [2.4K]

Answer:

Layer 7: Application Layer

Explanation:

Layer 7 is the Application layer and the website that causing issue is used through an app. Making it Layer 7 Application.

8 0
2 years ago
Other questions:
  • The first thing to do when your computer gives you a error message is
    7·2 answers
  • Cover photos have a prominent location in your social media profiles, so you should use this space strategically – for example,
    14·1 answer
  • Operating systems the most common form Microsoft windows in Mac OS discuss the similarities and differences between which two sy
    13·1 answer
  • When using an online media source, students should ensure the information is
    13·2 answers
  • Ted reads a sentence: The man said that it would take 10 to 12 days for a reply. He believes the hyphen symbol can replace the w
    11·1 answer
  • A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting th
    15·1 answer
  • Should the federal government have bug bounty programs? Why or why not?
    9·2 answers
  • What is nuclear family system​
    9·2 answers
  • Mingji is working to transfer photos from her digital camera to her computer. While
    11·1 answer
  • Write a function called middle(string str) that returns a string containing the middle character in str if the length of str is
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!