1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svp [43]
3 years ago
8

What is your biggest takeaway on that subject?​

Computers and Technology
1 answer:
tester [92]3 years ago
3 0

Hi. You have not informed the subject to which this question refers, which makes it impossible for your question to be answered. However, I will try to help you as best I can.

The only way to answer this question is to evaluate the media where the subject in question is being presented. Thus, you must understand this subject, whether reading a text about it or watching a video about it, the important thing is that you understand it and absorb all the teachings it is capable of transmitting.

In this case, you need to evaluate all these teachings which was the most important for you and which represented a very important lesson in your life. This lesson will be the biggest takeaway you've achieved with this subject.

You might be interested in
Classify each of the following acts as a violation of confidentiality, of data integrity, source integrity, or availability, or
AlexFokin [52]

Answer:

A) Violation of Confidentiality and Source Integrity:

Passwords are very confidential information and are usually protected by both the owner and the ower of the system (which in this case is Yahoo). To obtain the passwords, the hacker had to illegally gain access to the source of the data which is on Yahoo servers. Hence a breach of confidentiality and lack of adequate integrity on the part of Yahoo.

B) Source Integrity: Anthony accidentally cuts the electricity from the server room. Why would he be able to do that? how did he gain access into the server room? This speaks to source integrity. People should not be able to access the server room except they are authorised.

C) Source Integrity and Confidentiality: NSA finds an efficient method to break AES. AES refers to the Advanced Encryption Standard. AES is a symmetric encryption technology known as a block cipher.

It is used by the United States Government for the classification of information. Their ability to break this code speaks to Violation of Source Integrity. In this case, they haven't exactly hacked any document. However, any document that was encrypted using this technology is already compromised at the source.

D)   Anna registers the domain name, "JohnSmith" and refuses to let John Smith buy or use the domain name: Violation of Availability.

It is assumed here that John Smith was the original owner of the domain but it was highjacked at expiration and registered by Anna. This kind of breach is called Violation of Availability of the domain name.

E) Some malware encrypts the victim’s hard drive with a secret key and a criminal asks for a ransom to decrypt.

This move is called the Ransomeware attack. The Integrity of the source of information (which is the hard drive) is already compromised. This is a combination of Source Integrity or availability and confidentiality violation.

F) The wiretapping of a cell phone is a breach of confidentiality and data integrity.

G) when there is a vulnerability in a system or software that is unknown to those who should be interested, it is called a Zero-Day vulnerability. Where there is a Zero-Day vulnerability there could be a violation of confidentiality, data integrity, source data and or it's availability.

Cheers!

4 0
3 years ago
"the ________ attribute of the anchor tag can cause the new web page to open in its own browser window."
zheka24 [161]
Target





-------------------------------
8 0
3 years ago
The __________ contains a list of all the resources owned by the library.
mario62 [17]

The catalog contains a list of all the resources owned by the library.

- Mabel <3

8 0
4 years ago
What is the left area of a slide called in an electronic presentation?
Anna11 [10]

The answer is Overview of slide show. This is the most common and normal view for electronic presentation, this allows the user to have a view over the current slide on the main pane as well as the slide information preceding and succeeding with the current slide on view on the right pane.

4 0
3 years ago
Read 2 more answers
Overview of your opinion of Digital Etiquette
Bas_tet [7]

Answer:

The basic idea behind the topic of digital etiquette is "treat others how you want to be treated." From an early age, students are taught this golden rule. Whether at home, at the movies, at a grocery store or in school, students learn that there are appropriate and inappropriate ways to behave and treat one another. With the overwhelming emerging technology and its involvement in our daily lives, it is fundamental that students transfer that understanding of appropriate behavior into the digital world.

4 0
3 years ago
Other questions:
  • Compare a switch to a router.
    8·2 answers
  • What is a utility application that monitors the network path of packet data sent to a remote computer?
    11·1 answer
  • When working in excel online, which of the following is considered a conditional formula?
    8·2 answers
  • The term “computer literacy” dates back to what decade? <br> 1960s<br> 1970s<br> 1980s<br> 1990s
    5·1 answer
  • What is a method? an object instantiated from a class a coordinated sequence of instructions that will be carried out when reque
    13·1 answer
  • The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:__________.
    6·1 answer
  • Write a loop that displays all possible combinations of two letters where the letters are 'a', or 'b', or 'c', or 'd', or 'e'. T
    14·1 answer
  • Define Agricultural Era
    14·2 answers
  • HTML coding tells a computer what to do by using a series of?
    15·1 answer
  • What approach do you prefer to take when creating presentations for class projects? Would you rather use software or create pres
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!