1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AfilCa [17]
3 years ago
11

Can someone help me calculate this Multimedia math:

Computers and Technology
1 answer:
IRISSAK [1]3 years ago
5 0

Answer:

I will try to help you answer this. it seems really confusing but I'll do my best to solve it and get it back to you. Hope I'm able to help!

You might be interested in
A digital designer might do computer animation or video games true or false
pav-90 [236]

your answer should be TRUE if i’m correct..

MARK ME BRAINLIEST PLEASE IF IM CORRECT

3 0
3 years ago
Read 2 more answers
A small business has suffered from a cyber attack, what could be the resultant damage​
frutty [35]

Answer:

Cyber Attacks can damage small or big business. Different kinds of attacks will lead to the different losses. some of the most common attacks are

  • DOS Attack
  • Bruteforce Attack
  • DDOS Attack
  • XSS Attack
  • API Attack
  • Network Attacks
  • Identity and Token theft attack
  • Man in the middle attacks
  • Application Level Attacks

Each attack can impact different domain and different level of damages. The biggest damage can be loss of reputation and monetorial losses. It can eventually invite law suites and can make company go bankrupt.

Explanation:

Following damages can be seen with cyber attacks.

<u><em>Loss of Reputation : </em></u>Loss of reputation is the worst damage that any cyber attack can create. This will  result in the business losses and also result in irreversible damage to existing customer base and also it will spoil the market value.

<u><em>Loss of Corporate Information:</em></u> Attackers can use the corporate information which can consist of customers data, unwanted lawsuits and also company’s employees details. Data recovery may not be possible once the attacker has full corporate access.

<u><em>Loss of Identity: </em></u>Once the personal information is lost then Hackers can use personal information for impersonation, and identity theft. Identity theft is more dangerous as it is used for illegal activities.

Cyber-attacks can disrupt your business activities and it will include as below

<u><em>Loss of Data : </em></u> Successful cyber attack can damage the data and even can corrupt the data which will be of no use.

<u><em>Loss of Infrastructure :</em></u> Servers, computers, databases can be disrupted with a cyber-attack which can be irreversible and even be more disastrous as physical infrastructure is impacted.

<u><em>Extortion losses :</em></u> Attackers can threaten to disclose sensitive data and can intern ask for ransom payment.

<u><em>Lawsuits : </em></u>If the customer’s data is exposed or used for illegal business then it will invite huge lawsuits.

<u><em>Notification Policy :</em></u> If data is breached then it is also important to notify the effected users and the next remedy taken to resolve it.

<u><em>Loss of Business :</em></u> Cyber attacks can create business losses and also will eventually affect existing and new customers.

4 0
3 years ago
Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environmen
Lyrx [107]

Answer:

c and d

Explanation:

6 0
3 years ago
Where is the "delete account" button in my profile? And please give me a legit answer and not just a word.
N76 [4]

Answer:

in your profile for brainley ??

3 0
3 years ago
Read 2 more answers
Write a program with a function that accepts a string as an argument and returns the number of uppercase, lowercase, vowel, cons
diamong [38]

Answer:

Explanation:

The following code is written in Python. It is a function called checkString that takes in a string as an argument and loops through each char in that string and checking to see if it is lowercase, uppercase, vowel, consonant, or punctuations. It adds 1 to the correct variable. At the end of the loop it prints out all of the variables. The picture below shows a test output with the string "Brainly, Question."

def checkString(word):

   uppercase = 0

   lowercase = 0

   vowel = 0

   consonants = 0

   punctuation = 0

   vowelArray = ['a', 'e', 'i', 'o','u', 'y' ]

   consonantArray = ['b', 'c', 'd', 'f', 'g', 'h', 'j', 'k', 'l', 'm', 'n', 'p', 'q', 'r', 's', 't', 'v', 'w', 'x', 'y', 'z']

   punctuationArray = ['.', '!', '?', ',', ';', '(', ')']

   for char in word:

       if char.isupper():

           uppercase += 1

       else:

           lowercase += 1

       if char.lower() in vowelArray:

           vowel += 1

       elif char.lower() in consonantArray:

           consonants += 1

       if char in punctuationArray:

           punctuation += 1

   print('Uppercase: ' + str(uppercase))

   print('Lowercase: ' + str(lowercase))

   print('Vowels: ' + str(vowel))

   print('Consonants: ' + str(consonants))

   print('Punctuations: ' + str(punctuation))

8 0
3 years ago
Other questions:
  • Jill needs to create a chart for technology club that shows what percentage of total students in the school play video games. Wh
    11·2 answers
  • What is the maximum number of fonts that should be used on a slide?
    13·1 answer
  • How to make your keyboard sound like a piano?
    9·1 answer
  • Daniela’s company has made the decision to allow employees to work from home as the company has outgrown their physical space. K
    13·1 answer
  • A server that provides data transfer and storage space at remote locations is called a
    7·1 answer
  • How do you make your graphics ADA accessible in BlueGriffon?
    12·2 answers
  • 1. The best program to present numerical data in would be ____. a. Access c. PowerPoint b. Excel d. Word
    6·1 answer
  • The number of pixels that can be displayed on the screen at one time is known as what? screen resolution. viewing angle. color d
    5·1 answer
  • ¿Cuál es la diferencia entre una plataforma educativa y una tutoría?
    7·1 answer
  • Design algorithm and the corresponding flow chart for adding the subject score of 5, total value and rank.​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!