1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Greeley [361]
3 years ago
15

Any action that causes harm to your computer is called a

Computers and Technology
1 answer:
oksano4ka [1.4K]3 years ago
3 0

Answer:

Security risk.

Explanation:

It is making your computer vulnerable to attacks and less secure.

You might be interested in
If you are working on a document and want to have Word automatically save the document every minute, what steps should you use t
malfutka [58]
I think it is D but I'm not 100% sure

6 0
4 years ago
A database interrogation is a major benefit of the database management approach, where end users can query (“ask”) the database
sp2606 [1]
Bader Ali, IT101, from Ahmad Nasser where Bader Ali GPA=2.
3 0
4 years ago
11.19 (Constructor Failure) Write a program that shows a constructor passing information about constructor failure to an excepti
iren2701 [21]

Answer:

You absolutely should throw an exception from a constructor if you're unable to create a valid object. This allows you to provide proper invariants in your class. ... Throw an exception if you're unable to initialize the object in the constructor, one example are illegal arguments.

Explanation:

6 0
3 years ago
Select the pieces of information that are added on to data to get it where it is going.
oksian1 [2.3K]

Answer:

IP address and MAC address

Explanation: The IP address tells the server what network to send the information to, the MAC address tells the local network what device to send it to.

5 0
3 years ago
In risk management what does risk evaluation involved
VLD [36.1K]

Answer:

Explanation:Risk management is the decision-making process involving considerations of political, social, economic and engineering factors with relevant risk assessments relating to a potential hazard so as to develop, analyze and compare regulatory options and to select the optimal regulatory response for safety from that hazard.

5 0
3 years ago
Other questions:
  • Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whene
    9·1 answer
  • Why is redundancy of data undersirable?
    7·2 answers
  • Pick the simplest line of code to test if the word "BASIC" is stored in the variable text1.
    12·1 answer
  • HELP WILL GIVE BRAINIEST IF YOU HELP ME.....
    8·2 answers
  • What is one reason that writing effective messages is so important
    11·2 answers
  • In programming, what is a string?
    8·2 answers
  • Seeing her Daughter graduate from college is most likely a short term goal for a person of which of these ages ? A) 24 years old
    10·1 answer
  • Help teacher said with complete explanation ​
    5·1 answer
  • Tools used to type text on Ms -paint​
    10·1 answer
  • You're as smooth as Tennessee whiskey
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!