1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
9

Exposing employee and customer personal data to an untrusted environment is an example of:

Computers and Technology
1 answer:
jonny [76]3 years ago
8 0

Answer:

data breach

Explanation:

A data breach is a security event in which a unauthorized person steals, copy, access or transfer personal or confidential data. A data breach is the deliberate or unintentional leak of sensitive data into an distrusted environment. When a perpetrator or cyber criminal effectively invades a data source and steals confidential information, a data breach happens. This can be achieved physically by manipulating a device or network to steal or hack local data. Data breach is being used to target companies mostly by remotely bypassing network security.Data breaches include financial and personal information, trade secrets of companies or intellectual property, files, confidential documents etc.

You might be interested in
Consider the following schema for customer: (id, name, street, city, state, zip, phone), in which customers are uniquely determi
Art [367]

Answer:

Super key is a set of attributes that uniquely identifies all attributes in a relation.Super keys are more than candidate key.

Explanation:

For example in the given schema where

Customer: (id , name , street , city,state,zip,phone)

We have a relation we check super keys by following dependencies

Functional Dependencies                          Super Key

id                                                                     YES

name                                                               YES

id , name -> street , city,state,zip,phone       YES

id , street  ->name , city,state,zip,phone       YES

id,city ->name , street ,state,zip,phone         YES

id,state ->name , street ,city,zip,phone         YES

id,phone  ->name , street ,state,zip,city        YES

id , name , street                                             YES

id , name , street , city                                    YES

id , name , street , city,state                          YES

id , name , street , city,state,zip,phone         YES

All these are uniquely identified

All these are super key but in reverse they are not super key such as

street , city,state,zip,phone->id , name        No

8 0
3 years ago
An engine's _______ contains the cylinder block, the cylinders, the piston, the connecting rods, and the crankshaft assemblies.
Fittoniya [83]
The answer is C.upper end

hope this helps. Have a wonderful day 
5 0
4 years ago
Read 2 more answers
He has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, ta
arsen [322]

Answer: LAN(Local area network)

Explanation:

Local area network(LAN) is the network that is made to cover small amount for area for providing network and computer services.It can usually span in the areas such as a personal room, single building etc.

  • It connects different peripheral devices like printer, switches, tabs etc with the computing system in small certain areas.
  • According to the question, the individual should use LAN network for linking computer with the printer device.
  • As the person has connected laptops, tablets,smartphones, network of printer etc within a network in single space, he is interacting these devices using local area network.
6 0
3 years ago
Countries need to engage in trade of natural resources because of distribution in the earth. For instance, countries such as Sau
maks197457 [2]
Water is a scarcity in this area
4 0
3 years ago
Why are video games interesting?
TiliK225 [7]
Because there fun and helps boys get together or to get ur mind off of stuff
5 0
3 years ago
Other questions:
  • When looking at an object or process to code, it is important to think of as general a solution as possible and consider all the
    13·1 answer
  • A computer is made of up 6 main components: a) CPU (central processing unit)
    7·1 answer
  • Who is the founder of javascript? ​
    14·2 answers
  • Carrie works on a help desk and is assigned a ticket that was automatically generated by a server because of an error. The error
    14·2 answers
  • Write a program that reads from the user any three points in two dimensional space: x1, y1, x2, y2, x3, y3. Assume these points
    13·1 answer
  • While developing a network application, a programmer adds functionally that allows her to access the running program without aut
    14·1 answer
  • 17. Ano ang tawag sa pahina ng Excel?
    12·1 answer
  • Consider the following declaration:
    9·1 answer
  • If you do a Find and Replace for a term, where will Word begin looking for the term?
    6·1 answer
  • Identify three errors in this HTML code snippet:
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!