1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
artcher [175]
2 years ago
11

Previous

Computers and Technology
1 answer:
spin [16.1K]2 years ago
7 0

Answer:

A b output 0110111111001111

You might be interested in
Jon wants to assign a value to the favorite food variable: favoriteFood! = "Pizza" but gets an error message. What does he need
anastassius [24]
Remove the exclamation mark from the variable name
3 0
3 years ago
Read 2 more answers
Which of the following does your textbook recommend for preparing PowerPoint slides? Group of answer choices
Tcecarenko [31]

Answer:

1 & 3 only

1. Limit the amount of text to not more than 6 lines per slide

3. Stick to a limited number of colors and use them consistently

Explanation:

The general PowerPoint slide rule is 6 x 6 presentation rule which translates to

6 words per line and 6 lines per slide

It helps keeping your slide from being so dense and packed with information that people don't want to look at it.

It's always important to keep consistent colors in PowerPoint slides. This enables you to maintain cool rhythm throughout the slides.

Inconsistent colours easily distracts your audience/readers.

It's not advisable to use capital letters all through in PowerPoint slides.

3 0
3 years ago
What to do if your monitor is not displaying a picture
Butoxors [25]

Answer:

Refresh the page/

5 0
3 years ago
CODEHS: WHY is it important to know the difference between div and span?
DerKrebs [107]

Span and div are both generic HTML elements that group together related parts of a web page. However, they serve different functions. A div element is used for block-level organization and styling of page elements, whereas a span element is used for inline organization and styling.

3 0
2 years ago
A small business has suffered from a cyber attack, what could be the resultant damage​
frutty [35]

Answer:

Cyber Attacks can damage small or big business. Different kinds of attacks will lead to the different losses. some of the most common attacks are

  • DOS Attack
  • Bruteforce Attack
  • DDOS Attack
  • XSS Attack
  • API Attack
  • Network Attacks
  • Identity and Token theft attack
  • Man in the middle attacks
  • Application Level Attacks

Each attack can impact different domain and different level of damages. The biggest damage can be loss of reputation and monetorial losses. It can eventually invite law suites and can make company go bankrupt.

Explanation:

Following damages can be seen with cyber attacks.

<u><em>Loss of Reputation : </em></u>Loss of reputation is the worst damage that any cyber attack can create. This will  result in the business losses and also result in irreversible damage to existing customer base and also it will spoil the market value.

<u><em>Loss of Corporate Information:</em></u> Attackers can use the corporate information which can consist of customers data, unwanted lawsuits and also company’s employees details. Data recovery may not be possible once the attacker has full corporate access.

<u><em>Loss of Identity: </em></u>Once the personal information is lost then Hackers can use personal information for impersonation, and identity theft. Identity theft is more dangerous as it is used for illegal activities.

Cyber-attacks can disrupt your business activities and it will include as below

<u><em>Loss of Data : </em></u> Successful cyber attack can damage the data and even can corrupt the data which will be of no use.

<u><em>Loss of Infrastructure :</em></u> Servers, computers, databases can be disrupted with a cyber-attack which can be irreversible and even be more disastrous as physical infrastructure is impacted.

<u><em>Extortion losses :</em></u> Attackers can threaten to disclose sensitive data and can intern ask for ransom payment.

<u><em>Lawsuits : </em></u>If the customer’s data is exposed or used for illegal business then it will invite huge lawsuits.

<u><em>Notification Policy :</em></u> If data is breached then it is also important to notify the effected users and the next remedy taken to resolve it.

<u><em>Loss of Business :</em></u> Cyber attacks can create business losses and also will eventually affect existing and new customers.

4 0
3 years ago
Other questions:
  • Identify the six components of an information system. Which are most directly affected by the study of computer security? Which
    8·1 answer
  • Each tab is divided into groups of related commands or buttons. T or F
    10·1 answer
  • A(n) ____ string contacts the data source and establishes a connection with the database using the Data Source Configuration Wiz
    5·1 answer
  • Write a program to accept 10 different whole number from the user and store them in a
    11·1 answer
  • There is a renewed focus among today’s parents on providing food to their family.
    6·1 answer
  • When an object is acted on by unbalanced forces, the object will always
    11·1 answer
  • TRUE AND FALSE
    10·1 answer
  • Explain what a datalist element does and is used for.
    12·1 answer
  • In addition to reduced power consumption, what is an advantage of using hyperscale cloud computing data centers?
    8·1 answer
  • Type the correct answer in the box. Spell all words correctly. Kenny is designing a document for the employee motivation campaig
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!