1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anastassius [24]
3 years ago
15

What is Computer Security

Computers and Technology
2 answers:
KiRa [710]3 years ago
8 0

Answer:

the protection of computer systems and information from theft

Explanation:

pav-90 [236]3 years ago
4 0

Answer:

Computer Security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Explanation:

You might be interested in
Where do file name extensions appear?
Zielflug [23.3K]

Answer:

At the end of the file name

Explanation:

8 0
3 years ago
Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, acc
mash [69]

Answer:

Neil should recommend to this client a star network.

Explanation:

A star network is a computer network where every host is connected to a central hub, switch, or computer.

Main advantage of a star network is that one corruption (unless it is central hub) doesn't affect the rest of the network, and it's easy to modify.

The star network is one of the most common computer network setups

6 0
3 years ago
Which statement best describes a social impact of computing on the world?
DiKsa [7]

Answer: Smartphones have changed the way people communicate through text messages and emojis.

Explanation:

it would only make sense that this is the correct answer because globally smartphones are used for communication, considering the fact that we dont tend to write letters to people across the country as our main source of communication, or in a different continent all together. The steady growth of technology has clearly made getting in touch with people of all nations much easier.

3 0
3 years ago
Create a Python program by defining a function that calculates the year of birth of a person whose age is known to you.(You may
Alchen [17]

Answer:

  1. import datetime
  2. def get_year_of_birth():
  3.    age = int(input("Enter your age: "))  
  4.    current_year = datetime.datetime.now().year  
  5.    year_of_birth = current_year - age  
  6.    return year_of_birth  
  7. print(get_year_of_birth())

Explanation:

Firstly, we import datetime module as we need it to get the current year (Line 1).

Next, create a function named it as get_year_of_birth (Line 3). Prompt user to input age and assign it to a variable (Line 4). Next, we use now() method from datetime module to get the current date and time and extract the year component (Line 5).  At last, calculate the year of birth by subtracting the current_year with age and return it as output (Line 6-7).

3 0
3 years ago
web pages within the same website often have different blank because they have different blank A) home pages, urls B) goals, sou
jenyasd209 [6]

Answer:

D

Explanation:

Home page will not usually be formatted the same as the contact page because each page has a different purpose

8 0
4 years ago
Other questions:
  • Andrea wants to to install a new internet connection . she eants to use the fastest one she can find . what are the maximum spee
    14·1 answer
  • Which option allows you to view slides on the full computer screen?
    11·1 answer
  • Where could an identity theft access your personal information?
    9·2 answers
  • How many bits does it take to represent the values from 0 to 255?
    9·1 answer
  • _______________ is the use of IT in communication. a) email b) Chatting c) FTP d) All of the above
    7·1 answer
  • What is the difference between Input, Output, and Storage Devices?
    12·2 answers
  • T.L.E
    6·1 answer
  • Write short notes about monitor printer and speaker​
    14·2 answers
  • A computer follows step-wise instructions to complete any task which is known as?
    5·1 answer
  • Can a dod activity enter into a service contract for a military flight simulator without getting a waiver from the secretary of
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!