1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sp2606 [1]
3 years ago
14

What sort of negative outcomes are possible for this type of risk?

Computers and Technology
2 answers:
Harlamova29_29 [7]3 years ago
6 0
More details please?
rjkz [21]3 years ago
4 0

Answer:

not enough to go on

Explanation:

You might be interested in
What does every shot have with regards to depth?
djyliett [7]

This can be used to capture a larger area of acceptably sharp images. This can also be referred to as a deep depth of field, and some cinematographers will simply use the term “depth” to describe shots with a large DOF. It can also be referred to as deep focus.
5 0
3 years ago
Which of the following<br> Services are<br> functions performed<br> by the general office?
GaryK [48]

Answer:

comment the choices please

6 0
2 years ago
One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
GaryK [48]

Answer:

Email Bomb

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the statement is False. The term being defined by the statement in the question is not called a mail spoof instead it is actually called an Email Bomb.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
4 years ago
Windows organises information on computer using a
lana66690 [7]
B folder
hope i helped
8 0
3 years ago
Read 2 more answers
What is the best summation of the main idea in Andrew Blum’s speech, "Discover the Physical Side of the Internet"? Question 10 o
rewona [7]

Answer:

c) We should be aware of the network and geographic presence behind our internet access rather than taking it for granted.

Explanation:

Andrew Blum’s speech is about the physical world and the size of the internet, he spent more time on the computer and cell phone than in the real world, and he had an issue with his internet, and the technician told him, squirrel has bittern your internet.

This can mean that the internet can be something complex and a huge thing, but can be damage for a squirrel, can be something simple.

6 0
3 years ago
Other questions:
  • Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a s
    12·1 answer
  • When sending a packet of data from source host to a destination host over a fixed route. Which of the delay components are varia
    8·1 answer
  • A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the in
    9·2 answers
  • A Network Systems employee set up a network-wide password system in which other employees log in to access their work. Which tas
    6·2 answers
  • What happens when you get 3 warnings on this site?
    9·2 answers
  • What information and options can be found on the File tab?
    8·1 answer
  • Why are Quick Parts useful in an Outlook message?
    10·2 answers
  • I need somebody to help me with this question I’ll give points!<br> Please help no funny business
    14·1 answer
  • Who is considered as the father of computer science​
    8·2 answers
  • A numeric test score is to be converted to a letter grade of A, B, or C according to the following rules: A score greater than 9
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!