1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
just olya [345]
3 years ago
11

What is the effects of computer and internet attacks​

Computers and Technology
2 answers:
ZanzabumX [31]3 years ago
7 0

Answer:

ads, damage, or bugs

Explanation:

DIA [1.3K]3 years ago
7 0

Answer:

The effects is that it will leave it damaged.

Explanation:

The system or internet site will be damaged, and the owner would have to repair it.

You might be interested in
It is possible to change the shape of a text box.
maw [93]
Yes drag the arrow over the edge and drag it to the size you want
5 0
3 years ago
Write an expression that evaluates to true if and only if the value of the integer variable workedOvertime is true.
snow_tiger [21]

Answer:

The expression of this question can be given as:

(workedOvertime == true)

Explanation:  

This question explains by the following example that is written in C language can be given as:

#include <stdio.h>    //header file.

int main()    //main function.

{

   int workedOvertime=10;                //define integer variable

   int true=10;                                        

   if(workedOvertime==true)                      //check condition.

   {

   printf("true..");                       //true part code.

   }

   else

   {

   printf("false..");                          //false part code.

   }

   return 0;

}

In the above example there we define a integer variable name(workedOvertime) in this variable we assign a value. And we define another variable true in that we also assign a value. then we use if-else statement that is used for checking the value. If block always execute true value.So the answer is true.and the Expression is (workedOvertime==true).

4 0
3 years ago
Swiping up with three fingers on mac os x launches what?
iVinArrow [24]
It opens and closes mission control
7 0
3 years ago
PLEASE HELP
Rainbow [258]

Explanation:

examples

Area= Side Squared

area =square root of 49cm Squared =Square root of S Squared

A=7cm Squared

6 0
2 years ago
The best way to achieve stronger encryption is to
AnnyKZ [126]

Answer:

Use the NIST standards!

Explanation:

- A larger key size helps, but it depends what the underlying algorithm is, so this is not in itself a solution.

- Some block ciphers are not strong.

- Hardware acceleration will only produce a result faster, not increase the strength of the encryption.

4 0
3 years ago
Other questions:
  • 1. The future of 2D animation does not include hand-drawing. (1 point)
    13·1 answer
  • Which is a benefit of peer-to-peer networking?
    10·1 answer
  • Which of the following is NOT true about RMI? RMI uses the socket connection, including opening and closing the socket. RMI allo
    8·1 answer
  • PLEASE HELP FAST !!!!!!!!!!
    12·1 answer
  • You have just starting working at Quantum Company. As a new programmer, you have been asked to review and correct various pseudo
    14·1 answer
  • If the predetermined overhead allocation rate is 245% of direct labor cost, and the Baking Department's direct labor cost for th
    13·1 answer
  • Samuel wanted to paste the value and the formula attached from cell B6 to cell F16. Which methods will work? Check all that appl
    5·2 answers
  • You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the inf
    11·1 answer
  • Using complete sentences post a detailed response to the following.
    13·1 answer
  • Which of the following is an algorithm?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!