1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
just olya [345]
3 years ago
11

What is the effects of computer and internet attacks​

Computers and Technology
2 answers:
ZanzabumX [31]3 years ago
7 0

Answer:

ads, damage, or bugs

Explanation:

DIA [1.3K]3 years ago
7 0

Answer:

The effects is that it will leave it damaged.

Explanation:

The system or internet site will be damaged, and the owner would have to repair it.

You might be interested in
What nomenclature, commands, procedures are used by the program to define capabilities in the following
JulsSmile [24]
Nomenclatures are the names in taxonomy like Homo sapiens etc
3 0
4 years ago
What invention changed the nature of communication and commerce in the first half of the nineteenth century?
serg [7]
Answer: The Telegraph 

Hope this helps you out!
6 0
3 years ago
Read 2 more answers
Which type of computer allows the user to enter text by handwriting
mixer [17]

Answer:Pen computing refers to any computer user-interface using a pen or stylus and tablet, over input devices such as a keyboard or a mouse.

4 0
4 years ago
Password procedures, information encryption software, and firewalls are examples of measures taken to address:
Gnoma [55]
<span>Password procedures, information encryption software, and firewalls are examples of measures taken to address are all measures taken to safeguard information security and protect users data from being tampered or manipulated by invaders. 

In web, if we leave our information without encryption or if we leave our system without firewall, different types of security threats might arise: such as, information being hacked, manipulated or sent to wrong places. To avoid this information encryption is done. We might also need to firewall our system so that we can avoid unwanted access and invading of our privacy using malwares and other tools. </span>
5 0
4 years ago
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which Azure service should you use to correlate events from multiple resources into a centralized repository?
    5·1 answer
  • Many shops are simply plugging up their drains to keep from inadvertently violating the law and creating environmental contamina
    15·1 answer
  • ____ is a font that resembles the letters that typewriters produced.
    9·1 answer
  • How to write a program to draw 1000 random points on a frame in python language for coding?
    13·1 answer
  • Portfolio Activity: Writing a Résumé
    5·1 answer
  • Someone please help will mark as brainliest
    8·2 answers
  • Hello! I hope you have a great day! Good things will come your way.
    12·1 answer
  • Sube
    10·2 answers
  • What is the purpose of including comments in code?
    15·1 answer
  • Whats worth more in adopt me- A Mega Owl or a Mega Frost Dragon?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!