1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
4

Cybersecurity breaches in the workplace generally happen because _____. Select 3 options.

Computers and Technology
1 answer:
leva [86]3 years ago
3 0

Answer:

people make unintentional mistakes

people do not know about cybersecurity protocols

people deliberately try to hack into the network

Explanation:

Cyber security breaches are the compromise to the data integrity of a computer system or network. There are several reasons why this can happen in the network f an organization. Some of them include;

1. People make unintentional mistakes: Human error has been attributed to be the leading cause of cybersecurity breaches. When people unknowingly expose passwords and sensitive data to those who should not have access to them, they commit a breach of security.

2. People do not know about cybersecurity protocols: When people are not educated on the right security measures to adhere to, they are prone to unknowingly engage in acts that will lead to a security breach.

3. People deliberately try to hack into the network: People within and outside the organization can decide to compromise the network especially if they believe that they will have some financial benefits.

You might be interested in
A car manufacturer uses'simulation software during the design process for a new car. Which of the
exis [7]

D I,II and III is the answer i think

5 0
3 years ago
When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____ records the data.
nydimaria [60]

Answer: Transaction processing system

Explanation:

A transaction processing system basically records all the data in the system. It is the set of data that basically monitor all the transaction process in the system. It basically perform various transaction oriented applications in the system.

It also allow time delay in the system when the item is supposed to being sold to the actually selling of the item. There are basically various types of transaction processing system arr payroll, account payable and the inventory control.

4 0
3 years ago
When handling project scope creep, which are two things that all parties involved need to be aware of?
WARRIOR [948]

Additional resource needed for the projects

Additional time needed for the project

<u>Explanation:</u>

In any project handing their will expected diversion and add on requirement, so to complete a project additional time and additional resource is required to finish a project.

As advice due the project details, end user has keep enough buffer for deviations on resource of man power and additional times taken to finish the project.

While design the project each scope of work is measure with additional time to complete the task

Each scope of work is considered as task in project management.

3 0
3 years ago
The opposite of merging cells is splitting a merged cell
vodomira [7]
True , hope this helps!!
4 0
3 years ago
Write a function named countWords that reads in a line of text into a string variable, counts and returns the number of words in
algol13

Answer:

function countWords(sentence) {

return sentence.match(/\S+/g).length;

}

const sentence = 'This sentence  has five  words ';

console.log(`"${sentence}" has ${countWords(sentence)} words` );

Explanation:

Regular expressions are a powerful way to tackle this. One obvious cornercase is that multiple spaces could occur. The regex doesn't care.

3 0
3 years ago
Other questions:
  • major m,ajorrr points helpppppppppppppppppppppppppppi have a question i hit a few buttons and now my computer is saying everythi
    11·2 answers
  • You have a new phone. What determines what type of messages you can send?
    15·1 answer
  • to create a cover letter to send to a potential employers along with a resume what software program should you use
    10·1 answer
  • a. Do you think the U.S. government should censor information on the Web, such as instructions for making weapons, to protect th
    12·1 answer
  • Clive wants to write a query that will display the names of the students who scored less than 10 in their final exams. Which num
    8·2 answers
  • If you wanted to include a chart in the new slide you are getting ready to create, you would most likely
    9·1 answer
  • Which software application offers a variety of templates for creating reports, flyers, and newsletters that you can access withi
    12·1 answer
  • When should you create an outline?
    11·1 answer
  • Is there a way for me to play a .mp3 file from my computer using Atom?
    10·1 answer
  • HELPPP PLEASE <br><br> Html can be used to create complicated mobile applications <br> True or false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!