1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
11

The gaining of unauthorized access to data in a system or computer:

Computers and Technology
1 answer:
Katarina [22]3 years ago
3 0

Answer:

The answer to this question is given below in the explanation section

Explanation:

The gaining of unauthorized access to data in a system or computer is data breach or security breach.

A security breach or data breach is a successful attempt by an attacker to gain unauthorized access to organizational systems/computers to steal data.

To gain unauthorized access is illegal in most countries and it is considered a crime.

You might be interested in
Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happen
REY [17]

Answer:

Hot

Explanation: A Hot site is a disaster recovery management site which allows an organisation to still continue it computer and interconnection activities through a copied backup servers should there be any disaster or issues on the main server.

Hot site is a very essential part of disaster recovery process and thus for an organisation to use a Hot site there are basically service charges which are paid by such an organisation.

3 0
3 years ago
What does the following code segment do?
vampirchik [111]

Answer:

Hi!

var count =0;  <em>//initialize count.</em>

var sevens =0 ;  <em>//initialize sevens.</em>

while(count<100)  <em>// loops while count is minor than 100. *counts never add 1 at the final of the loop, so this while is always true. </em>

{

<em>//Math.floor(x) round to the max Integer a number. Example : 45.90 -> 46.</em>

<em>//Math.random() returns a number between [0, 1).</em>

var roll1 = Math.floor(Math.random()*6+1);   <em>//Gets a integer using Math.random(), adds 1, and round it withMath.floor() then saves in roll1.</em>

var roll2 = Math.floor(Math.random()*6+1);  <em>//Gets a integer using Math.random(), adds 1, and round it withMath.floor() then saves in roll2.</em>

if(roll1 + roll2 == 7) <em> //If the sum of roll1 and roll2 is 7 adds 1 to sevens.</em>

sevens = sevens +1;  

}

<em>//*count is not incremented, so while(count<100) -> always true.</em>

4 0
3 years ago
A user could find the icon for an attached usb flash drive under what heading in the my computer/computer window?
xxMikexx [17]
  <span>Hi... 

There are three answers ..... 

If the flash drive has a custom icon then there is hidden files on the flash drive. 
An autorun.inf file and a small .ico image file ..... 
( Click organize > Folder and search options >View>Show hidden folders and files. ) 


If the flash drive displays a windows created icon the source directory's are.. 
%SystemRoot%\system32\SHELL32.dll 
%SystemRoot%\system32\imageres.dll 





If the Flash drive has a custom icon stored on the computer the "original source file " could be any ware. 
The image preference retained in AppData.. 

Select flash drive >Right click>Properties>Customize , i take a good ICT course, can u make this the brainliest?</span>
7 0
4 years ago
Describe four features of a well designed input screen
Sladkaya [172]

Answer:

A well design input screen should:1.Be titled2.Navigation aids should be used

Explanation:

3 0
3 years ago
Read 2 more answers
Which is an advantage of a computer network?
stealth61 [152]
The answer is "networks allow computer to connect quickly and to share data or equipment". This is true because with a commuter network you can instantly share files to all the other computer by putting them of the network file storage center. This also allows multiple pieces of equipment to be used to complete one task that would usually take longer if a single computer did it
5 0
3 years ago
Read 2 more answers
Other questions:
  • Technician A says copper has a low resistance. Technician B says the length of wire doesn't affect resistance. Who is correct?
    11·1 answer
  • In computer security, the term "Dumpster diving" is used to describe a practice of sifting through trash for discarded documents
    7·1 answer
  • How did the movie characterized being a genius on real genius movie
    13·2 answers
  • In which of the following situations will a macro make your work more efficient?
    7·1 answer
  • True or False: Assuming that all variables are defined, the following segment of code is invalid. if ( x &gt; 0 )
    10·1 answer
  • Think of an aspect of HTML that you found challenging to master. Why is that aspect of HTML important? What are some future situ
    6·1 answer
  • Please Help me no links.
    6·1 answer
  • How does the autosum command calculate data? Need help ASAP​
    5·1 answer
  • Make a Flow Chart From this C Programming Language Code
    14·1 answer
  • Please help
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!