1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
11

The gaining of unauthorized access to data in a system or computer:

Computers and Technology
1 answer:
Katarina [22]3 years ago
3 0

Answer:

The answer to this question is given below in the explanation section

Explanation:

The gaining of unauthorized access to data in a system or computer is data breach or security breach.

A security breach or data breach is a successful attempt by an attacker to gain unauthorized access to organizational systems/computers to steal data.

To gain unauthorized access is illegal in most countries and it is considered a crime.

You might be interested in
Which binary number is equivalent to the decimal number 104?
ra1l [238]

B. 01101000

For future reference you can look up decimal to binary calculators online; or binary to decimal.

6 0
3 years ago
Why do we have to watch a video to get answers?
IRINA_888 [86]

Answer:

The videos contain the answers.

Explanation:

4 0
3 years ago
Read 2 more answers
Name the contributory components that are considered when determining an E/M code; they are not considered key components:
Vika [28.1K]

Answer:

time

Explanation:

E/M code is known as the evaluation and management code. The E&M code may be defined as the medical coding system which supports the medical billing process.  Every new patient is assigned a E/M code. The components that are not considered for determining the E/M code are coordination of care, the counselling, time and the nature of presenting problem.

7 0
2 years ago
You have been asked to write a username validation program for a small website. The website has specific rules on what constitut
umka21 [38]

Answer:

#function to validate username

def valid_username(username):

   

   #checking is length is between 8 to 15

   length_valid=True

   if(len(username)<8 or len(username)>15):

       length_valid=False;

   

   #checking is string is alphanumeric

   alphanumeric=username.isalnum()

   

   #checking first_and_last Characters of string is not digit

   first_and_last=True

   if(username[0].isdigit() or username[len(username)-1].isdigit()):

       first_and_last=False

   

   #counting uppercase lowercase and numeric Characters in string

   uppercase=0

   lowercase=0

   numeric=0

   

   for i in username:

       if(i.isdigit()):

           numeric=numeric+1

       elif(i.isalpha()):

           if(i.isupper()):

               uppercase=uppercase+1

           else:

               lowercase=lowercase+1

               

   valid_no_char=True

   if(uppercase<1 or lowercase<1 or numeric<1):

       valid_no_char=False

           

 

   #printing the result

   print("Length of username: "+str(len(username)))

   print("All Characters are alpha-numeric: "+str(alphanumeric))

   print("First and last Character are not digit: "+str(first_and_last))

   print("no of uppercase characters in the username: "+str(uppercase))

   print("no of lowercase characters in the username: "+str(lowercase))

   print("no of digits in the username: "+str(numeric))

   

   #checking string is Valid or not

   if(length_valid and alphanumeric and first_and_last and valid_no_char):

       print("Username is Valid\n")

       return True

   else:

       print("username is invalid, please try again\n")

       return False

#loop runs until valid_username enterd by user

while(True):

   

   username=input("Enter a username: ")

   if(valid_username(username)):

       break

Explanation:

The code was created by considering all the required cases asked in the question.

In this program, I asked username from the user continuously until it enters a valid username

first it check for length of string

then check is string contains only alphanumeric characters

then first and last digit is or not

than no of uppercase lowercase and numeric character

using the above parameter declare username valid or not

3 0
3 years ago
Being technologically literate requires being able to ______.
NeX [460]
<span>Select the appropriate technology for a task</span>
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is an example of a logic bug?
    8·1 answer
  • An ___ is any person who spends times using technology at home
    10·1 answer
  • You would like to conduct a survey and ask your web page visitors to indicate the computer operating systems that they use. Each
    10·1 answer
  • What does it mean to be self demanding?
    12·1 answer
  • Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender
    9·1 answer
  • Paul wants to store addresses and phone numbers for clients. Paul wants to use this information to send form letters. Paul shoul
    5·1 answer
  • simplify the expression below and state the value of m for which the simplified expression is not defined 2m² + m - 15/ m² - 9​
    5·1 answer
  • Write an algorithm to create a customer’s bill for a company. The company sells only five different products. TV, VCR, Remote Co
    13·1 answer
  • What is computer specification
    15·1 answer
  • What should you do if an online friend asked to meet you after school? <br>ᵖˡˢˢˢˢ...​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!