1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naya [18.7K]
3 years ago
13

Question of computer sciences​

Computers and Technology
1 answer:
BARSIC [14]3 years ago
4 0

Answer:

a ans is cyber crime

b ans is hacking

c ans is cracker

d ans is computer ethics

e ans is phishing

You might be interested in
Describe how to find out a file type by using your Computer.
user100 [1]

First you go to the 3 dots neer the x you pres it thin you go to downloads and it shod be ther i hop i help if so make me the branliy

8 0
3 years ago
Read 2 more answers
Which line in the following code contain an error
Burka [1]
Please attach a photo
4 0
4 years ago
8. SQL, Oracle Report, and Visual Basic are all examples under the
sleet_krkn [62]

SQL, Oracle Report, and Visual Basic are all examples under the generation.

<h3>Fourth generation languages</h3>

Fourth-generation programming language (4GL) are computer programming language based on the advancement on third-generation programming languages (3GL).

4GLs may include support for <em>database management, report generation, mathematical optimization, GUI development, web development.</em>

SQL, Oracle Report, and Visual Basic are all examples under the generation.

Find out more on Fourth generation languages at: brainly.com/question/9325849

3 0
2 years ago
Dave wants to host a website and he needs an operating system that is free of cost. Which operating system should he use? a MS D
Zigmanuir [339]
It is microsoft windows
8 0
3 years ago
Read 2 more answers
In the ISO/IEC 27002 framework, _________________ describes the use and controls related to encryption.
Nezavi [6.7K]

Answer:

In the ISO/IEC 27002 framework, Cryptography describes the use and controls related to encryption, to help an organization implement, maintain, and improve its information security management.

7 0
3 years ago
Other questions:
  • __________ involves analyzing a large amount of data to extract knowledge and insight
    13·1 answer
  • If you are trying move a hard drive from a non-working computer to a working computer for the purposes of accessing the data on
    5·1 answer
  • What is an enterprise system
    14·2 answers
  • Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet
    11·1 answer
  • A ___________ variable is declared outside all functions.
    15·1 answer
  • Research for a project should be based on?
    7·2 answers
  • Need help please asap
    9·1 answer
  • Given the following statement, what is the value of myExample?
    13·1 answer
  • Heyyyyyy who likes anime​
    12·2 answers
  • Synthesize (15 points)
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!