1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leto [7]
2 years ago
7

List 2 negative impacts of cybersecurity.Answer and I will give you brainiliest ​

Computers and Technology
1 answer:
Nitella [24]2 years ago
5 0

Answer:

Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.

You might be interested in
Which of the following is not a skill set required by data scientists? A. Programming expertise B. Big data expertise C. Telecom
ziro4ka [17]

Answer:

Explanation:Option C is the correct answer.

8 0
3 years ago
A(n) ______ has moving mechanical parts, which makes it less reliable than solid-state drives, but its metal platters are sealed
Jobisdone [24]
Optical drive

Disks can scratch
6 0
2 years ago
Read 2 more answers
How to make a website
hjlf

Answer:

You need an email and a job and to be over 18 for business ones or a legal gaurdian if you have none then ur hecced uwu :333

8 0
2 years ago
Read 2 more answers
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
2 years ago
_____ rows indicate that there is different formatting for odd and even rows.
Sladkaya [172]
Banded rows indicate that there are different formatting for odd and even rows.
5 0
3 years ago
Other questions:
  • Who is the last person appointed to the u.s supreme court
    11·1 answer
  • Which are valid double statements for java? double a = 0; double b = -1.0; double c = -425; double d = 6340; double e = -1.0; do
    12·2 answers
  • A tool you might use to manipulate an image, such as a photograph, into a seamless repeating texture would be:
    7·2 answers
  • __________ has become a widely accepted evaluation standard for training and education related to the security of information sy
    5·1 answer
  • What did Charles Babbage design in 1822 to substitute values in polynomial equations? ENIAC TRADIC Analytical Engine Difference
    6·1 answer
  • Websites whose URL’s contain tildes (~) are usually published by the government. TRUE or FALSE.
    8·2 answers
  • Calcula l'energia (Kwh) consumida per una màquina de 30 CV que funciona durant 2 hores.
    12·1 answer
  • Is the trust necessary to use an emerging technology platform? why?​
    10·1 answer
  • A serial schedule:
    8·1 answer
  • Which technology keeps track of heart rate during a workout? (3 points) bathroom scale calculator pedometer wrist monitor
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!