1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr402 [8]
3 years ago
10

Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​

Computers and Technology
2 answers:
olga55 [171]3 years ago
8 0

Answer:

Cyber warfare can present a multitude of threats towards a nation.

Explanation:

At the most basic level, cyber attacks can be used to support traditional warfare. For example, tampering with the operation of air defenses via cyber means in order to facilitate an air attack.

stellarik [79]3 years ago
3 0

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

You might be interested in
A computer application such as Microsoft Access that is used to store data and convert it into information is a ________________
lorasvet [3.4K]
All data is stored in table
5 0
3 years ago
IT investments can lead to developing IT capabilities and dynamic IT competencies, which can lead to achieving the following six
Stella [2.4K]

Answer:

True

Explanation:

Each of the outcomes listed are advantages of an effective investment in information technology. especially software solutions to the day to day running of a business will definately lead to low cost, speed, added value etc.

4 0
3 years ago
Which command will display the current contents of non-volatile random-access memory (nvram)?
balandron [24]
<span>The command that will display the current contents of non-volatile random-access memory (NVRAM) is : show start-up configuration.
On the screen you will see the following:
"Switch#show startup-configuration".
</span><span>This command display the contents of the configuration file. It can be also written in short form as:
show startup-config
</span>
7 0
4 years ago
Rebooting the computer is a good troubleshooting technique.<br><br> True<br> False
Basile [38]
True it could help.....
6 0
3 years ago
Read 2 more answers
Write a Python program to do the following:
viktelen [127]

Answer:

(b)Tb = Ta[:3]

(c)Tc = Ta[-3:]

(d)Td = Tb + Tc

Explanation:

In order to generate random number in python, we need to first import random() function from random module

This function will generate a float number between 0 and 1, to make it between 1 and 15, we add 1 to the multiplication between the random number and the range differences

(a)

from random import random()

L = []

for i in range(10):

    L.append(1 + round(random()*14))

Ta = tuple(L)

(b) To copy the first 3 elements of tuple Ta, we simply go from : to 3

Tb = Ta[:3]

(c) To copy the last 3 elements of tuple Ta, we simply go from -3 to :

Tc = Ta[-3:]

(d) To concatenate the 2 tuples, we simply add them up

Td = Tb + Tc

5 0
4 years ago
Other questions:
  • Which sentence best describes an activity stream?
    10·2 answers
  • Trish uas bought a new computer, which she plans to start working on aftwr a week. Since Trish has not used computers in the pas
    13·1 answer
  • Choose the type of critical thinking demonstrated in the example:
    8·2 answers
  • Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
    12·1 answer
  • What is the purpose of ergonomics in the workplace? A.Keep workers safe and injury free
    5·2 answers
  • How much electricity is in the human brain? ​
    8·2 answers
  • What is a telecomunications system? 1) A system that enables the transmission of data over public or private networks. 2) A comm
    11·1 answer
  • A ________ is a powerful analytical tool to size up Apple Inc.'s competitive assets in order to determine whether or not those a
    9·1 answer
  • Int a = 1; int b = 0; int c = -1; if ((b + 1) == a) { b++; c += b; } if (c == a) { a--; b = 4; }
    7·1 answer
  • You are interested in buying a laptop computer. Your list of considerations include the computer's speed in processing data, its
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!