1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina1246 [14]
3 years ago
12

Write any four causes of cyber crime

Computers and Technology
1 answer:
jenyasd209 [6]3 years ago
7 0
A Lack of Empathy
The Victim Deserves It
Self-loathing
It Becomes an Addiction
You might be interested in
What control features will you use in the input screens to aid in data entry? give a specific example of how you will use at lea
Tresset [83]
The use of <span>different control features in the design of the user interface are :    </span>Menu bar - displays the main options at the top of the screen.
Toolbar - contains icons that represent shortcuts for executing common commands.
Command button - start an action such as printing a form or requesting Help.
Dialog box - allows a user to enter information about a task that the system will perform.
Text box - display messages or provide a place for a user to enter data.
Toggle button - is used to represent on or off status — clicking the toggle button switches to the other status.
List box - displays a list of choices that the user can select.
Scroll bar - allows the user to move through the available choices.
Drop-down list box - displays the current selection; when the user clicks the arrow, a list of the available choices displays.
Option button - represent groups of options. The user can select only one option at a time; selected options contain a black dot.
8 0
3 years ago
What are some applications of computer in public administration?​
Volgvan

Answer:

Explanation:

Embedded Systems.

Windows applications (also called 'Desktop applications')

Web Applications.

Web Services.

Console applications.

6 0
2 years ago
Janet manages the security of the database servers at the mortgage company where she works. The servers are Windows Server 2016;
Mariulka [41]

Answer:

encrypted file system (EFS)

Explanation:

The Encrypting File System (EFS) on windows is a Microsoft feature that help store sensitive file or information on a hard disk in an encrypted format so as to protect it from attackers or any other unauthorize individual. The EFS uses a combination symmetric key encryption and public key technology to protect the files, it is then encrypted with a symmetric algorithm known as DESX.

3 0
3 years ago
What explains the discrepancy between the number of bytes you can
sergejj [24]

Answer:

This is because, the advertisers report the storage space in decimal while the computer reads the storage space in binary.

Explanation:

The advertisers report the storage space in decimal or base 10 because humans count in decimal, whereas the computer reports the storage space in binary or base 2.

Since the computer storage is in bytes and 8 bits equal 1 byte, It is easier to write a storage space of 1 kB as 1000 B but it is actually supposed to be 1024 B(2¹⁰). So, there is a discrepancy of 1024 B - 1000 B = 24 B.

As  we go higher, the discrepancy increases. For example, 1 MB is advertised as 1000 kB = 1000000 B but is actually supposed to be 1024 kB = 1024 × 1024 B = 1048576 B. So, there is a discrepancy of 1048576 B - 1000000 B = 48576 B.

So, the actual number of bytes on the storage device is actually less than that reported due to the different number systems in which they are reported in. This discrepancy is less in memory cards or flash drives though in which the stated value of storage capacity might be the actual storage size.

Note that the base 10 or decimal system was chosen by advertiser since this is what consumers understand.

8 0
2 years ago
Assume you are working for the laboratory that is developing the control system for the LISAsatellites. Your job is to develop a
ladessa [460]

<u>Answer:</u>

?????????????/

<u>Explanation:</u>

???????????//

8 0
3 years ago
Other questions:
  • If you can log nto a website to add, edit, or delete content that has been added by you or another user , you are most likley us
    8·1 answer
  • The indent buttons on the home tab allow you to increase or decrease paragraph indenting in increments of ____ inches.
    5·1 answer
  • In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet
    8·1 answer
  • What is meant by encapsulating semaphores? Bring out the need for it
    12·1 answer
  • Extending the web server functionality implies that the web server and the web-to-database middleware will properly communicate
    10·1 answer
  • When referring to hard drives, access time is measured in
    11·1 answer
  • Pleasee helpppppppppppppppppppppp me!
    7·1 answer
  • Discuss the impact printer and its types in detail?
    7·1 answer
  • a(n) is an object that defines a screen element used to display information or allow the user to interact with a program in a ce
    6·1 answer
  • In a database, what term is used to describe a group of fields that are all associated with and accessed using single primary ke
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!