1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
3 years ago
9

An IT security threat is anything that might cause serious harm to a computer system.

Computers and Technology
1 answer:
Blababa [14]3 years ago
5 0

Answer:

True

Explanation:

this is true because a threat can endanger the computer and its system

You might be interested in
Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed
ludmilkaskok [199]

Answer:

script kiddies

Explanation:

script kiddies is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so

8 0
3 years ago
Please help me what is an example of a growing trend on social media
Marizza181 [45]

Answer:

B

Explanation:

8 0
3 years ago
How do i fix my profile picture it is stretched out
sveta [45]

Answer:

try resetting your account or change the picture and see if the other one is stretched out to

8 0
3 years ago
What is the difference between PowerPoint and Outlook?
Svetllana [295]

Answer:

PowerPoint is a presentation program; Outlook is a personal information management application.

Explanation:

Powerpoint is the program used in presentations where slides designed and then shown to the audience.

Outlook is used to display various types of personal information like calendar appointments and emails.

6 0
3 years ago
In the Bullets and Numbering dialog box, the size of bullets and numbers is set in __________.
wlad13 [49]

The answer is C, percentage of text size.

5 0
4 years ago
Read 2 more answers
Other questions:
  • A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via root
    6·1 answer
  • A video game character prefers to take enemies on from a distance. What skills might such a character have?
    11·2 answers
  • Which of the following is a typical concern for developers while using prototypes?
    6·2 answers
  • Which collaboration website is best suited for social collaboration? www.media.iearn.org/projects www.meetup.com www.quest.nasa.
    9·1 answer
  • Which statement does NOT describe working with text in presentation programs?
    13·2 answers
  • True or False: In Google Cloud IAM: if a policy applied at the project level gives you Owner permissions, your access to an indi
    8·1 answer
  • MAN speeds are faster than WAN speeds because of ________. technological limitations regulatory limitations
    6·1 answer
  • write a program in pseudo code to solve the following: covert a temperature input in degrees Celsius to degrees Fahrenheit and d
    14·1 answer
  • ¿Cuál es la diferencia entre una plataforma educativa y una tutoría?
    7·1 answer
  • The<br>tool can lighten the part of an<br>image.*<br>Your answer​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!