Explanation:
Threats
Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats
Types of Computer Security Threats
There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.
COMPUTER VIRUS
A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.
COMPUTER WORMS
A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.
SCAREWARE
Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.
KEYLOGGER
Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.
ROOTKIT
A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.
Tips for Best Computer Security
For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.
Match each type of Save option on the left with a function on the right.
Answer:
the above is correct
Explanation:
Whats wrong with this and how do I fix it?
Answer:
this happened to me before.. there isn't anything wrong you just have to wait a little
Explanation:
????????????helpppp please
Answer:
I lab u pre haha jok
ano ka gold
In the program below, which two variables have the same scope?
def usernameMaker (strFirst, strLast):
return strFirst + strLast[0]
def passwordMaker (strA, numC):
answer = dogName[0:3]
return answer + str(numC)
# the main part of your program that calls the function
username = usernameMaker ('Chris', 'Smith')
dogName = 'Sammy'
favoriteNumber = 7
password = passwordMaker (dogName,favoriteNumber)
strA and
Answer: num C
Explanation: got it right on edgen
Which CPU characteristic when enabled, doubles the number
of instructions which can be processed at once?
Answer:
A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions. The term has been used in the computer industry at least since the early 1960s. Traditionally, the term “CPU” refers to a processor, more specifically to its processing unit and control unit (CU), distinguishing these core elements of a computer from external components such as main memory and I/O circuitry.
The form, design and implementation of CPUs have changed over the course of their history, but their fundamental operation remains almost unchanged. Principal components of a CPU include the arithmetic logic unit (ALU) that performs arithmetic and logic operations, processor registers that supply operands to the ALU and store the results of ALU operations, and a control unit that fetches instructions from memory and “executes” them by directing the coordinated operations of the ALU, registers and other components.
Most modern CPUs are microprocessors, meaning they are contained on a single integrated circuit (IC) chip. An IC that contains a CPU may also contain memory, peripheral interfaces, and other components of a computer; such integrated devices are variously calledmicrocontrollers or systems on a chip (SoC). Some computers employ a multi-core processor, which is a single chip containing two or more CPUs called “cores”; in that context, single chips are sometimes referred to as “sockets”. Array processors or vector processors have multiple processors that operate in parallel, with no unit considered central.
How to recover permanently deleted photos from gallery?
Answer:
it's technically impossible to recover permanently deleted photos
but if you have a copy of the photo or maybe have backup that would help.
I'm sorry if my answer isn't much help
goal of any user-friendly game should be to create a good what for the player?
A. user experience (UX)
B. user-interface (UI)
C. user intuition (UIT)
D. user skill (US)
Answer:
A
Explanation:
The goal of user friendly game is to provide UX.
For example a user friendly game will have much different interface than professional CAD program.
Answer:
user friendly.
Explanation:
Michaela has been tracking the temperatures of the dirt, pond water, and air near her home for a science investigation. She is ready to analyze the data to prepare for her science report. Based on each application’s strengths and weaknesses, which one would be the best to choose for this task?
Answer:
The science of investigation
Explanation:
hope it help
outline how the appropriate features that may be used to ensure that the document is free of spelling and grammatically errors.
Answer:
Answer
Since Sophie often makes a lot of
grammatical and spelling errors in her
document, it might be best for her to use
a feature available in Microsoft Word that
would help her better in understanding
what her mistakes are, which is
something that (D) Explain does.
Explain would tell Sophie which part of
her sentence is wrong, or what word
did she mistype, and what better way to
phrase a sentence to avoid fragmented
ones.
Which of these would be the best way to inform an employee that they are losing their job?
Group of answer choices
group email
face-to-face conversation
instant message
personal email
Answer:
Terminations are a sensitive subject.Even if you have strong reasons for letting an employee go, sitting them down to explain they are out of a job can be an awkward conversation.
Some employers might be tempted to fire an employee using an impersonal method — like a phone call, email, or text — just to avoid that discomfort. But that is a very bad idea. We strongly recommend that employers should only fire staff during a face-to-face termination meeting.
Which phrase will be coded using the element in HTML?
Answer:
The <i> tag is often used to indicate a technical term, a phrase from another language, a thought, a ship name, etc. Use the <i> element only when there is not a more appropriate semantic element, such as: <em> (emphasized text) <strong> (important text)
Explanation:
brainliest please thank you :)#CARRYONLEARNINGCORRECT ME IF IM WRONGwhere deep convolutional neural network is used in real life
Answer:
Business applications of Convolutional Neural Networks. Image Classification - Search Engines, Recommender Systems, Social Media. Face Recognition Applications of RNN is Social Media, Identification procedures, Surveillance. Legal, Banking, Insurance, Document digitization - Optical Character Recognition.
A healthcare crisis where millions of patient medication records were tampered with is an example of what type of breach?
A.
integrity breachc.
B.
codependency breach
C.
authentication breach
D.
AIC Triad breach
A healthcare crisis where millions of patient medication records were tampered with is an example of; A: Integrity Breach.
To answer this question, let us access each of the options;
A) Integrity breach; This is a breach that occurs when where there is an unauthorised or accidental alteration of the personal data of individuals or a group.
B) Codependency breach; This is not really a breach in this context as it happens when there is an imbalanced relationship between two or more people.
C) Authentication breach; This is a type of breach that is more common with a breach of passwords and login details.
D) AIC Triad breach; AIC is Availability, Integrity and confidentiality. So it combines Availabilty breach, integrity breach and confidentiality breach.
In this question, the patient medication records were tampered with which means that they were altered and from our definitions above, this is an example of integrity breach.
Read more about security breach at; https://brainly.com/question/15957125
A bulb has a resistance of 15Ω and is rated at 3A. What is the maximum voltage that can be applied across the bulb?
Answer:Wheres the option choice??????????????????????
Explanation:
what is a saved link to a particular web page?
Answer:
A bookmark
Explanation:
A bookmark is a saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks as “favourites.” Boolean operators Most search engines (e.g. Go.ogle) allow you to limit your search or make it more specific by using words such as “and”, “or” and “not”.
Software that is used to detect and eliminate computer viruses. Question 3 options: Wi-Fi Cable Internet Antivirus Application Browser
Answer:
Anti Virus
Explanation:
Antiviruses (Windows Defender, McAfee, Avast) scan your computer/device for viruses.
Sampson runs his own online business, and much of his success depends on the reliability and accuracy of various online data. How does integrity help to ensure that Sampson can trust the online data he is using?
A.
Integrity takes steps to ensure Sampson's information cannot be altered or deleted by unauthorized people.
B.
Integrity refers to a process that makes it impossible for anyone but Sampson to see the data that he is using.
C.
Integrity blocks all hackers from interfering with Sampson's data and what he does with it.
D.
Integrity allows Sampson to access and move data on an unsecured network.
Answer: because integrity takes steps to ensure Sampson's information cannot be altered or deleted by unauthorized people and that it stays intact, no matter where it goes
Explanation:
To remove a specified number of characters from anywhere within a string, you should use the ____ method.
Answer:
remove
Explanation:
I
What is a Watermark?
You've just received an email message that indicates a new serious malicious code threat is spreading across the internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent the code from spreading further.
Required:
Based on the email message, what are the next BEST actions to complete?
Answer:
The next BEST actions to complete could either be to call 911 or just drive somewhere further from your computer and where you live because the threat might come to your place, or it might already be in your place.
Explanation:
You can use the ____ method to search a string to determine whether it contains a specific sequence of characters.
Answer:
in
Explanation:
Not an explanation, but here's an example:
if "mouth" in "mouthwatering":
print("It is.")
else:
pass
Another example:
if "water" in "mouthwatering":
print("Yes.")
else:
pass
which part lets you point to objects on your screen, click on them, and even move them?
Mouse lets you point to objects on your screen, click on them, and even move them.
A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs.
A computer mouse is a handheld hardware input device that controls a cursor in a GUI (graphical user interface) for pointing, moving and selecting text, icons, files, and folders on your computer.
Find out more on mouse at: https://brainly.com/question/22247989
how many pages is 1500 words double spaced 12pt font?
Answer:
6 pages
Explanation:
Write any two uses of ruler in word program
Answer:
1.It is used for draw the table, making results and assignments etc.
2.It is used for lining
Explanation:
Hope it helps
#CARRYONLEARNINGWRITE A PROGRAM TO CALCULATE SIMPLE INTEREST
Instructions to do the program:-
The output format of the program should be as shown below:
P = 2000
R = 8
N = 4
Simple Interest = 640
pls help
The simple interset program is a sequential program, and does not require loops and conditions
The simple interset program in Python, where comments are used to explain each line is as follows:
#This gets input for the principal amount
P = int(input("P = "))
#This gets input for the rate
R = int(input("R = "))
#This gets input for the number of years
N = int(input("N = "))
#This calculates the simple interest
I = P * R * T * 0.01
#This prints the simple interest
print("Simple Interest =",I)
Read more about simple interest at:
https://brainly.com/question/2294792
What is the first step when creating a 3-D range name?
Open the New Range window, and click 3-D.
Press the Shift key while selecting the new sheet .
Open the Name Manager, and click New.
Click a cell to insert the cell reference.
Answer:
Open the Name Manager, and click New.
Explanation:
What type of information is appropriate for headers and footers? Check all that apply.
Answer:
C, E,F,G are correct
Explanation:
Answer:
C,E,F,G are correct.
Explanation:
what is internet? short ans
Answer:
The Internet is a big network that connects computers all over the world.
2. Input a decimal number and test if it is not equal to 16.5.
3. If a number x, input from the keyboard is greater than 57, add 4 to x and print the
answer.
4. Input two numbers and find the average only if they are both less than 100.
Answer:
2:
decNum = float(input("Decimal number: "))
if decNum != 16.5:
print("Does not equal")
elif decNum == 16.5:
print("Equal")
else:
pass
3:
if x > 57:
x += 4
print(x)
4:
numOne = int(input("Enter number: "))
numTwo = int(input("Enter number: "))
if numOne < 100 and numTwo < 100:
yes = numOne + numTwo
print(yes // 2)
else:
pass
Explanation:
Please give me brainliest.
in addition to good design sense, what else do web designers need to be proficient in?
In addition to good design sense, web designers need to be proficient in front-end coding languages.
A web designer refers to an individual who is saddled with the responsibility of writing executable codes (instructions) for the design and development of a website, especially by using a hypertext markup language (HTML).
Generally, it is expected that all web designers a good design sense in website development. Additionally, web designers need to be proficient in front-end coding languages, so as to ensure the graphical display and user-interface (UI/UX) are attractive and properly rendered.
Some examples of front-end coding languages include:
CSSHTMLJavascriptReactJQuerryVueRead more on web design here: https://brainly.com/question/8391970