Describe three things (risks) that can cause damage to computer hardware​

Answers

Answer 1
Phishing,computer viruses,malware/ransomeware,rogue security software,denial of service attacks etc

Related Questions

Each computer on a network is called a __________, and it can include many different systems, such as desktop and laptop computers, printers, routers, switches, and cell phones.

Answers

A host refers to each of the computer system connected to a network and it include the following different systems:

Desktop Laptop computersPrintersRoutersSwitchesCell phones

What is a host?

A host can be defined as an electronic computing and programmable device that can be used to transmit and receive data (packets) over the Internet, especially when it is connected to a network.

This ultimately implies that, each electronic computing and programmable device (computer) on a particular network is a host and it can include many different systems such as:

Desktop Laptop computersPrintersRoutersSwitchesCell phones

Read more on computers here: https://brainly.com/question/17402566

A function getints has been defined that has no parameters and returns an array of integer values. The first value in the array contains the total number of items in the array (including itself). Write code (not a function or main) to: Write a prototype for getints() Call getints() From the resulting array, print the first value (after the length) and the last value, each on a separate line.

Answers

Answer:

Explanation:In the below code : Create method getints() : with no arguments and integer array return type Inside method : Declare n integer Input n Declare integer array with n length : arrInt Assign n at 0th array index Use loop from 1 to n: i counter Input arr... view the full answer

Function getints  is presented in the Prototype of the following code will be:

// Prototype

int* getints();

What is function getints?

This function requests an integer from the person using it and then returns it. You can ask for the integer using a prompt argument.

Older OSes used the C method getch() to collect user input. Depending on the function call, it only allows one input character at a time. Unless the user supplies input, the program's execution is halted.

For trhe Prototype the code will be:

// Prototype

int* getints();

For the getints the code will be:

// Call getints()

int* array = getints();

The print values will be:

// Print the first and last value

printf("The first value is %d\n", array[1]);

printf("The last value is %d\n", array[array[0]]);

Learn more about  function getints, here:

https://brainly.com/question/30928705

#SPJ2

Which two tabs appear when a table is "active" in Microsoft Word?
Insert
Table Design
Home
Layout

Answers

Answer:

Layout and Table Design

Explanation:

Which one of the following careers is the most highly resistant to economic change?

Video Game Designers

Airline Pilots

Fashion Designers

Funeral Attendants

Answers

Answer:

Video game designers bbbbbbbbbbbbb

What sets blockchain solutions apart from conventional record-keeping solutions?

Answers

Blockchain technology are in commonly used in this dispensation. The thing that sets blockchain solutions apart from conventional record-keeping solutions is simply the ability to share different versions of the same data to multiple parties.

Blockchain is known to buildup trust, security, transparency, and the traceability of data shared across a business network. It also minimize cost  with new efficiencies.

It is simply known to be distributed ledger technology that helps in the storage of information in the form of blocks and no one can change or add the data.

See full question below

What sets blockchain solutions apart from conventional record-keeping solutions?

the ability for multiple parties to be certain they are using the same data

the ability to share different versions of the same data to multiple parties

a focus and priority on bitcoin and cryptocurrency

a system that maintains rigor and complexity

Learn more from

https://brainly.com/question/21105181

A keyboard would be considered _____. Select 2 options.

an input device

storage

an output device

software

hardware

Answers

Answer:

input devise and hardware

Explanation:

What is the full form of eniac and univac ?

thanks!!​

Answers

Answer:

ENIAC - Electronic Numerical Integrator and Calculator. UNIVAC - Universal Automatic Computer (First Digital Computer)

Mark brilliant please

Answer:

[tex]ENIAC - Electronic \: Numerical \: \\ Integrator \: and \: Computer[/tex]

[tex]UNIVAC- Universal \: Automatic \: Computer[/tex]

How do you create speaker note changes that show the slides, related notes and company logo on each page

Answers

Answer:

The Notes Master contains two placeholders one for your text and the other for the slide. We can move or change the size of either of these objects and we can change the format of the text in the notes placeholder, we can also add or change elements that we want to appear on each handout and also notice the convenient placement of the header, footer, date and page numbers.

The date of creation can be added to a slide using the:

a.

"Insert" tab, "Add note" group


b.

"Edit" group of the ribbon


c.

"Insert" tab, "Text" group

Answers

Answer:

The answer to your question is Insert tab Tex group.

The date of creation can be added to a slide by using the: "Insert" tab, "Text" group.

What is a slide?

A slide refers to a single page of a presentation that is made up of text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic, subject matter, event or idea.

In Microsoft Powerpoint, an end user can add the date of creation to a slide by using the "Insert" tab, "Text" group.

Read more on slides here: https://brainly.com/question/11741377

#SPJ2

Choose a project with a relatively simple description (e.g. building a LAN,
designing a business web page, inventing a new communication device,
etc.). Describe your project scope in 100 words and then identify at least
five significant varied risks associated with the project. Be sure that at
least one of them is a positive risk

Answers

Answer:

Design a web page

Explanation:

It is easier html is a very easy language to learn css it should take ou about a week for a solid website

An application maintains social security numbers and birth dates in a database to track medical records across multiple offices. To maintain the personally identifiable information (PII), which of the following de-identification methods should the application adopt?

Answers

There are different ways of management.  To maintain the personally identifiable information (PII), Data masking as an de-identification methods should the application adopted.

Data masking is also called data obfuscation. This is simply known as the way of improving or modifying sensitive data so that it has no/little value to unauthorized intruders while still being usable by software or authorized personnel.

It often functions by shielding confidential data, such as credit card information, Social Security numbers, names, addresses, and phone numbers etc.

Learn more from

https://brainly.com/question/13438921

What is considered a relatively new science that is being developed?
O targeting advertising to number of downloads
O targeting advertising to demographics
O targeting advertising to geography
O targeting advertising to adolescents

Answers

Answer:

b

Explanation:

Targeting advertising to demographics  is considered a relatively new science that is being developed. Option (b) is correct.

What do you mean by Geography?

The study of places and the interactions between people and their environs is known as geography. Geographers study the surface of the Earth and the various human societies that live there.

Advertising refers to the methods used to draw attention to a good or service. In order to attract consumers' attention, advertising seeks to highlight a good or service. It is often used to market a particular product or service, although there are many other applications as well, with commercial advertising being the most popular.

Through "branding," which links a product name or image with particular traits in consumers' minds, commercial advertising frequently aim to boost consumption of their goods or services.

Therefore, Option (b) is correct. Targeting advertising to demographics  is considered a relatively new science that is being developed.

Learn more about Geography, here;

https://brainly.com/question/1462956

#SPJ2

4.7 Code Practice: Question 1 Please help!

Answers

Whats the question???

What is true about client-side scripting?

Answers

Answer:

A client-side script is a program that is processed within the client browser. These kinds of scripts are small programs which are downloaded , compiled and run by the browser. JavaScript is an important client-side scripting language and widely used in dynamic websites.

Explanation:

Client-side scripting refers to the execution of scripts on the client's device (typically in a web browser) rather than on the server.

Given that,

To write about client-side scripting.

Since, Client-side scripting simply means running scripts, such as JavaScript, on the client device, usually within a browser.

All kinds of scripts can run on the client side if they are written in JavaScript because JavaScript is universally supported.

Therefore, client-side scripting enables the execution of scripts on the client's device, enhancing web interactivity and reducing server load.

JavaScript is a widely used language for client-side scripting.

To learn more about scripting visit:

https://brainly.com/question/26121358

#SPJ4

4. When working at the CLI in Linux, you specify the exact location of a file, which is the ____________________ to it, by beginning with a forward slash (/) to indicate the root directory.

Answers

Command line interface is used in form of a messenger conversation with your computer. You specify the exact location of a file, which is the pwd to it.

The Command Line Interface (CLI), is said to be a non-graphical, text-based interface attached to the computer system.

It is where the user input in a command and the computer then successfully executes it.

The Terminal is known to gives the command line interface (CLI) environment to the user.

The pwd command is simply known to be used in determining an exact folder location or path in Terminal.

Learn more from

https://brainly.com/question/25435538

Online Book Merchants offers premium customers 1 free book with every purchase of 5 or more books and offers 2 free books with every purchase of 8 or more books. It offers regular customers 1 free book with every purchase of 7 or more books, and offers 2 free books with every purchase of 12 or more books.

Write a statement that assigns freeBooks the appropriate value based on the values of the bool variable isPremiumCustomer and the int variable nbooksPurchased. Assign 0 to freeBooks if no free books are offered. Assume the variables freeBooks, isPremiumCustomer, and nbooksPurchased are already declared.

In C++ please

Answers

fill in the blanks

we should our selves

1. How many colors are available in color. palette.
2. 20 colors are available in color palette. True / False​

Answers

Answer:

16 colors in the palette

false only 16 colors

1. Briefly summarize the similarities and differences among temporary staffing firms, employee leasing organizations, and professional employment organizations. Which approach pro- vides an organization the most protection from potential coemployment situations?

Answers

A staffing firm simply refers to an organization that matches companies and job candidates. It's also known as a recruiting firm.

It should be noted that employers use staffing agencies to help recruit candidates for them and to fill certain job openings.

An employee leasing organization furnishes workers to another client on a long-term basis. It's usually a contractual agreement between the parties that are involved.

A professional employer organization simply means an organization that enters into a joint employer relationship with another employer by leasing employees to the employer.

The organization that typically gives protection from potential coemployment situations is the temporary staffing firms.

Read related link on:

https://brainly.com/question/25747300

An information of a 500GB is transferred at the speed of 10MB/s. Calculate the full time the information will be transfer.

Answers

Answer:

50,000 seconds

Explanation:

First multiply 500GB into 1000.(*1GB is equal to 1000MB so were going to multiply it so that we can get the exact MB) and we will get 500,000 MB. Then let's divide it by 10.(*since 10MB can be transfer in just one second.) and we will get 50,000 SECONDS.

Hope it can help you lovelots

What are software applications?

Answers

Answer:

the first option is obviously the correct answer

. A binary search has a right subtree but no left subtree. What noes contains that least element in the tree

Answers

The root node will contain the smallest element

vA student found a book on the library bookshelf last week, and recorded the source information.

Book title: My Traitor’s Heart Author: Rian Malan

Publication date: 1990 Publisher: Bodley Head Publication city: London

Use the drop-down menus to indicate how the student should format this source on a works-cited list.


My Traitor’s Heart.
London:

Answers

Answer:

3,1,2,1

Explanation:

got it right on edge

have a nice day

:)

Answer:

1. Malan, Rian

2. London:

3. Bodley Head, 1990

4. Print

Explanation:

did it

Hi! ❤️ , im looking for some help here. ill give brainliest if able to.

Answers

Answer:

I think the answer is 2

Explanation:

since your trying to search for the temperature in a specific area in New York

what is the full meaning of the following acronyms:ARPANET, BOOTP, GSM, GUI, EOM, EULA, CTSS. ​

Answers

Answer:

ARPANET: Advanced Research Projects Agency Network

BOOTP: Bootstrap Protocol

GSM: Global System for Mobiles

GUI: graphical user interface

EOM: Enterprise Output Management

EULA: end-user license agreement

CTSS: The Compatible Time Sharing System

Explanation:

BEFORE GOING FOWARD KNOW THAT I DO NOT OWN THESE TEXTS.

GSM= a standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by mobile devices such as mobile phones and tablets.

ARPANET=the first public packet-switched computer network. It was first used in 1969 and finally decommissioned in 1989. ... Many of the protocols used by computer networks today were developed for ARPANET, and it is considered the forerunner of the modern internet.

BOOTP= is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.

GUI= A graphics-based operating system interface that uses icons, menus and a mouse (to click on the icon or pull down the menus) to manage interaction with the system.

EOM= refers to the process by which enterprise organizations manage, format and distribute data created from operational applications.

EULA= An end-user license agreement (EULA) is a license that gives a user the right to use a software application in some manner. EULAs are designed to enforce specific software use limitations, such as only using the software on one computer.

CTSS=services for children who require varying therapeutic and rehabilitative levels of intervention to address conditions of mental illness or emotional disturbance that impair and interfere with development and functioning. overcome deficits or maladaptive skills acquired over the course of a psychiatric illness.

Devices on one network can communicate with devices on another network via,
1)Multiplexer
2)Printer
3)Router
4)Hub

Answers

It is option 4 a hub cuz that is what it is used for

Answer:

3

Explanation:

Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?

Answers

Tableau is said to mainly connects to Excel spreadsheets to make data analysis fast and easy. What Gilbert have to do to bring the spreadsheet into Tableau is that He is to connect to an outside data source.

Tableau is often used as a form of connection to Excel spreadsheets so as the data analysis very simple.

It gives room for Excel users to keep their spreadsheets even when they are polishing their ability to analyze their data, while giving simple to build, simple to read visualizations that shows information boldly.

See full question below

Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?

Select an answer:

A. He moved the Excel spreadsheet onto the Tableau server, and then opened it in Tableau.

B. He connected to an outside data source.

C. He dragged and dropped the file into Tableau.

He duplicated the data in Tableau.

Learn more from

https://brainly.com/question/22908883

Where to store
ammunition

Answers

In gun shops of course. and in basements

The operating system called Windows 7 is typically used for _____ a. Laptop computers b. Super computer c. All of the options d. Desktop computers​

Answers

Answer:

all of these

Explanation:

,,,,,,,,,,,,,,,,

The operating system called Windows 7 is typically used for C All of these.

An operating system simply means a collection of programs that is vital for coordinating the operations of the computer software and hardware.

It should be noted that the operating system called Windows 7 is typically used for laptop computers, super computer, and desktop computers.

Therefore, the correct option is All of these.

Read related link on:

https://brainly.com/question/17252990

write a Assembly Language program that copies only unsigned numbers from Array1 to another Array2. The Array1 has both signed and unsigned numbers.
Array1 = { -4,-1,-2,-1,0,1,2,3,4 }

Answers

Unsigned numbers do not have preceeding positive or negative signs. Hence, the program written in python 3 copies unsigned values in the given array to another array thus :

array1 = {-4,-1,-2,-1,0,1,2,3,4 }

#assigns a set of values to array 1

array2 = set()

#initialize an empty array

for ele in array1 :

#loop through the values in array1

if ele >= 0 :

#since the signed values are negative, checks for values greater than or equal to 0

array2.add(ele)

#add to array 2

print(array2)

A sample run of the program is attached.

Learn more : https://brainly.com/question/25706522

philip was required to conduct training on the use of new computer systems in his company. explain two training methods that could have used.​

Answers

Instructor-led training.

eLearning.

Simulation employee training.

Hands-on training.

Coaching or mentoring.

Lectures.

Group discussion and activities.

Role-playing.

Other Questions
Select all the equations that can represent the question: "How many groups of 45 are in 1?"?1=45?45=1451=?145=?145=? Federal loans are from i need geometry help... Explain why a tiny 1.5 V cell can operate a calculator for a year, while a much larger 1.5 V cell burns out in a few hours in a tiny robot. I WILL CHOOSE BRAINIEST!! PLEASE HELP In Vietnam War,----- vs the French army?help There are no transition elements between the Group 2 element magnesium and theGroup 3 element aluminium.Give a reason why, in terms of electronic structure. cuales son la caracteristicas de la obra dramaica Select the correct answer from each drop-down menu.The blank1 united blank 2 related to the development of blank 3Blank 1 1Department of Transportation 2Department of State 3Department of Education 4Department of EnergyBlank 2 1energy and education programs 2energy and defense programs 3energy and homeland security programs4energy and environmental programsBlank 31the atomic bomb 2climate change 3national security 4space travel which of the milankovitch cycles has the biggest impact on climate? Which sentence correctly fixesthis dangling modifier?Riding a tour bus, ancient ruins wereseen.A. Ancient ruins were seen, riding a tour bus.B. While riding on a tour bus, we saw some ancient ruins.C. Ancient ruins, riding a tour bus, were seen. Riley and Rhoda plan to buy several bags of dog food and a dog collar. each bag of food cost $7, and the dog collar cost $5. Which economic system is supported by this passages main argument?mixed market economy traditional economy closed economy command economy 4. _______ talk like that. *A. DontB. BeC. DoesntD. Arent5. _____ they speak Korean? *A. AreB. DoesC. IsD. Do6. They _________ baseball *A. dont playB. doesnt playC. arent playD. not play7. When _________________ lunch? *A. you usually eatB. do you usually eatC. do usually you eatD. do you eat usually !PLEASE HELP!match each word to the right place Sally laughs every time the bell rings.The bell rang twice yesterday.Conclusion:Sally laughed only twice yesterday.If the assumptions are true, is the conclusion:Correct Incorrect Cannot be determined based on the information available Rough DraftUse this section to plan what you will write in the letter.Data Analysis Plant ranking: i need 7 sentences this is really important need it now i will give brainliest How do the leadership qualities of Jewish historical figures help shape the development of religions and society? How does groundwater become polluted? a. Pollutants mixed with water pass through permeable layers above the aquifer. B. Factories dump their waste directly into aquifers. C. Refuse infiltrates the water table when garbage is dumped. D. All of the above Please select the best answer from the choices provided A B C D. dentify the parts of the atom that are labeled in the diagram. Identify the true statements about surface tension.