The use of computer systems to distribute potentially harmful information is called:
A) Propaganda
B) Cyber security
C) Computer fraud
D) Industrial espionage

Answers

Answer 1

Answer:

cyber security I think that is what it is

Explanation:

m

Answer 2

A cyber security is the distribution of malware and other server attack that are aimed at destroying the integrity of the system and is also called as the information compromise.

There are various tools and techniques that can be used to protect and save from such harmful attacks. Other attacks include cyber fraud and are done to distribute the harmful information.

Hence the option B is correct,

Learn more about the computer systems to distribute potentially.

brainly.com/question/25705570.


Related Questions

cats do not eat tomatoes.scat is a cat.therefore ,scat does not eat tomatoes.

Answers

What does this mean??

how do the peograms on a computer work

Answers

Answer: Computer programs work by telling the CPU to use input in a given way, manipulate it in another way, and then present the results as wanted. As you type in the words that you wish to, for example, add, the calculator program tells the processor to display them on your computer's screen.

Explanation:

What is the name of the type of keyboard that contains a coiled spring and a rocker, and provides both tactile and audible feedback.

Answers

Answer:

Buckling Spring

Bob has been asked to do research into increasing the accuracy in identifying rogue APs in his enterprise. Which rogue AP system detection probe will allow his company's IT department to monitor the airwaves for traffic, scan and record wireless signals within its range (even when the device is idle or not receiving any transmission), and then report this information to a centralized database

Answers

Considering the situation described above, the rogue AP system detection probe that will allow Bob's company's IT department to monitor the airwaves for traffic, amongst others, is Wireless Device Probe.

This is because the Wireless Device Probe possesses a WiFi interface that occasionally produces a wireless probe procedure through the effective transmission of a control frame.

This process is often referred to as 'probe request''.

The purpose of Wireless Device Probe is to ensure that closer wireless access points transmit information about wireless networks that are accessible for connection.

Hence, in this case, it is concluded that the correct answer is "Wireless Device Probe."

Learn more here: https://brainly.com/question/10249897

PLEASE HELP! WILL MARK AS BRAINLIEST!
JavaScript can be implemented using the _________ HTML tags in a web page.

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the HTML tag

Explanation:

Answer:

statements placed within script tags

Explanation:

quadratic equation 4

Answers

In algebra, a quadratic equation is any equation that can be rearranged in standard form as ax^{2}+bx+c=0 where x represents an unknown, and a, b, and c represent known numbers, where a ≠ 0. If a = 0, then the equation is linear, not quadratic, as there is no ax^2 term.

HOPE IT HELPS:)

The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addresses.

Answers

Answer:

url

Explanation:

Which of the statements indicates that Shane & Co. is an ethical organization?
Shane & Co. deal in manufacturing plastic cups. Despite three years of operations, they haven’t been able to even break even. The irate investors are eagerly waiting for the next financial report that is due. Shane & Co. can manipulate the figures to show growth, however they choose to display the facts as it is. They are sure to lose some of the investors on board but are willing to take the risk.
Shane & Co. deal in manufacturing plastic cups
Despite three years of operations, they haven’t been able to even break even
Shane & Co. can manipulate the figures to show growth
however they choose to display the facts as it is
They are sure to lose some of the investors on board
but are willing to take the risk

Answers

Answer:

however they choose to display the facts as it isbut are willing to take the risk

When a program unit refers to other database objects, the program unit is considered dependent on that object.

Answers

It is true that a program unit is dependent on a database object when the program unit refers to a database object

A program unit may or may not have dependency.

However, when a program unit have a dependency, the program unit will make reference to its dependency which is sometimes a database object.

Without the database object, the program would either crash or not perform as expected.

Hence, the given statement is true.

Read more about program dependency at:

https://brainly.com/question/12696037

You have a server with Windows Server 2016 installed on Disk 0, a basic disk. You're using the server to store users' documents. You have two more disks that you can install in the server. What should you do if you want to provide fault tolerance for users' documents

Answers

Answer:

Convert the new disks to GPT. Create a spanned volume using Disk 1 and Disk 2.

Explanation:

What are software applications?
lines of code that were written by developers
devices that you insert into the computer
files that are stored on the computer

Answers

Answer:

the person above is correct if i were you id take notes!

Explanation:

Answer:

Only A (Top answer)

Explanation:

Files do not create any software alltogether and devices pluged in are not considered software.

where is the flash drive listed in a windows 7 save as dialog box?

Answers

Answer:

In the left pane below Computer.

Explanation:

A data dictionary is also known as ________. Group of answer choices a data warehouse clickstream data a data mart ubiquitous computing a metadata repository

Answers

Answer:

A data dictionary is also known as metadata repository.

code hs spell it out 7.2.6

Answers

what do you mean can you say it more clear?

The programming question requires that we write a function that takes a string and returns every character in it but the first character.

The function in Python, where comments are used to explain each line is as follows:

#This defines the function

def end_of_word(myStr):

   #This returns every character in the string except the first

   return myStr[1:]

Read more about Python functions at:

https://brainly.com/question/13795586

With ______ voice mail, users can view message details, and in some cases read message contents without listening to them.

Answers

Answer:

Your answer is...

Visual.

With visual voicemail, users can view message details, and in some cases read message contents without listening to them.

I hope this helped at all.

Which would a student most likely do in a digital laboratory? conduct an experiment in chemistry take continuing education classes in chemistry look for an out-of-print book about chemistry watch an instructional video about chemistry.

Answers

Answer:

conduct an experiment in chemistry

Explanation:

A digital laboratory is an interactive online tool, where students are asked to mimic an experiment.

Answer:

"conduct an experiment in chemistry"

Explanation:

A digital laboratory is an online tool used to conduct chemistry experiments when, say, you are at home or the tools needed are dangerous. It also helps to make sure you have exact results since it is computerized.

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

how do you play pokemon go

Answers

Download the app and make an account hope this helps!

Answer:

download the app then tap your screen for the rest of your life

(And I'm being serious)

You have been asked to store a file with personal information on it. You need to be sure that only your user account can access the file, even if other user account have been granted permissions or if the disk is stolen. What standard NTFS feature can you use

Answers

Answer:

EFS

Explanation:

Learning Objectives:

• understand when to use the different

print statements

• create a variable and assign it a value

• use Scanner to read in user input

• print the value of a variable using

printf




Output:

US state: Texas

Capital: Austin

The capital of Texas is Austin

Description:

Copy and paste the code below:

/*******************************************************

* Name:

* Assignment: A01

*******************************************************/


public class A01{


public static void main(String[] args){

// part1

System.out.print("x x x");

System.out.print("x o x");

System.out.print("x x x");

System.out.println();


// part2


}

}


Write your name in the comment on top. The red letters in the output are the user inputs.

This assignment consists of 2 parts.

First you demonstrate your understanding of the different print statements by modifying a

code segment. Then you read in two Strings and print a statement based on the user input.


Part1:

The code segment provided includes

three print statements that produce

the following output:


Change the code segment so that it

produces the following output:


Hint: you will need to change the number of

statements


Part2:

• Prompt the user to enter a state

• Read in the user response and assign

it to a String variable named state

Hint: before you can assign a value to the

variable state it needs to be declared

• Prompt the user to enter the name of

the capital

• Read in the user response and assign

it to a String variable named capital.

• Use printf and format specifiers to

print the following message:

The capital of state is capital

where you substitute state and capital with

the state and capital entered by the user.

Make your output look exactly like the output displayed above.

Make sure to read in the input next to the prompt but without touching it (use a blank to

separate the prompt from the user input). The output should use a single empty line to

separate the frog displayed in part1 from the output created in part2.

Answers

Answer:

take out the cord than put it back in than it shall work

what allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems?

Answers

connections, allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems. They do not entirely eliminate information redundancy, but they do ensure information consistency among multiple systems.

Helpppp adapppppopppppp

Answers

Explanation:

(A) trust me I'm computer hecker experts

What are the revised versions of water grinding mill and horse cart

Answers

What are the revised versions of water grinding mill and horse cart

ANSWER

A watermill or water mill is a mill that uses hydropower.

It is a structure that uses a water wheel or water turbine to drive a mechanical process such as milling (grinding), rolling, or hammering. Such processes are needed in the production of many material goods, including flour, lumber, paper, textiles, and many metal products.

These watermills may comprise gristmills, sawmills, paper mills, textile mills, hammermills, trip hammering mills, rolling mills, wire drawing mills.

jessica has connected her new printer to her windows 10 computer, but windows is not recognizing it. what should she do?

Answers

reconnect the printer or you could  Explanation:

If Windows 10 is not recognizing Jessica's new printer, she should take the following steps:

Check the physical connections: Ensure that the printer is properly connected to the computer via a USB cable or a network connection.

The Steps to take

Restart both devices: Restart the computer and the printer to refresh the system and establish a new connection.

Update printer drivers: Visit the printer manufacturer's website and download the latest drivers specific to her printer model. Install the drivers on the computer.

Run the printer troubleshooter: Go to the Windows settings, select "Update & Security," then "Troubleshoot." Choose "Printer" and follow the on-screen instructions to diagnose and fix any issues.

Read more about printers here:

https://brainly.com/question/31051187

#SPJ2

An Internet address is a unique binary number assigned to a host and used for all communication with the host. Group of answer choices True False

Answers

Answer:

the correct answer is true

PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

which one of the following is not a barrier to effective communication?
A physical barrier
B linguistic barriers
C interpersonal barriers
D subjective barrier​

Answers

answer correct:B. ,,,,,,,,,,,,,,,,,,,

The option that is not a barrier to effective communication is D. subjective barrier.

It should be noted that barriers to communication simply means the impediments that can affect effective communication.

Some of the barriers to communication include physical barrier, linguistic barriers, and interpersonal barriers. It should be noted that a subjective barrier isn't a barrier.

Read related link on:

https://brainly.com/question/25718682

A(n) ________ is a wonder of miniaturization combining a CPU, GPU, and sundry other support logic onto a single silicon die, saving a lot of space and power in the process.

Answers

Answer:

system on a chip (SoC)

Explanation:

URGENT The HTML tag of a table cell content is

A. True
B. False

Answers

true ! its correct - have a great day

Give a brief explanation about the internet.plsssss

Answers

Answer:

The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.

Explanation:

INTERNET is a short form of Interconnected Network of all the Web Servers Worldwide. It is also called the World Wide Web or simply the Web.

Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).

Answers

Sandbox. ... Real-time strategy (RTS) ... Shooter (FPS and TPS) ... Multiplayer online battle arena (MOBA) ... Role-playing games (RPG, ARPG, and more) ... Simulation and sports.

- BRAINLIEST answerer

Lol yeah I agree w the person above, I don’t wanna copy
Other Questions
Line /1 and line /2 are parallel line The rectangle below has an area of 55x^6+22x^455x 6 +22x 4 55, x, start superscript, 6, end superscript, plus, 22, x, start superscript, 4, end superscript. The width of the rectangle is equal to the greatest common monomial factor of 55x^655x 6 55, x, start superscript, 6, end superscript and 22x^422x 4 22, x, start superscript, 4, end superscript. What is the length and width of the rectangle? 14/15 + 8/15 + 4/5 please help A group of friends is sharing 2 pounds of berries If each friend received 5/4 of a pound how many friends are sharing the berries Which answer means nearly the same thing as forestall?head offrejecttone downpreview mixture7. Explain the following: All compounds are substances,but not all substances are compounds." Photosynthesis (Where does the electron that is excited by light is taken). What is the source of the electron, where does it end up? I would really like help Which of the following statements is most correct? Select one: a. Other things equal, the higher the dividends, the lower the stock price. b. Other things equal, the investment holding period does not affect the stock price. c. Other things equal, the higher the required rate of return, the higher the stock price. d. Other things equal, the higher the dividend growth rate, the lower the stock price. e. Other things equal, the lower the market value of debt, the lower the value of equity. determine x+3 is a factor of P(x)=-2x^3-4x^2-7 How do lenses correct vision?A.) They bend the cornea.B.) They reflect light away from the retina.C.) They reflect light towards the retina.D.) They bend light so that it focuses on the retina. What equipment is generally used to make lyophilized medications suitable for administering to the patient? a) Test tubes or sterile ampules b) Petri dishes and sterile droppers c) Sterile... What is the characteristic of tropical rainforest? I need help its past dude pleaseeeee. What kind is a utility file that shrinks the size of a file As a child psychologist, you are seeing Martin for the first time today. He presents with irritability, has a difficult time sitting still, interrupts both his parents and you during conversation, and cannot focus. It is most likely that Martin suffers from Substance A has 2% alcohol mixture, and substance B has 6% alcohol mixture. To mix substance A and B for a capacity of 60 liters with 3.2% alcohol mixture, how many liters of substance A and B are used each? How did the electronic dissemination of information begin to alter the "the information-action ratio". Soybeans were first cultivated in East Asia in the 1600s. T F How do I get a percentage of a number