List 2 negative impacts of cybersecurity.



Answer and I will give you brainiliest ​

Answers

Answer 1

Answer:

Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.


Related Questions

Writing a function that implements a loop to collect a set amount of data. The function should use the serial object, the recording time, and the iteration (city number) as input arguments and return an N x 2 array with the time in the first column and the recorded light level in the second. (4 pts). Include in this function outputs to the Command Window noting the starting and stopping of the recording.

Answers

You can still go on a date with you if I get a text from my friend that is in a relationship and you don’t know why

PLZ HELP

Select the correct answer.
Jack is part of the software quality assurance team in a company. Which activity should Jack perform as a part of software quality assurance?
A.
billing
B.
recruiting
C.
testing
D.
installing
E.
accounting

Answers

Answer:

E. accounting

Explanation:

just bare with me

Answer:D SORRY IF IM WRONG

Explanation:

PLS DONT HATE

Franklin gave a presentation without any help from others. He didn't smile, and he looked at the floor during the presentation. What could Franklin have done to improve his presentation?
a Added more images to his slides to add engagement
b Asked for someone else to do the research for him
c Practiced in front of a trusted adult and asked for feedback
d Read the information right from the slides

Answers

Answer:

C. Practiced in front of a trusted adult..

Answer:

Practiced in front of a trusted adult and asked for feedback

Explanation:

Write a Python function that takes as input a list, A, and returns two lists L and G. L constains all numbers in A, which are not A[0] and are less than or equal to A[0]. G contains all numbers in A, which are not A[0], and are greater than A[0].

Answers

Answer:

In Python:

def split(A):

   L=[]; G=[]

   for i in range(1,len(A)):

       if (A[i] != A[0] and A[i] < A[0]):

           L.append(A[i])

       if (A[i] != A[0] and A[i] > A[0]):

           G.append(A[i])

   return L, G

Explanation:

This defines the function

def split(A):

This initializes the L and G lists

   L=[]; G=[]

This iterates through the original list A

   for i in range(1,len(A)):

This populates list L using the stated condition

       if (A[i] != A[0] and A[i] < A[0]):

           L.append(A[i])

This populates list G using the stated condition

       if (A[i] != A[0] and A[i] > A[0]):

           G.append(A[i])

This returns the two lists L and G

   return L, G

Select the correct answer.
Who takes care of the final layout of the product that meets the standards set by UX designers?
O A web developer
ОВ.
design director
OC. UX designer
OD. UI designer
Reset
Next
Hi

Answers

Answer:

UI designer

Explanation:

Digital computers use a........ system to encode date and programs.

Answers

Answer:

Digital computers use a binary system to encode date and programs.

WHAT DO YOU LEARN IN CODE.ORG​

Answers

Answer:

You learn how to animate and make websites

Explanation:

how to make websites and code/program games!!

Let's talk about this cryptocurrency: Vechain (VET)​

Answers

Answer:

This is gonna be interesting

How are radio waves used on Earth?

Select ALL that apply
a

Traditional Radio Wave
b

Wireless Internet
c

Cell Phones
d

Light House

Answers

Answer:

A,B,C are the answers it cant be light house because it uses stored electricity which projects light energy

C and d If it’s not late yet. Not sure why they would put A tho kind of through me off

PLZZZ HELP!!!!!!!
Select the correct answer.
Which of these examples best describes unit testing?
A.
The tester finds incorrect functionality on the home page.
B.
The login page does not accept existing user credentials.
C.
There is no database connectivity.
D.
The developer checks the loops in the procedure.
E.
Multiple users slow down the speed of the system.

Answers

Answer: A is the correct choice.

The option that is an example that describes unit testing is the developer checks the loops in the procedure.

What is unit testing?

This type of test is known to be called unit component. It is regarded as a form of a single function or code of any kind of application.

Conclusively, A good example that tells more about unit testing is the when a developer monitors the loops in the procedure so as to see if there is any error or omissions.

Learn more about unit testing  from

https://brainly.com/question/24964187

My teacher just asked, "What did you learn about coding and how can it help u through life." CAN SOMEONE PLZ ANSWER BC I DONT KNOW.​

Answers

Answer:

Coding is becoming a big thing in America because more and more jobs are on the computer, because they future is tech.

Explanation:

i dont know something like tht

Write a program that creates a two-dimensional array initialized with test data. Use any data type you wish. Declare a two-dimensional array of data type char, int, double, or string. Assume the array is declared as follows: const int NUM_ROWS

Answers

Question:

Write a program that creates a two-dimensional array initialized with test data. Use any data type you wish. Declare a two-dimensional array of data type char, int, double, or string. Assume the array is declared as follows:  

const int NUM_ROWS = 3,  NUM_COLUMNS = 5;

test data: [10, 1, 1, 1, 1]  [7, 2, 20, 2, 9] [ 3, 3, 3, 3, 5]

Answer:

The program in C++ is as follows:

#include<iostream>

using namespace std;

int main(){

const int NUM_ROWS = 3, NUM_COLUMNS = 5;

int MyArray[NUM_ROWS][NUM_COLUMNS] = {{10, 1, 1, 1, 1},{7, 2, 20, 2, 9},{3, 3, 3, 3, 5}};

return 0;

}

Explanation:

To answer this question, we make use of the following parameters

Array name: MyArray

Array datatype: integer

The explanation is as follows:

This declares the array dimensions

const int NUM_ROWS = 3,  NUM_COLUMNS = 5;

This declares and initializes the array with the test data

int MyArray[NUM_ROWS][NUM_COLUMNS] = {{10, 1, 1, 1, 1}, {7, 2, 20, 2, 9}, {3, 3, 3, 3, 5}};

Q17. The most commonly used storage device is....
A. Steel
B. Optical
C. Magnetic
D. Flash
Q18. A DVD is an example of a (n).....
A. Hard Disk
B. Optical Disk
C. Output Device
D. Solid-State Storage Device​

Answers

Answer:
Q17. Ans: Magnetic

Q18. Ans: Optical Disk

Explanation:

magnetic storage devices, such as hard disk drives. optical storage devices, such as CD, DVD and Blu-ray discs. solid state storage devices, such as solid state drives and USB memory sticks.

The DVD (common abbreviation for Digital Video Disc or Digital Versatile Disc) is a digital optical disc data storage format

Order the steps for creating and assigning a new task in Outlook 2016.
Choose a task list, and
Open the Task view.
Click Assign Task, and
Complete the task
Click Send.
click New Task
specify the assignee.
information
Intro
Done

Answers

Answer:

Open the task viewChoose a task list and click new taskcomplete the task information click assign task and specify the assigneeclick send

Explanation:

Got it right on edge

Your manager asks you to get details on a computer crash. What Windows Administration Tool could you use?
A. System Information
B. Performance Monitor
C. Windows Memory Diagnostic
D. Event Viewer
E. Log Viewer

Answers

The answer is "Option C" because the WMD is a freeware memory test software that works excellently. It is a comprehensive math question, and it is also quite straightforward to use.They suggest that you first test your ram with Memtest86, but you really should always test a second time with a different memory testing application to be certain.Microsoft Windows Diagnostic is the second tool, that scans your laptop's physical memory & identifies any faults. It requires a reboot to be used the system that will restart, and you'll be unable to your mouse in the Memory Diagnostic Tool.

The wrong choices can be defined as follows:

In option a, it is wrong because the data warehouse transforms data into information that may be used by an organization's decision-making process.In option b, it is wrong because by using Metrics Collector Groups and logging the data, it was able to display real-time market data as well as collect and store data.In option d, it is wrong because this is a tool used in Windows, which displays detailed information about major events that have taken place on your machine.In option e, it is wrong because messages and trace logs could be viewed and sorted using the Log Viewer.

Learn more:

Memory Diagnostic: https://brainly.com/question/13606234

Write a program to display MPH (Miles per Hour). Create a function to calculate the MPH. Ask the user for the number of miles driven and the number of minute it took to drive that many miles. Validate that both the number of miles and the number of minutes is a positive, non-zero number. Pass both the number of miles and the number of minutes to the function, and have the function return the MPH.

Answers

Answer:

In Python:

def MPH(miles,minutes):

   mph = round(60 * miles/minutes,1)

   return mph

   

miles = float(input("Miles: "))

minutes = float(input("Minutes: "))

if miles>0 and minutes>0:

   print("MPH: ",MPH(miles,minutes))

else:

   print("Positive inputs only")

Explanation:

This defines the function

def MPH(miles,minutes):

This calculates mph rounded to 1 decimal place

   mph = round(60 * miles/minutes,1)

This returns the calculated mph

   return mph

The main begins here

This gets input for miles    

miles = float(input("Miles: "))

This gets input for minutes

minutes = float(input("Minutes: "))

If miles and minutes are positive

if miles>0 and minutes>0:

This calls the MPH function

   print("MPH: ",MPH(miles,minutes))

If otherwise, this prompts the user for positive inputs

else:

   print("Positive inputs only")

A customer opened a file attachment, and now her PC is infected with ransomware. She's unable to open any of her files. Which action would you take first?
A. Reinstall the operating system
B. Run an antivirus scan
C. Pay the ransom to recover the data
D. Disconnect the PC from the network
E. Restore files from backup

Answers

Answer:

D. Disconnect the PC from the network

Explanation:

I'd say this because it keeps the ransomware from spreading to other computers making it a bigger problem.

In this question, the answer is "Option D", which disconnects the PC from the network, which can be defined as follows:

A customer's PC has been attacked using ransomware after she opened a document file. She has been unable to access any of her files. She first had to detach the PC from the system to access the file.This type of malicious software (malware) threatens to publish or prevent information or computer access until the victim pays a ransom price to the attacker. Today, ransomware assaults are all too frequent. This attacker then demands a ransom from the victim, promising to restore access to the information in exchange for payment.

The wrong option can be defined as follows:

In option a, it is wrong because when we reinstalling the OS is used to start the fresh without using the old files.In option b, it is wrong because the antivirus can't protect the ransomware maliciously. In option c, it is wrong because when a corporation can pay the ransom, their cash is dispersed across the dark web.In option e, it is wrong because creating copies of information could be recovered in the event of a primary information failure.

Learn more:

Ransomware: brainly.com/question/14455233

For questions 3-6, consider the following two-dimensional array:

undervalue

will

knitting

pretzel

realize

honey

planetary

bandana

iron

employment

effort

fabric


What word is in [0][1] ?


Flag this Question
Question 41 pts
What word is in [1][1] ?

Flag this Question
Question 5
What word is in [3][2] ?

Flag this Question
Question 6
What word is in [2][1] ?

Answers

Answer:

3. Will

4. Realize

5. Fabric

6. Bandana

Realize is in is in [1][1], Fabric is in [3][2], Bandana is in [2][1] . Arrays inside of arrays are what are known as two-dimensional arrays.

What is two-dimensional array?

Arrays inside of arrays are what are known as two-dimensional arrays. 2D arrays, which are made up of rows and columns, are constructed as metrics. To create a database that resembles the data structure, 2D arrays are frequently used.

You may store a large amount of data using 2d arrays at once, which can then be supplied to as many different functions as necessary. Two indices are used to refer to the position of the data element in two-dimensional or multi-dimensional arrays. Row and column are the two dimensions indicated by the name. Realize is in is in [1][1], Fabric is in [3][2], Bandana is in [2][1] .

Therefore, realize is in is in [1][1], Fabric is in [3][2], Bandana is in [2][1].

To know more about two-dimensional array, here:

https://brainly.com/question/30463245

#SPJ3

Return the appropriate part of FizzBuzz This is a small part of a classic software engineering interview question. fizz_buzz_check takes a single integer argument, number. Complete the function such that it returns a value using the following rules: If the number is divisible by 3 (i.e division by 3 has a remainder of 0), return the string Fizz. If it is divisible by five, return the string Buzz. If it is divisible by 3 AND 5, return FizzBuzz. Otherwise, just return the original argument back without any changes.

Answers

Answer:

The function in Python:

def fizz_buzz_check(num):

   if num%3 == 0:

       result = "Fizz"

   if num%5 == 0:

       result = "Buzz"

   if num%3 == 0 and num%5 == 0:

       result = "FizzBuzz"

   if num%3 != 0 and num%5 != 0:

       result = num

   return result

Explanation:

The function to complete is not given. So, I write a new function from scratch.

This defines the function

def fizz_buzz_check(num):

This checks if num is divisible by 3

   if num%3 == 0:

If yes, the returned value is stored as "Fizz"

       result = "Fizz"

This checks if num is divisible by 5

   if num%5 == 0:

If yes, the returned value is stored as "Buzz"

       result = "Buzz"

This checks if num is divisible by 3 and 5

   if num%3 == 0 and num%5 == 0:

If yes, the returned value is stored as "FizzBuzz"

       result = "FizzBuzz"

This checks if num is not divisible by 3 and by 5

   if num%3 != 0 and num%5 != 0:

If yes, the returned value is stored as the initial argument

       result = num

This returns the appropriate value

   return result

NO LINKS
Do you need to pay monthly to stream on Twitch?

Answers

I think so yeah $$$$

You want to change your cell phone plan and call the company to discuss options

Answers

And? What’s the point? The question?

How can you get feedback on your presentation from someone who is far away?
a Email your PowerPoint notes to the person.
b Explain your topic over the phone.
c Record your presentation and send it to them.
d Send them your PowerPoint slides.

Answers

Answer:

C. Record your presentation...

I think this because if you want feedback you would definetly talk and record your presentation so the person can give you a clear response

it’s C it makes sense

⚠️⚠️⚠️⚠️⚠️⚠️Help! What is not an advantage of using virtual machines?
You can run multiple operating systems on one physical machine.

It doesn’t take up any storage space on the physical machine.

You can save the entire state of a VM to your files.

Provides fault and security isolation for the computer’s hardware

Answers

Answer:

It doesn’t take up any storage space on the physical machine.

Explanation:

The virtual machine does take up some storage space on the physical machine.

The ribbon in Excel is a
tab based user interface.
True
False

Answers

Answer:

Explanation:

This should help i think it is true just read this first "Like any other application, Excel has a basic workspace called the user interface. ... The Ribbon is the name given to the row of tabs and buttons you see at the top of Excel. The Ribbon's tabs and buttons bring your favorite commands into the open by showing multiple commands grouped in specific categories."

Answer:

True

Explanation:

Mattias's friend asked him to critique his presentation about gorillas. Mattias noticed that there weren't any images of gorillas. What feedback can Mattias give to improve his friend's presentation?
a I like your title, but did you not think to add pictures of gorillas?
b It's ok, but it would be better if I just added pictures to your presentation.
c Really great information, but I think adding a picture of a gorilla would be great.
d You're missing a gorilla picture. Add one.

Answers

Answer:

c

Explanation:

Answer:B

Really great information, but I think adding a picture of a gorilla would be great.

Explanation:

Mattias's friend asked him to critique his presentation about gorillas. Mattias noticed that there weren't any images of gorillas. What feedback can Mattias give to improve his friend's presentation?

Group of answer choices

A)You're missing a gorilla picture. Add one.

B)Really great information, but I think adding a picture of a gorilla would be great.

C)I like your title, but did you not think to add pictures of gorillas?

D)It's ok, but it would be better if I just added pictures to your presentation.

NEED HELP ASAP! Which field best organizes street addresses in a database?
A. Name
B. Address
C. Phone

Answers

The best one is name

Jerry purchased 25 dozens of eggs. He used 6 eggs to bake 1 cake. How
many similar cakes can Jerry bake with the number of eggs he purchased?​

Answers

Answer:

50

Explanation:

He bought 25 dozens of eggs:

25 (12) = 300

He used 6 eggs to make 1 cake, so:

300 eggs/6 eggs per cake = 50 cakes

HELP! WILL GIVE BRANLIESt!

Answers

Answer:

36:12, 36/12, 3/1

Explanation:

I’ve never solved a problem like this but mathematically this answer makes sense

PLEASEE HELPP.... QUESTION... how does coding impact your life​

Answers

Answer: It allows us to do everyday tasks on the internet

Explanation: We wouldn’t be able to email, research, etc without coding!

It helps us use things such as the internet, TVs and many other things coding is a Vidal asset in are everyday life.

Why data mining is crucial for the success of a business, explain with examples

Answers

Answer:

For businesses, data mining is used to discover patterns and relationships in the data in order to help make better business decisions. Data mining can help spot sales trends, develop smarter marketing campaigns, and accurately predict customer loyalty.

Other Questions
Please Help I Will Mark Branliest What is a strategy for dividing 428 by 107? quincy has $37 in a savings account Kelly tried to solve the following equation, what were the philosophical roots of the declaration of independence three friends are buying seashells at the gift shop on the beach. Melanie buys 2 seashells for $0.80 Please help me with algebra!! What do you think of Hulga's conviction that intelligence and education are incompatible with religious faith? Karen has two dogs. The larger dog weighs 1.4 pounds more than thesmaller dog. The combined weight of the two dogs is 12.6 pounds. What isthe weight, in pounds, of the smaller dog? Only type in a numericresponse. Find f( -7) if f(x) = 3 - 2x.A)-24B)-11C)17D)23 I will give a brainlist for this The terms of the Treaty of Guadalupe Hidalgo stated that MexicoQuestion 12 options:a) had lost the Mexican War.b) had won the Mexican War.c) had reached a stalemate.d) would try to recover Texas. a. is the value of the expression (1/4 ^-3)^-2 greater than 1 equal to 1 or less than 1b. if the value of the expression is greater than 1 show how you can change one sign to make the value less than 1, show how you can change one sign to make the value greater than 1 if the value is equal to 1 show how you can make one change to make the value not equal to 1 please I need an answer quick ._. -Cmo ___?-As-as. Y t?Which form of ser or estar is needed based on the context 10 reglas de un hospital con los modal verbos Please help me solve this problem The Case of ...also staysThe BurglarWho Was BittenThe Kings own a small store in a crime-riddensection of town. They have been the victims ofbreak-ins in the past. To protect their familyand store, they purchase a guard dog. Thedog is trained to attack on command. The dogin the store from 11 P.M. to 7 AM,while the store is closed. One night, a personbreaks into the store and is attacked by thedog. The police catch the person, and he isconvicted of burglary. After the judge giveshim a suspended sentence, the burglar suesthe Kings for the injuries caused by the guarddog. Can someone write two cross questions for the burglar. Im defending him. Rotate rectangle ABCD 90 degrees clockwise about the origin. What are the new coordinates? which aesthetic element is depicted in the above image? Which phrase is characteristic of Muslim art? select all that applyA. oil portraits of MuhammadB. large paintings in mosques of religious figuresC. carpets with elaborate designs and patternsD. intricate patterns of calligraphy I need help with this.