How can use of the Internet potentially be a security issue?

Programs, such as spyware, are mistakenly accessed by visiting an infected
website.
Individuals called viruses attempt to secretly enter another computer to harm it.
Phishing attempts to get someone's personal data with fake emails and social
media requests.
Unwanted software called hackers can transmit personal data from a computer.

Answers

Answer 1

Answer:

Unwanted software called hackers can transmit personal data from a computer.

Explanation:

The other options mention "attempt" meaning it hasn't happened yet. So I'm going to assume the last one is right. I'm not 100%


Related Questions

PLS HELP In VPython, finish the code to draw a horizontal axis.

origin = vector (0, 0, 0)
axis = cylinder(pos=origin, axis=vector(________)

options are (50, 0, 0), (0, 50, 0) and (0, 0, 50)
its NOT (0, 50, 0)

Answers

Use the knowledge in computational language in python to write a code that draw a horizontal axis with vectors.

How to define vectors in Python?

In Python it is possible to define a vector with characters, forming a word, that is, a string of characters, which is abbreviated as "string". To do this, you can assign it as a constant or read the data as a word.

So in an easier way we have that the code is:

mybox = box(pos=vector(x0,y0,z0),

           axis=vector(a,b,c)

length=L,

height=H,

width=W,

up=vector(q,r,s))

See more about python at brainly.com/question/18502436

Sorry for being late, but the answer is...

50, 0, 0

PROOF:

What is the binary of the following numbers
10
6
22
12

Answers

You can use this table to help you!

Answer:

10 = 00001010

6 = 00000110

22 = 00010110

12 = 00001100

Try it
Which phrases best describe plagiarism? Check all that apply.
presenting someone else's words as if they were your own
using someone else's idea without giving him or her credit
quoting and citing information as a reference or source
using an idea you found online and claiming it as your own
presenting your own original ideas

Answers

Answer:

Using Someone else's idea without giving him or her credit

Explanation:

In My Opinion

Answer:

124 :)

Explanation:

What is Word's default color for highlighting text?
O orange
O gray
O yellow
O blue

Answers

Answer:

Yellow.

Explanation:

Yellow is typically the color but you can always manually change it.

Answer:

yellow

Explanation:

On the home tab of the ribbon the default color for highlighting text and tool is yellow

Look at the lines that say health, dental, and retirement which statement below is accurate

Answers

The statement that is accurate is that Those lines represent insurance and retirement plans that Hope funds directly from her paycheck.

What is a retirement plan?

A retirement plan is known to be a type of plan that has been set up to take handle all the needs of a post-retirement days.

This was designed to help a person have a stress-free life. A retirement savings plan is one that helps to  your money to grow and care for your  life.

See full question below

Look at the lines that say HEALTH, DENTAL, and RETIREMENT. Which statement below is accurate? Those lines represent taxes that Hope paid to the Federal government b. Those lines represent taxes that Hope paid to the state government Those lines represent benefits that the employer is paying to Hope in addition to her wages d. Those lines represent insurance and retirement plans that Hope funds directly from her paycheck

Learn more about  retirement plans from

https://brainly.com/question/12143528

Explain the main concept of Artificial Neural networks (ANN) as a set of layers that starts with an input layer that has sensors and the output layer that gives the predicted result (predictions) with hidden layers in between based on the ANN architecture and its specific type of application Knowledge One Individual Practical Assignment

Answers

Artificial Neural networks is a computational tool that is made up of a let of processing elements that takes in inputs and deliver outputs using a predefined activation codes.

What are the layers in an artificial neural network?

There are 3 Artificial olfactory sense and recognition system that are found in ANN.  It is made up of:

An input layer.An Hidden layer.An Output layer.

Note that these layers above help to tell more about the Artificial Neural networks (ANN).

Learn more about  Artificial Neural networks (ANN) from

https://brainly.com/question/25653113

9.3 code practice

Write a program that creates a 4 x 5 array called numbers. The elements in your array should all be random numbers between -30 and 30, inclusive. Then, print the array as a grid.

For instance, the 2 x 2 array [[1,2],[3,4]] as a grid could be printed as:

1 2
3 4
Sample Output
18 -18 10 0 -7
-20 0 17 29 -26
14 20 27 4 19
-14 12 -29 25 28
Note: the numbers generated in your program will not match the sample output, as they will be randomly generated.

pls help

Answers

The program is an illustration of arrays; Arrays are variables that are used to hold multiple values of the same data type

The main program

The program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

#include <cstdlib>

#include <ctime>

using namespace std;

int main(){

   //This declares the array

   int myArray[4][5];

   //This seeds the time

   srand(time(NULL));

   //The following loop generates the array elements

   for(int i = 0; i< 4;i++){

       for(int j = 0; j< 5;j++){

       myArray[i][j] = rand()%(61)-30;

   }    

   }

   //The following loop prints the array elements as grid

   for(int i = 0; i< 4;i++){

       for(int j = 0; j< 5;j++){

       cout<<myArray[i][j]<<" ";

   }    

   cout<<"\n";

   }

   return 0;

}

Read more about arrays at:

https://brainly.com/question/22364342

For each of the following agents, describe all the possible PEAS (Performance, Environment, Actuators, and Sensors) and then identify the environment type. Self-vacuum cleaner  Speech recognition device Drone searching for a missing person Computer playing chess Alexa/Siri performing as a smart personal assistant.​

Answers

The PEAS environment type is a task environment space that is used in the evaluation of performance, the environment, the sensors and the actuators.

How to identify the environment type

For all of the options listed here, the environment types have to be put in tables. The table has been created in the attachment I added.

The use of PEAS helps in the performance of tasks in an independent way.

Read more on performance evaluator here: https://brainly.com/question/3835272

Identify three (3) general-purpose computing devices and write a short (no more
than one page) essay explaining in detail the computing process

Answers

The three (3) general-purpose computing devices used around the world are:

Desktop computersSmartphoneTablet

What is computing?

Computing refers to a process which involves the use of both computer hardware and software to manage, analyze, process, store and transmit data, so as to complete a goal-oriented task.

In Computer technology, a general-purpose computing device is a type of computer that can perform most common computing tasks when provided with the appropriate software application. Thus, three (3) general-purpose computing devices include the following:

Desktop computersSmartphoneTablet

Read more on computing here: https://brainly.com/question/19057393

[ASAP] Choose the tool that best matches each description.

___ is an open-source library that can be used to develop mobile apps in Python, where all of the objects look the same, no matter what platform it is displayed on. In contrast, the ___ library uses native objects, so that applications built with it will look like other apps on that platform.

1. Kivy
2. BeeWare​

Answers

BeeWare​  is an open-source library that can be used to develop mobile apps in Python, where all of the objects look the same, no matter what platform it is displayed on.

What is BeeWare used for?

Others re:

In contrast, the Kivy library uses native objects, so that applications built with it will look like other apps on that platform.

The BeeWare framework is known to be a kind of open-source network that is known to be a reliable Python program that helps  developer with some amount of tools that are used  for coding.

Based on the above,  BeeWare​  is an open-source library that can be used to develop mobile apps in Python, where all of the objects look the same, no matter what platform it is displayed on.

Learn more about library from

https://brainly.com/question/1348481

#SPJ1

Name three things that get information into a computer?​

Answers

Answer:

Input devices do that. Three are the keyboard, a mouse, and a trackball.

Explanation:

A desktop is one kind of computer. Name two other kinds?​

Answers

Answer:

Notebook, supercomputer.

Explanation:

Notebooks are laptops, usually low performance.

Supercomputers are the best performing computers in the world.

Answer:

super computers and mainframe computers

Explanation:

these computers were used way before desktop computers

what is an example of fibre optic cable

Answers

Answer:

printing cable

Explanation:

is a cable used to transfer information from a computer to the printer in packages

what is the name of the extension used to save publisher

Answers

Answer:

PUB

Explanation:

PUB IS THE NAME OF THE EXTENSION USED TO SAVE PUBLISHER

A set of processes and procedures that transform data into information and knowledge is
a.
Computer system
b.
Business system
c.
Database system
d.
Knowledge system
e.
Information system

Answers

Answer:

the answer is information system

A set of processes and procedures that transform data into information and knowledge is an Information system, which is the correct answer that would be an option (D).

What is the information system?

Information system(IS) refers to systematic, social, and technical, organizational systems that obtain, process, store, and distribute information. Information systems are made up of four components from a socio-technological standpoint: task, people, structure (or roles), and technology.

A computer information system is a system that processes or interprets data that is made up of people and computers.

The term is also used in more limited contexts to refer only to the software used to run a computerized database or to refer only to a computer system.

Thus, a set of processes and procedures that transform data into information and knowledge is an Information system.

Hence, the correct answer would be an option (D).

To learn more about the Information system click here:

https://brainly.com/question/28945047

#SPJ2

what seemingly useless item can be of social, ecological or commercial value?

Answers

Earrings. They do nothing practical, but they provide social value by making you look more attractive.

Some seemingly useless item can be of social, ecological or commercial value is money, behavior, death etc.

What is something really useless?

A useless item are known to be things that are said to be rubbish.

They are items that is useless, of no value. Some  useless item can be of social, ecological or commercial value is money, behavior, vehicles etc.

Learn more about commercial value from

https://brainly.com/question/25528419

Which programming term describes the value that is passed to a method when called
so that the method knows what to do?
A parameter
An argument
A function
A variable

Answers

The programming term that describes the value that is passed to a method when called so that the method knows what to do is an Argument

What is an  Argument?

An argument in Programming are variables used to specify a value when you want to call a fuhnction which provides the programs utilizing more informathion.

A bettrer understanding is as follows:

create a function, pass in data in the form of an argumentProgram utilizes more information from the value of the argument.

For example

Say you want to create a function that describes how much money you're having; We can use artgument to descriptive as possible.

Before now, the function may have looked like:

string howMuchmoney() {

    return "so much money";

Modifying  the function prototype and implementation to take a string argument, it becomes

string howMuchmoney(string amount);

Change your return statement to:

return amount + "money";

Add a string to the parentheses where you call the function:

howMuchmoney("tons of")

Learn more in using Argument here:https://brainly.com/question/6067168

In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North America. They taxed goods such as sugar and tea and even placed a tax on the printing of documents. These actions angered the colonists, who thought that taxation was unfair since they had no representation in the British government. For this reason, a group of colonists dumped hundreds of chests of tea from Britain into Boston Harbor in 1773, in what became known as the Boston Tea Party. As a result, England passed a series of harsh new laws to punish the colonists, further angering them. The Continental Congress met to voice the colonists' grievances, and eventually, on July 4, 1776, the colonists declared their independence from Britain.

Answers

Answer:

Taxes and other laws imposed on the colonies led the colonists to declare independence from England.

Explanation:

During the British government, laws taxes, and other laws increased in the colonies which led the colonists to declare independence from England.

How colonists declared their independence from Britain?

As a result, the British were forced to deploy a large army in North America on March 22, 1765, the British parliament passed the Stamp Act.

Which aimed to raise money by levying a tax on all legal and official papers and publications that were being distributed across the colonies. The Stamp Act angered the American colonists, which moved fast to oppose it.

A direct appeal to Parliament was virtually difficult due to the colony's extreme distance from London, the heart of British politics.

Therefore to raise money and increase taxes and laws colonists declared their independence on 4 July 1776 from Britain.

Learn more about the British government, here:

https://brainly.com/question/2848503

#SPJ5

every CAD application comes with a color menu to help you tailor your selections, mix them properly, and apply them in ways that meet your artistic expectations

true or false

Answers

every CAD application comes with a color menu to help you tailor your selections, mix them properly, and apply them in ways that meet your artistic expectations is a true statement.

What is a color CAD?

In a CAD system, there is found to be colors that are known to be often and  most commonly used to depict line weights.

Note that selecting different colors is easy using varying line thickness. One can then use these colors into layers to smooth the visibility of drawing components that you wants.

Learn more about CAD application  from

https://brainly.com/question/9222927

Answer:true

Explanation:

ICT4AD was meant to modernize the civil service through E-governance implementation.

Explain why you believe that this policy has achieved or not achieved this goal?

Answers

ICT4AD work through E-governance implementation fail as a result of:

Lack of Infrastructure. High cost of running its affairs as it needs  huge public expenditure. Issues with Privacy and Security and others.

What is the aim of e-governance?

The objectives of e-Governance is created so as to lower the level of corruption in the government and to make sure of  fast administration of services and information.

Conclusively, It is known to fail due to the reasons given above and if they are worked on, the service would have prospered.

Learn more about civil service from

https://brainly.com/question/605499

Write a function named count_vowels that accepts two arguments: a string and an empty dictionary. The function should count the number of times each vowel (the letters a, e, i, o, and u) appears in the string, and use the dictionary to store those counts. When the function ends, the dictionary should have exactly 5 elements. In each element, the key will be a vowel (lowercase) and the value will be the number of times the vowel appears in the string. For example, if the string argument is 'Now is the time', the function will store the following elements in the dictionary: 'a': 0 • 'e': 2 'i': 2 'o': 1 'u': 0 The function should not return a value.

Answers

The function that counts the number of times a vowel exist in a string is as follows:

def count_vowels(string, dictionary):

    vowels = 'aeiou'

    dictionary = {}.fromkeys(vowels, 0)

    for i in string:

         if i in vowels:

              dictionary[i] += 1

    return dictionary

print(count_vowels("trouble", {}))

Code explanation.

The code is written in python.

we defined a function named "count_vowels". The function accept a string and an empty dictionary.Then. we store the vowels in a variable vowels.The dictionary is used to store the key value pair i.e the vowels and the number of times they appear.We looped through the string.If any value in the string is in vowels,  we increase the dictionary values by 1.Then, we return the dictionary.Finally, we call the function with it parameters.

learn more on function here: https://brainly.com/question/27219031

6. What are the arguments, pros and cons, for Python's use of indentation to specify compound statements in control statements

Answers

Answer:

[tex]beinggreat78~here~to~help.[/tex]

In some cases, one con is that it can be hard to keep track of your identation when coding long lines or blocks. The pro is that you may need to learn, which is not a bad thing. Learning is good.

Use HTML and CSS, create a web page for the table shown below. Please copy (and paste) your code from your text editor (Replit).



Answers

This is big sorry I can’t do it

A set of activities that performs across the organization creating as output of values to the customer
a.
Business process
b.
Customer process
c.
Quality process
d.
Software process
e.
Integrated process

Answers

the correct answer is A : Business Process

The implementation of mutex locks provided in Section 6.5 suffers from busy waiting. Describe what changes would be necessary so that a process waiting to acquire a mutex lock would be blocked and placed into a waiting queue until the lock became available.

Answers

The changes would be necessary so that a process waiting to acquire a mutex lock would be blocked and placed into a waiting queue is: Spinlocks.

What is spinlock?

Spinlock can be defined as the process of enabling a thread to  wait while looking for lock that are available.

Spinlock is important as it enable thread to partition processor based on their needs so as to make it possible for thread waiting for spinlock to make use of one processor while other threads can as well run on other processor without hindering or interrupting one another.

Inconclusion the changes would be necessary so that a process waiting to acquire a mutex lock is: Spinlocks.

Learn more about spinlock here:https://brainly.com/question/13766808

"You have created a Word document named apple.docx using Microsoft Word. What type of a file is apple.docx ? Select all that apply"

Answers

The type of a file that is in  apple.docx is Executable program file.

What is an executable file?

An executable file (EXE file) is known to be a type of computer file that has a encoded sequence of codes or instructions that the system often work on  when the user is said to clicks the file icon.

Note that Executable files are known to have an EXE file extension, and there are a lot of other executable file formats. The type of a file that is in  apple.docx is Executable program file.

Learn more about Word document from

https://brainly.com/question/25567167

Mike logged into a shopping website and entered his username and password. Which protocol will the website use to verify his credentials?

Answers

Answer:

I think it is email or password

The first three elements of the Continuous Delivery Pipeline work together to support delivery of small batches of new functionality which are released in accordance with what?

Answers

Answer:

is Market needs

Explanation:

The first three elements of the continuous delivery pipeline mediates the support to the small batches thereby to be released in accordance with the market demand.

What is continuous delivery pipeline?

The continuous delivery pipeline can be given as the software application that enables the development of the new code with the automation to speed.

The first three elements of the continuous delivery pipeline are Continuous Exploration (CE), Continuous Integration (CI), and Continuous Deployment (CD).

The elements mediates the support to the small batches to be released in accordance with the market demand.

Learn more about continuous delivery, here:

https://brainly.com/question/14402781

#SPJ2

What are the four steps of the binary search algorithm

Answers

Answer:

Step 1 - Read the search element from the user.

Step 2 - Find the middle element in the sorted list.

Step 3 - Compare the search element with the middle element in the sorted list.

Step 4 - If both are matched, then display "Given element is found!!!" and terminate the function.

Answer:

These are the main steps are given the photo below

I hope my answer helps you.

What command is used to list at jobs that are scheduled for execution?

Answers

The command that is used to list at jobs that are scheduled for execution is The at command.

What is the at command?

This is known to be a kind of  a Linux command-line utility. It function mainly to book down a job for future execution.

Conclusively. This kind of utility is one that reads commands from standard input and them bind them together into an at job, which can only be executes only once at a time.

Learn more about command  from

https://brainly.com/question/25808182

Other Questions
Why did the soviets control the content of media in satellite countries? to guarantee that the news accurately reflected events to discourage those who might want to become leaders to ensure public acceptance and conformity to policies to limit information about recent events in other countries Circumference of the circle Simplify the expression 20+6k-14+k WILL MARK BRAINLIEST study all the sources do these sources provide convincing evidence that the soviet union invaded Czechoslovakia because of pressure from other eastern European countries 12 marks option B 20th century source start from page number 7pls help In this assignment you have to write an essay about your favorite singer Which of the objects below best holds 1 gallon? A. bathtub B. milk jug C. measuring cup O D. glass of water Please help! This is past due, and Im a little confused. For problems 12-15, name each of the polygons represented by the traffic signs. Write yes or no whether the polygon appears to be regular. help me please help please gelp Jonathan is making his favorite pasta dish. He serves his mom 1/12 of the pot of pasta. And his brother 1/6 of the pot. How much of the pot is left over? The map shows migration routes to the west. Which effect of the Lewis and Clark expedition does this map show? How can we take care of the Earth? A motorboat with the current went 72 mi in 4 hours. Against the current, the motorboat could goonly 40 mi in the same amount of time. Find the rate of the motorboat in calm water. Please Help and explainIm not to sure how to do this ANSWER PLEASE LINKS , SPAM , OR WRONG ANSWER WILL BE REPORTED AND DELETED 100 POINTS TO ANSWER AND YOU WILL GET BRAINLIEST PLEASE DONT WASTE YOUR TIME AND SEND LINKS , SPAM. OR WRONG ANSWER !!!!! HAVE A BLESSED NIGHT/DAY Suppose you are working on the balance sheet for your business. You need to determine your equity as an owner. Consider the following details: Total assets: $37,777 Total liabilities: $16,575 How would you determine your equity as the business owner? Explain the process you would take to determine the owner's equity. Provide two examples of assets and two examples of liabilities. Finally, provide the dollar value of owner's equity, given the dollar figures above. This building housed a mayors office and a commissary, or grocery store. What does it tell you about Hooverville society? People were expected to fend for themselves. Some Hoovervilles had basic public services and conveniences. Hoovervilles lacked the services found in typical towns. please help! its for khan academy RRJ and Annotations for Twelve Angry Men1 - Sem...Due Friday by 11:59pmPoints 505Submitting an external toolRRJ (Reader Response Journal). 1 RRJ entry for each act of the play (2 acts), a total of 2 entries.The first 2 entries will be a quarter-page summary of the plot and a quarter-page about your first reaction to the text, 1 full-page in total.Entry 3, make a list of the play's 12 characters and write a minimum of 3-4 sentences describing and analyzing each of them.. Strict MLA format as always.AnnotationsThoroughly annotate what you consider to be the most important 2 pages in Act 1 and the most important 2 pages in Act 2. Take jpeg pictures of all 4 pagesand paste them in at the end of your RRJ and Annotations document (one picture per document page). What were the key provisions of the civil rights act of 1964 and the voting rights act of 1965? Will Mark Brainliest. ( Do Not Answer If You Don't Know Please). What is the volume of a pyramid with a slant height of 5 feet, a height of 4 feet, and a base length of 6 feet.