PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST

1.) Online crimes causing loss of money: give 5 names and examples to each

2.) Online misconduct or crimes targeting medical offices and services: give 5 names and examples to each

3.) Online misconduct or crimes that you have experienced: give 5 names and examples to each

Answers

Answer 1

Answer:

1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.  

2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.

3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got  sc/mmed it might apply to this question


Related Questions

Your program has a loop where a user guesses a letter.

Your program compares the guess to each letter in the word.

Finish the code.

for n in range(lenWord):
if _______ == letter:
blanks = blanks[:n] + letter + blanks[n+1:]


correct[n]


correct


correct(n)

Answers

Answer:

its correct[n]

Explanation:

for n in range(lenWord):

if correct[n] == letter:

blanks = blanks[:n] + letter + blanks[n+1:]

A loop in a computer program is an teaching that repeats until a specified condition is reached.

In a loop structure, the loop asks a question. If the answer needs action, it is executed. The same question is asked  again until no other action is required.

What are loops used for in programming?

A Loop is employed to repeat a specific block of code a over and over. There are two main types of loops, for loops and while loops.

What are the 3 types of loops in programming?

In Java, there are three kinds of loops which are – the for loop, the while loop, and the do-while loop. All these three loop constructs of Java executes a set of replicated statements as long as a specified condition stays true.

To learn more about A loop, refer

https://brainly.com/question/26568485

#SPJ2

Stages of reverse engineering

Answers

Answer:

Capture Data, Refine the Model, and then Manufacture it.

Explanation:

what is the most popular monitor​

Answers

Probably a television or a radio I guess

When creating a storyboard, in which section do you mention how you move from one shot to the next?
A.
synopsis
B.
sketch
C.
transitions
D.
shot description
E.
shot sequence number

Answers

Answer: C

Explanation:

Answer:

E. shot sequence number

Explanation:

Doug grew up on a large farm in southwest Wisconsin. As a college graduation gift, Doug’s father gave him several hundred acres of land to raise organic soybeans, grain, and corn. Doug works the fields by himself, negotiates deals with buyers, repairs equipment, and handles all the accounting and financial issues for the business, which is called The Natural Element.

Answers

Answer: Sole Proprietorship.

Explanation:

This question wants to know what type of business is described in the scenario.

In a Sole Proprietorship, the owner of the business is essentially the business itself. They control all aspects of the business from the operating activities to the financial activities of the firm. This is usually the first stage business type in an entrepreneurship.

The definition of a sole proprietorship above fits with what Doug does. Doug is the owner of the farming business and seems to be handling all aspects of it by himself. This would therefore make it a sole proprietorship.

She goes to look at her
HTML code to see what is wrong line by line until she can figure out what she
messed up. Which process is Ana using?

A. Fragmentation
B. Identification
C. Pinpoint
D. Debugging

Answers

Debugging is the answer

The process is Ana using is Debugging. Check below to see what the term is all about.

What is debugging used for?

Debugging is known to be the act of working on how a given program runs, and also how it creates data so as to be able to defects and know issues in a given code.

Note that since she goes to look at her HTML code to see what is wrong line by line until she can figure out what she messed up, she is engaged in debugging.

Learn more about Debugging from

https://brainly.com/question/163290

#SPJ2

The _____________ command is used to stop the FOR...NEXT loop prematurely.​

Answers

Answer:

The exit command is used to stop the FOR...NEXT loop prematurely

Need answer ASAP!!!!!

Select the correct answer.
What stage of software development incorporates planning to help make changes in the project plan based on reviews?
OA.project startup
OB. proposal stage
OC. periodic checks
OD. product delivery

Answers

Answer:

Option C

Explanation:

Periodic check are similar to period inspection done by a team comprising of software developers who check the flow and output of the core during the different stages of software development.  

The team also do the auditing to check whether the work products meet the different client requirement and thus revise the project plans.

Hence, option C is correct

windows operating system memory management??​

Answers

Memory management is the functionality of an operating system which handles or manages primary memory and moves processes back and forth between main memory and disk during execution. Memory management keeps track of each and every memory location, regardless of either it is allocated to some process or it is free.Answer:

Construct :
4 input NOR Gate Truth Table.

Answers

9514 1404 393

Answer:

  see attached

Explanation:

The output is always 0, except for the case where all 4 inputs are 0.

I NEED THIS NOW!! :((

Which feature of a database allows a user to locate a specific record using keywords?

Chart
Filter
Search
Sort

Answers

which feature of a database allows a user to locate a specific record using keywords?

search

Choose the expression that belongs in the blank in order to have the output shown.

>>> a = 5
>>> print(_____)
The value is5

"The value is " + str(a)

"The value is" , str(a)

"The value is " , str(a)

"The value is" + str(a)

Answers

Answer:

Option B

Explanation:

Given

a = 5

and if the value allotted to variable a is to be printed, the following command will be used

print "The values is", str(a)

Hence, option B is correct



…..is the smallest size in audio files

Answers

Answer:

Wav files can be 16 bit,8 kHz (i.e 128 k bits per second) while mp3 could be compressed to 16 kbits per second. Typically wav is x10 larger than mpg. This is ratio is highly content specific. Wav is a raw format, while mp3 is a compressed format for audio.

Explanation:

Answer:

Wav files can be 16 bit,8 kHz (i.e 128 k bits per second) while mp3 could be compressed to 16 kbits per second. Typically wav is x10 larger than mpg. This is ratio is highly content specific. Wav is a raw format, while mp3 is a compressed format for audio.

Kevin is scanning old images from his college library. He might use these scanned images in the college magazine. He might also use them on the college website. What is the best practice for Kevin to follow when scanning the images?
A.
scan the images with 72 DPI
B.
scan only the images that are ideal for a website
C.
scan the images with 150 DPI
D.
scan the images with 600 DPI
E.
scan the images that are ideal for a magazine

Answers

Answer: D. Scan the images with 600 DPI

Explanation:

Answer: D. Scan the images with 600 DPI

Explanation: Correct for Plato/Edmentum

technically a coding question utilizing python how would one calculate a square root

Answers

Answer:

import math

math.sqrt( x )

Explanation:

The basic code that can be written to calculate the square root of a number is as follows

import math

math.sqrt( x )

Lorann sends messages to Aiden that always go into Aiden’s Junk E-mail folder. Which process would best correct this problem so that Lorann’s messages no longer go into Aiden’s Junk E-mail folder?
A. adding Aiden to the Safe Senders list
B. adding Aiden to the Safe Recipients list
C. adding Lorann to the Safe Senders list
D. adding Lorann to the Safe Recipients list

Answers

C doing this for points

Answer:

b

Explanation:

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for file storage and a database server. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a cross-over UTP plenum cable that will run through the suspended tile ceiling of the data center. To provide power for the new devices, you had an electrician install several new 20-amp wall outlets near the new rack. Each device in the rack will be plugged directly into one of these new wall outlets. What is wrong with this configuration

Answers

Answer: • You should implement a UPS between the wall outlet and the network devices.

• You should implement redundant power supplies for the network devices.

Explanation:

Based in the information given in the question, the options that explain things wrong in the configuration is that:

• You should implement a UPS between the wall outlet and the network devices.

• You should implement redundant power supplies for the network devices.

What type of address uses a number that uniquely identifies each computer?
O Computer address
O Home address
O E-mail address
O IP address​

Answers

Answer:

The awnser is D or IP Address

Explanation:

BRAINLIEST PLEASE

Answer:

IP Address. This is the most unique as you can track computers down with this code too. I hope you found this helpful, you are very welcome!

You have created a group policy that prevents users in the accounting department from accessing records in a database that has confidential information. The group policy is configured to disable the search function for all users in the Accounting OU no matter which workstation is being used. After you configure and test the policy, you learn that several people in the Accounting OU have valid reasons for using the search function. These users are part of a security group named Managers. What can you do to prevent the Group Policy object (GPO) that you have configured from applying to members of the Managers group

Answers

Answer: Add the Managers group to the GPO's discretionary access control list (DACL).

Deny the apply Group Policy and read permissions to the Managers group.

Explanation:

To prevent the Group Policy object (GPO) which had been configured from applying to the members of the Managers group, the Managers group should be added to the GPO's discretionary access control list (DACL).

Likewise, the apply Group Policy can be denied and read permissions to the Managers group. This will further help in the prevention of users.

I’ll mark brainliest if correct

Select the correct answer.
Derek works in the software quality assurance department. Which tools or process should Derek use to monitor and measure changes?

A.software engineering process

B.software quality metrics

C. SQA audits

D.reviews

Answers

Answer:

A.

Explanation:

Have a Nice Day

Answer:

answer: software quality metrics

PLEASE HELP ME!!! Please don't answer if you're just going to guess.

In this line from a data file, what do you call the comma?
dog, 23, 15
The comma is _____
-Choices-
a BOL set of characters,
an EOL set of characters,
a delimiter.

Answers

Answer:

a

Explanation:

Answer:

BOL

Explanation:

which feature of project management includes monetary compensation for the employees

Answers

Answer:

Extrinsic compensation

Explanation:

The feature of project management that includes monetary compensation for employees is the Extrinsic compensation.

Extrinsic compensation is reward ( tangible ) given to workers/employees by the management of a project for the speedy completion of a task or for the completion of a specific task . It can in the form of monetary compensation or non-monetary compensation.

example of Non-monetary compensation includes certificate of honor, medical insurance .

example of monetary compensation includes : work Bonuses , salaries

(50 POINTS) A folder has been shared with other users and set to read-only. What does this mean for users?
Users can only read the name of the shared folder.
Users cannot add new folders or files.
Users can read and edit files.
Users can add new files but not new folders.

Answers

i believe it would be “users cannot add new folders or files” i think they can only read what’s in the folder.

Answer:

B

Explanation:

Which of the following are causes of a run-time error. Choose all that apply.
A user enters a numeric value when a text value was expected.
A user enters text and numeric values.
A user enters a text value when a numeric value was expected.
A user enters a negative number when a positive number was expected.

Answers

Answer:

A C D

Explanation:

just did it

Answer:

A.  A user enters a numeric value when a text value was expected.  

C. A user enters a text value when a numeric value was expected.

D. A user enters a negative number when a positive number was expected.

Explanation:

Which line of code converts 3 to 3.0?

int(3)

type(3)

float(3)

single(3)

Answers

Answer:

float

Explanation:

Select the factors that a network engineer is most likely to consider when designing a computer network. the ways in which employees share business documents the number of hours employees work the number of networked computers the type of work done at networked computers the number of employees using each computer the rate of pay for networked employees

Answers

Answer:

the number of employees using each computer

the number of networked computers

the type of work done at networked computers

the ways in which employees share business documents

Explanation:

these are all correct on odyssey :)

How is the OR (||) logical operator used?
PLS HURRY

Answers

Answer:

The answer is below

Explanation:

A logical operator is a symbol or word used to connect two or more expressions such that the value of the compound expression produced depends only on that of the original expressions and on the meaning of the operator. Common logical operators include AND, OR, and NOT.

Match the network topology to its description. 1. bus data is certain to reach its destination 2. mesh no danger of data collision with this topology 3. ring limited expansion capability 4. star nodes are connected to a central hub

Answers

Answer:

3,1,2

Explanation:

What is climate and how is it formed? What can cause climate change.

Answers

Answer: Climate is the weather and conditions over time (at least a year).

The things that start climate change are burning fossil fuels and tearing down forests to start construction.

Answer:

climate can be defined as weather.

In what year was the first powered airplane flight in Europe?

Answers

October 23, 1906 8s when the first powered flight took place in Europe.

Answer:

October 23, 1906 was when the first powered flight took place in Europe.

Explanation:

Other Questions
HELP ME PLEASE ITS DUE IN 14 MINS Find the numbers of faces, edges, and vertices of the solid.number of faces:number of edges:number of vertices: what is (3 + 12) - 3 + 8 2 4 ?(please show how/ show work) Give three examples of energy traveling in waves Help anyone!sorry for how bad the screen looks from far away. Around a pile of mountainsAnd, supercilious, peerIn shanties by the sides of roads,And then a quarry pareWhich element of this text suggests a specific time period?The repetition of the word andThe phrase "by the sides of roads"The description of the mountainsThe words shanties and quarry PLEASE HELP I DONT UNDERSTAND What does the underlined phrase on page 1suggest about the flowers the authordescribes in the passage?They feel others do not appreciate what theyprovide.They have abilities that most people lack.They do not know how important they are toothers.They do not plan to profit from their actions. What conclusion can you draw about the Houseimpeachment vote?The parties supported impeachment equally.Most Democrats supported impeachment.The vote went along party lines. Bailey ran 1 mile and 14 yards.How many total feet did bailey run?A.1,774 feetB.5,280 feetC.5,294 feetD.5,322 feet The scatter plot shows the amount of sunlight some tomato plants received and the amount of each plant grew Erics father works two part-time jobs, one in the morning and one in the afternoon, and works a total of 40 hours each 5-day workweek. If his schedule is the same each day, and he works 3 hours each morning, how many hours does Erics father work each afternoon? Make a tape diagram to represent the problem and solve.i hate word problems TvT Using Figure 10-4 above, list the correct order for the diagrams. A. CDABB. DCABC. DACBD. CDA will give 50 point privetely if correct and show workMs. White invests $ 2000 in a savings plan. The savings account pays an annual interest rate of 5.75 % on the amount she puts in at the end of each year. How much will be in her savings plan at the end of 10 years? 8. We know Romeo and Juliet got married, but many other characters do not.a. Dramatic Ironyb. Situational Ironyc. Verbal Ironyd. Figurative Irony NO LINK please i really want to know the best way to deal as much heart as possible plz tell me Please help!! Math What is the missing value of the missing angle?A. 43*B. 133*C. 90*D. 47* Can anybody help meh :(A total charge of 9.0 mC passes through a cross-sectional area of a nichrome wire in 3.6s. The number of electrons passing through the cross-sectional area in 10s is NO LINKS OR I WILL REPORT NEED ASAPWILL MARK BRAINLIEST AND NO UNESSECARY ANSWERS OR I WILL REPORT 1/2x6=?whats the answer