The use of computer systems to distribute potentially harmful information is called:
A) Propaganda
B) Cyber security
C) Computer fraud
D) Industrial espionage

Answers

Answer 1

Answer:

cyber security I think that is what it is

Explanation:

m

Answer 2

A cyber security is the distribution of malware and other server attack that are aimed at destroying the integrity of the system and is also called as the information compromise.

There are various tools and techniques that can be used to protect and save from such harmful attacks. Other attacks include cyber fraud and are done to distribute the harmful information.

Hence the option B is correct,

Learn more about the computer systems to distribute potentially.

brainly.com/question/25705570.


Related Questions

How is the central message of being true to oneself conveyed in the story?

Answers

The central message of being true to oneself is illustrated in the story as the character allowed his uniqueness to shine through.

You did not provide the story. Therefore, an overview of the central idea will be given. The central message of a story is the main idea that the author wants the readers to know.

The central message is also referred to as the theme. Since the central message is about being true to oneself, the character will respect the opinions of others but won't conform to stereotypes. Such a person allows their uniqueness to shine through.

Read related link on:

https://brainly.com/question/25582903

Rajesh is considering whether to use a web app to collaborate with a group of friends on a project. What is one reason he should avoid using a web app for the project

Answers

Rajesh might want to avoid the use of a web app for the project due to connectivity issues. Hence, one reason he might want to avoid using the Webb app is slow or poor internet connection.

Collaborating on a web application relies very heavily on network connectivity which is the what establishes the link ms allows the apllications to achieve optimum performance.

Therefore, slow internet connection is a major reason whuhe might want to avoid using a web app.

Learn more : https://brainly.com/question/25531734

You need to replace the motherboard on a laptop. Which two items should you disconnect or remove first

Answers

Your motherboard should now be freely floating in your case—pull it out. With the old motherboard free, you'll need to remove its CPU cooler, CPU, and RAM so you can install it into your new motherboard.

True or False: At the Company level, users will only have access to view projects to which they have been specifically granted access to by a company/project administrator.

Answers

Answer:

True

Just look it up and put quizlet at the end of your question youll find it.

A company gives out bonuses based on the amount of income generated by their sales representatives per month. Once the income is greater than $5000 a bonus of 10% of the generated income is given to the employees. Read the income generated and print the bonus

Answers

The code block which calculates the bonus amount earned based on sales is written thus in python 3 ;

income = eval(input("Enter generated income : "))

#takes input for the amount of income made

bonus = 0

#initialize the bonus amount

if income > 5000 :

#if the income earned is greater than 5000

bonus = (0.1 * income)

#bonus earned is 10%

print("Your bonus is :", bonus)

#display bonus

A sample run of the program is attached.

Learn more : https://brainly.com/question/15437930

On average, people spend about _____ minutes per day on apps that do not make them feel good such as apps for dating, social networking, gaming, entertainment, news, and web browsing .

Answers

Averagely, people (end users) spend about 27 minutes per day on software applications (programs) that do not make them feel good.

A software can be defined as a collection of data or set of executable instructions (codes) that is typically used to instruct a computer on how it should perform a specific task and solve a particular problem.

Basically, software applications (programs) are broadly categorized into three (3) main groups and these are;

System softwareUtility softwareApplication software

An application software is typically designed and developed for the performance of a specific task rather than the operation of a computer system.

According to an American survey, people (end users) averagely spend about 27 minutes per day on software applications (programs) that do not make them feel good such as those focused on:

Social networkingDatingEntertainmentGamingNewsWeb browsing

On the other hand, people (end users) averagely spend about 9 minutes per day on software applications (programs) that make them feel good such as those focused on:

HealthExerciseReadingRelaxationEducation

Find more information: https://brainly.com/question/14379808

List down 5 elements of Multimedia

Answers

Answer:

text, image, audio, video, animation

Answer : The five elements of Multimedia are text, images, audio, video and animation.

Hope This Helps You.

Anote los tipos de direcciones de IP que existen.​

Answers

Answer:

ENGLISH PLEASE.

Explanation:

Hey, can somebody convert this Pseudocode into a Python Program, I've been struggling to do so for a while.

Answers

Answer:

print("Enter a positive whole number: ")

NumberIn = int(input())

NumberOut = 0

Count = 0

while NumberIn > 0:

   Count = Count + 1

   PartValue = NumberIn % 2

   NumberIn = NumberIn // 2

   for i in range(1, Count - 1):

       PartValue = PartValue * 10

   NumberOut = NumberOut + PartValue

print("The result is: " + str(NumberOut))

Outputs:

Enter a positive whole number:  

22

The result is: 1011

Enter a positive whole number:  

29

The result is: 1111

Enter a positive whole number:  

-1

The result is: 0

a virtual network of websites connected by hyperlinks is called

Answers

Answer:

it is called the World wide Web

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in _____ for file servers.

Answers

Answer:

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in high-volume data storage for file servers.

u What is the full form of DRAM? a) Dynamic Remote Access Memory b) Dynamic Random-Access Memory c) Dependent Remote Access Memory d) Dependent Random-Access Memory

Answers

Answer:

B

Explanation:

Dynamic Random-Access Memory

A presenter selects multimedia materials primarily based on their ability to organize data. Distract the audience. Introduce information. Emphasize a point.

Answers

Multimedia materials encompass video, audio and pictorial elements of a presentation. These materials are useful extremely useful when emphasizing a point.

In other to establish importance, emphasis has to be laid on the key points of a lesson, teaching or information.

With multimedia tools, the important points could be aired verbally, diagrammatically with annotations or using live visuals to establish the proposed points.

Learn more : https://brainly.com/question/25682762

Difference between web browser and search engine.​

Answers

Answer:

A search engine is like Bing, but a web browser is a browser you can search from anywhere in the world and end up with the same search results.

Explanation:

Cloud providers often charge their customers based on the amount of processing resources used, such as CPU usage. This practice is known as ________.

Answers

Platform as a Service (PaaS)

What will print to the console after running this code segment?


A. 15.

B. 16.

C. 18.

D. 21.

Answers

Answer:

16

Explanation:

answer =3+2

answer =5+3

return 8 × 2

16 will print to the console after running this code segment. Therefore, option B is correct.

What do you mean by code segment ?

A code segment, also known as a text segment or simply text, is a section of an object file or the program's virtual address space that contains executable instructions.

A character array segment that represents a text fragment. Even though the array is directly accessible, it should be treated as immutable. This allows for quick access to text fragments without the overhead of copying around characters.

In memory, the code segment functions normally as read-only memory and has a fixed size; thus, without the need for loading, it can generally be found in read-only memory (ROM) on embedded systems.

answer = 3+2, answer = 5+3

return 8 × 2

= 16

Thus, option B is correct.

To learn more about the code segment, follow the link;

https://brainly.com/question/20063766

#SPJ2

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .

Answers

Computer data storage

An electronic element that stores data by changing its resistance based on the current that has passed through it, similar to RRAM (Resistive Random Access Memory), is called a Memristor.

What is memristor

The term "memristor" is a combination of "memory" and "resistor," indicating its ability to retain information based on its resistance state.

Memristors are considered a fourth fundamental passive circuit element, alongside resistors, capacitors, and inductors.

Learn more about electronic element at

https://brainly.com/question/24977425

#SPJ2

uploaded ads give advertisers access to more inventory than responsive display ads. true or false?

Answers

Answer:

True

Explanation:

This is because of the fact that  it allows the marketing industry rise to higher rates.

Ture but you can do that for now and then when we can get it done today and then we

the envelope method, notebook and pencil, and online software are all methods of ______.

Answers

Answer:

tracking your spending.

The envelope method, notebook and pencil, and online software are all methods of tracking your spending as per the given situation. The correct option is C.

What is software?

A set of instructions, data, or programs used to operate computers and carry out specific tasks is referred to as software. It is the inverse of hardware, which describes the physical characteristics of a computer.

Inner needs to track spending in personal and business activities in order to know financial status and budget effectively with available funds.

Without tracking spending, there is a risk of waste and overspending on unimportant items.

The envelop method entails putting money in different envelops for each category of spending. At the end of the period, you can check the envelops to see how much money was spent in each category.

Keeping track of expenses requires a notebook and a pencil.

QuickBooks online software can be used to track how much an individual or business has spent.

Thus, the correct option is C.

For more details regarding tracking the spend, visit:

https://brainly.com/question/14511380

#SPJ5

Your question seems incomplete, the missing options are:

estimating your unexpected expensesplanning for your futuretracking your spendingunderstanding your current expenses

1.* Parents can now buy GPS tracking devices for their children. This allows them to monitor
their child's location at any time.
Discuss the impact of tracking children with GPS devices.
In your answer, you might consider the impact on:
Cultural issues
Ethical issues

Answers

Answer:

well...

Explanation:

it will help with any issues really, the parents just want to be able to find their children if they get hurt, lost, or kidnapped, so I don't see how it can be a cultural or an ethical issue

why are extensions necessary in scratch programming as a whole?​

Answers

Extensions make it possible to connect scratch projects with eternal hardware

At the data science laboratory, the data scientists and data engineers are required to process millions of data every second to predict weather patterns and abnormalities. The data is then sent to all employees over a network, using a server.

State the type of computer system that is required for EACH of the following purposes..

Processing of scientific data ...........

Distribution of data over a network

Working from home .....

Answers

Answer:

the type of computer system that is required for processing of scientific data is : supercomputer

for distribution of data over a network :Client/server computing

working from home :A laptop

The computer that's needed for processing scientific data is the supercomputer.

The computer that is needed for the distribution of data over a network is the client or server computer while the computer that's needed for working from home is a laptop.

A supercomputer simply means a computer that has a high level of performance and has thousands of processors. The server computer provides functionality for other devices.

Learn more about computers on:

https://brainly.com/question/24540334

Suppression of politically or socially unacceptable co
O backlinks
O compress
O forum
O censorship

Answers

Answer:

censorship

Explanation:

censorship means to block out something that is against the rules, to silence some sort of message/comments. so the answer is censorship

What is the role of a control in a system that is functioning correctly

Answers

A control system manages, commands, directs, or regulates the behavior of other devices or systems using control loops. It can range from a single home heating controller using a thermostat controlling a domestic boiler to large industrial control systems which are used for controlling processes or machines.

Write a program that prompts the user to input two POSITIVE numbers — a dividend (numerator) and a divisor (denominator). Your program should then divide the numerator by the denominator, and display the quotient followed by the remainder.


Hint: If you use division (/) to calculate the quotient, you will need to use int() to remove the decimals. You can also use integer division (// ), which was introduced in Question 10 of Lesson Practice 2.3.


Once you've calculated the quotient, you will need to use modular division (%) to calculate the remainder. Remember to clearly define the data types for all inputs in your code. You may need to use float( ) , int( ), and str( ) in your solution.


float( ): Anything inputted by a user should be transformed into a float — after all, we are accepting ALL positive numbers, integers and those with decimals.


int( ): When you divide the numerator and the divisor using /, make sure that the result is an integer.


str( ): After using modular division, you can transform the quotient and remainder back into strings to display the result in the print() command.

Answers

Answer:

yes

Explanation:

With ______ voice mail, users can view message details, and in some cases read message contents without listening to them.

Answers

Answer:

Your answer is...

Visual.

With visual voicemail, users can view message details, and in some cases read message contents without listening to them.

I hope this helped at all.

who is the father of computer?
a.jeff bezos
b.cgarles babagge
c.micky pointe
d.marlos carten​

Answers

Answer:

Explanation:

B.

How to fix common problem of a computer system?​

Answers

Some ways you could fix a common problem in a computer system are

Run a thorough virus scan.
Update your software.
Cut down on the bloat.
Test your Wi-Fi connection.
Reinstall the operating system.

Present your opinions about using robots to help with household routines.​

Answers

Answer:

I believe robots helping with household routines is great!  Robots hold have great  capability to assist senior 's. Robots can hand appropriate medicines to older adults on time. They can mop the floor super fat and super good. Additionally, there are robots that can lift people up and move them to a certain place!

Explanation:

what is cyber crime? is hacking is cyber crime ​

Answers

Answer:

Crime committed using computer networks.

Explanation:

well I don't think sooo..........

HOPE IT HELPS.......

Answer:

Cyber crime means the crime done through the means of internet.Using others account without permission,Leaking others personal information,etc.are example of it.

Yes,hacking is a cyber crime.

Other Questions
Which substance is transported by haemoglobin?A. NitrogenB. OxygenC. UreaD. Water The area of a parallelogram can be found by the equation area=(b)(h) Find the height of a parallelogram that has an area of 10&1/2 in and a base of 3/4 the height of the parallelogram is ____ inches Can you guys make me analysis for the poem of the Bridge please thank you my family!!!! this is part onesee im no good :(The Killer ClownsOne dark and stormy night, a loud bang came from the garage. A 10 year old girl named Rosa went to see what it was. When Rosa opened the door the lights went out. She knew there was a flashlight near the door, but she couldnt find it, and the breaker-box was on the other side of the house in the basement. Suddenly the lights started to flicker on and off. She heard footsteps coming down the hall. Rosa ran and hid is a closet across the hall, she whispered to herself Please dont come this way. Clump, Clump, Clump She heard the footsteps getting closer, all of a sudden they stopped in front of the door and went back down the hall. Rosa let out a sigh of relief. Then she heard a clown car and thought Thats odd, clown cars dont pass through this late but realized there were killer clowns on the loose and the police couldnt stop them, the clowns already killed the entire police force. She knew what she had to do. The kitchen was down the hall and it sounded like the intruder was upstairs in the attic. Rosa had found a bag and started towards the kitchen, she knew exactly where the kitchen knives were and grabbed some food and a large carving knife. She also grabbed her mothers pistol and some ammo from the gun safe. She heard the front door rattling and knew to get to her room, because it was her and her puppy, Rose-Bud who was a pit bull, that night and it had no windows to get in through.Rosa locked the room door and pushed the dresser and nightstand against the door to barricade the door. Rosa heard the honking of a rubber chicken, and she knew the clowns were here. Still instead of screaming she stayed silent, got the gun loaded and ready to fire then hid in her closet. She would be safe in there for the time being, suddenly she knew Chuckie had teamed up with the killer clowns. Who else would have the clowns teamed up with besides a haunted doll? Rosa heard a knife scraping against the wall, it was deafening. Rosa was still in her closet with Rose-Bud. Bang, Bang, Bang went the door, a clown had gotten in! The clown opened the closet door very slowly and got shot straight in the heart. The gunfire made Chuckie and all the clowns run, but they are still out there. Samir's sister goes for kathak dance lessons on Tuesday ,Thursday and Saturday every week .If each lesson lasts 50 minutes ,how much time did he practice dance at her class in 3 weeks? Victor rode hisskateboard 18 miles. If one kilometeris approximately equal to 0.6 miles,how many kilometers did Victor skateboard last week? Television does not depict a great deal of violence. Please select the best answer from the choices provided T F. Based on your opinion after reading the text, what is an example of a societal response to crime and deviance?. Solve 2^3n-4>0 ................... 3 times a Numbers plus 12 is more than 15? [tex]5/12 + 11d/12 - 3 = 3d + 7 - 4d.[/tex]PLEASE HELP!! Q1. This dress suits her style. She __________ definitely like it!A. canB. couldC. willD. mayA question from Modals PLZ HELP ASAP ILL GIVE 20 POINTS!A local store is selling fresh tuna. The table below shows the price for the amount of tuna. Amount of tuna (in pounds) 2, 6, 7 price (in dollars) 12, 30, 35.predicted price for 9 pounds of tune? Que significa y que implica la frase "Hacerse cargo de las decisiones que tomamos"? Soy de 5to de primaria es para lengua... which word is the best antonym for the word derisive Bryden thinks that the people in beer ads always look self-confident, relaxed, and outgoing. Bryden is very shy and wishes she were more outgoing. She wonders if she would be more self-confident in social situations if she drank a few beers first What is 1 and 1/4 - 3/8? Team A beat Team B by 15 points in a football game . If a total of 35 points were scored , what was the final score of the game ?For team A and team BI WILL MARK YOU A BRAINLIEST What property of the carbon atom makes it unique? What equation is graphed in this figure? y4=13(x+2) y3=13(x+1) y+2=3(x1) y5=3(x1).