answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tino4ka555 [31]
2 years ago
10

A patient asks her doctor to send a copy of her records to another medical office. However, the records are not transmitted beca

use her doctor’s electronic patient database is malfunctioning. This type of security failure is called
Computers and Technology
2 answers:
bezimeni [28]2 years ago
5 0
 This type of security failure is called WIN32K_SECURITY_FAILURE. <span> This indicates a </span>security failure was detected in win32k. <span>According to a new report issued by Dark Reading, there are a number of key </span>security failures<span> that cybercriminals take advantage of.</span>
Lelechka [254]2 years ago
5 0

it's interference or intrusion - the blockage of information intended to be transmitted or shared

You might be interested in
Henry is working from a USDA office. He has several tasks to perform today: 1) he logs onto his USDA computer to get started; 2)
Ksivusya [100]

Answer:

  A. Using a cell phone to discuss sensitive information

Explanation:

In general, cell phone signals are not secure. Cell phones without appropriate encryption should never be used to discuss sensitive information.

3 0
1 year ago
Gian wants to add audio to his presentation whichaude ves not supported
Soloha48 [4]

Answer:

TIFF file is not audio format file rather it is graphic container that stores raster images.

Explanation:

Gain can add all other audio files (MIDI, MP3, Windows media audio file) to his presentation.

What are MIDI, MP3 and WMA :

MIDI:

Musical Instrument Digital Interface (MIDI) is a protocol that is designed for recording and playback music on digital synthesizers that is supported by many computer sound cards. Gian can add MIDI audio format file in his presentation.

MP3:

This audio file format technology compress a sound technology into very small file while preserving the original quality of sound when it is played. Gian can add this audio format in presentation to play audio in presentation.

WMA

This audio format is developed by Microsoft. It contains a series of audio codecs and their corresponding audio formats.

Gian can add WMA extension audio file to his presentation to play audio.

3 0
2 years ago
Which features should a study schedule include? Check all that apply.
Ivenika [448]

Answer: time of day, duration, due dates

Explanation: I am awsome

7 0
1 year ago
Read 2 more answers
Why is it important to have a more diverse group of people in the computer science field
KengaRu [80]

Answer:

Hope this helps ya out mate

Explanation:

Diversity in the field is important because it helps companies find solutions to their problems. There are many options for the students that are simply not available in other industries, and they will be seen for their varied thinking abilities.

5 0
1 year ago
Discuss the software development methodology you would use for developing a software product for insurance agents, and state val
nadya68 [22]

Answer:

It depends on what the company will be willing to use and it also depends on their budget

Explanation:

4 0
1 year ago
Other questions:
  • When a file is transferred between two computers, two acknowledgment strategies are possible. in the first one, the file is chop
    9·1 answer
  • Which feature of Badoo helped members make their profile more prominent?
    14·1 answer
  • Classify the given items as belonging to the public domain or protected by copyright law.
    6·2 answers
  • Type two statements.
    11·1 answer
  • Create a generic class Box with a type parameter that simulates drawing an item at random out of a box. This class could be used
    7·1 answer
  • An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
    12·1 answer
  • What web 2.0 features allows users to subscribe to a data plan that charges for the amount of time spent on the internet?
    9·1 answer
  • What does NOT match with Agile Manifesto?
    9·1 answer
  • What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
    14·1 answer
  • A chain of dry-cleaning outlets wants to improve its operations by using data from
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!