answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krek1111 [17]
2 years ago
13

_____________ involves the deployment of malware that secretly steals data in the computer systems of organizations, such as gov

ernment agencies, military contractors, political organizations, and manufacturing firms.a) Cyberterrorism b) Smishing c) Cyberespionage d) Vishing
Computers and Technology
1 answer:
Elis [28]2 years ago
4 0

Answer: (C) Cyberterrorism

Explanation:

 The cyber-terrorism is basically secretly steal useful information or data from the computer system illegally from the government agencies, political organization and various manufacturing forms.

The cyber terrorism used internet to conduct various violent act that results into the significant harm.

It is also sometimes known as internet terrorism in which it used it steal various confidential information from the computer system by various methods like computer worms and viruses in the system.

You might be interested in
Create an array w with values 0, 0.1, 0.2, . . . , 3. Write out w[:], w[:-2], w[::5], w[2:-2:6]. Convince yourself in each case
larisa86 [58]

Answer:

w = [i/10.0 for i in range(0,31,1)]

w[:]  = [0.0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0]

w[:-2] = [0.0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8]

w[::5]= [0.0, 0.5, 1.0, 1.5, 2.0, 2.5, 3.0]

w[2:-2:6] = [0.2, 0.8, 1.4, 2.0, 2.6]

Explanation:

List slicing (as it is called in python programming language ) is the creation of list by defining  start, stop, and step parameters.

w = [i/10.0 for i in range(0,31,1)]

The line of code above create the list w with values 0, 0.1, 0.2, . . . , 3.

w[:]  = [0.0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0]

since start, stop, and step parameters are not defined, the output returns all the list elements.

w[:-2] = [0.0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8]

w[:-2] since  stop is -2, the output returns all the list elements from the beginning to just before the second to the last element.

w[::5]= [0.0, 0.5, 1.0, 1.5, 2.0, 2.5, 3.0]

w[::5] since  step is -2, the output returns  the list elements at index 0, 5, 10, 15, 20, 25,30

w[2:-2:6] = [0.2, 0.8, 1.4, 2.0, 2.6]

the output returns the list elements from the element at index 2  to just before the second to the last element, using step size of 6.

6 0
2 years ago
Users need to be able to make use of _____ , such as rumors, unconfirmed reports, and stories, when solving problems.
jekas [21]

Answer:

Informal information

Explanation:

The informal information system is employee based system design to meet personnel and vocational needs and to help in the solution of work-related problems. it also funnels information upward through indirect channels.

However, one of the most important reasons for why informal communication is critical to businesses is that it allows employees to give feedback to their superiors.

Thus, the informal or grapevine communication promotes social relationship among the participants. It helps to build up unity, integrity and solidarity among them and boosts up their morale. Grapevine or informal communication is faster than the formal communication.

8 0
2 years ago
A homeowner uses a smart assistant to set the house alarm, get packages delivery updates, and set time on the outdoor lights. Wh
ch4aika [34]

The example where the alarm of the house set up, delivery updated should be provided, etc should represent the function example of the artificial intelligence.

The following information related to artificial intelligence is:

  • It refers to the human intelligence where the machines could be treated as humans and according to this, the actions should be mimic.
  • It should be used for any kind of machine where the traits should be associated along with the mind of the human-like for learning & problem-solving purpose.

Therefore we can conclude that The example where the alarm of the house set up, delivery updated should be provided, etc should represent the function example of the artificial intelligence.

Learn more about the machine here: brainly.com/question/2555822

3 0
2 years ago
Convert the following numbers to binary numbers: 5 , 6 , 7 , 8 , 9 .​
Anon25 [30]

Answer:

log 5,6,7,8,9 is the binary number according to the computer

7 0
2 years ago
Read 2 more answers
Assume we have a computer where the clocks per instruction (CPI) is 1.0 when all memory accesses hit in the cache. The only data
umka21 [38]

Answer:

6.6 times faster considering I-cache

Explanation:

<em>Given data </em>:

CPI  = 1

Data accesses ( loads and stores ) = 40% of instructions

Miss penalty = 200 clock cycles

Miss rate = 2% for I-cache ,  5% for D-cache

<u>Determine how much faster the computer will be if all instructions were Cache hits </u>

In this condition the memory stall = 0

hence: CPU ideal time = ( Ic * CP1  + memory stall ) * clock cycle time --- ( 1 )

                                     = ( Ic * 1 + 0 ) * clock cycle time

<em>Note : Memory stall = Ic * ( 1 + load fraction ) * miss rate * miss penalty  --- ( 2)</em>

back to equation 1

Memory stall ( for I-cache ) = Ic * ( 1 + 40% ) * 2% * 200

                                              = 5.6 Ic

Input value into equation 1

CPU ideal time = Ic * 1 + 5.6Ic * clock cycle time

                         = ( 6.6 Ic ) * clock cycle time

To determine how much faster we take the ratio of the CPU ideal time

=   6.6 Ic * clock cycle time / 1  Ic * clock cycle time

= 6.6 times faster

4 0
2 years ago
Other questions:
  • Which statement best describes how the rapid prototyping model works?a) Developers create prototypes to show stakeholders how va
    11·2 answers
  • Allows you to manually add an entry to the arp cache that resolves the ip address inetaddr to the physical address etheraddr. wh
    13·1 answer
  • Marissa works at a company that makes perfume. She noticed many samples of the perfume were not passing inspection. She conducte
    6·2 answers
  • Import java.util.scanner; public class sumofmax { public double findmax(double num1, double num2) { double maxval; // note: if-e
    10·1 answer
  • During college jesse spent four semesters studying abroad in other parts of the world how could jesses time abroad benefit his e
    5·2 answers
  • You live "out in the middle of nowhere" and feel there is no need to protect your internet connection because there is no one th
    5·1 answer
  • Modify the sentence-generator program of Case Study so that it inputs its vocabulary from a set of text files at startup. The fi
    15·1 answer
  • For his class project, Matt has to create an image in a color scheme that has shade or tint variations of the same hue. Which co
    7·1 answer
  • Graduating from college can boost your income 60% compared to high school graduates. An average high school graduate without a c
    8·1 answer
  • Write a program that uses the Purchase class in 5.13. Set the prices to the following: Oranges: 10 for $2.99 Eggs: 12 for $1.69
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!