answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
2 years ago
5

A cybercrime: Select one: a. Is the act of defaulting on a properly signed agreement entered into upon the internet. b. Can be c

ommitted if a computer is the object of a crime, the subject of a crime, or the instrument of a crime. c. Always requires intent to commit a bad act in order to be prosecuted. d. Is synonymous with cyber terrorism
Computers and Technology
1 answer:
aalyn [17]2 years ago
3 0

The answer is B because cyber crime is when a computer is used to commit criminal activities.

You might be interested in
Driving is expensive. Write a program with a car's miles/gallon and gas dollars/gallon (both floats) as input, and output the ga
Ierofanga [76]

Answer:

x^{2} \left[\begin{array}{ccc}1&2&3\\4&5&6\\7&8&9\end{array}\right] \int\limits^a_b {x} \, dx  \lim_{n \to \infty} a_n \sqrt{x} \sqrt[n]{x} \pi \alpha \frac{x}{y} x_{123} \beta

Explanation:

6 0
1 year ago
Read 2 more answers
If s=abcd is a string defined over Σ = {a,bc,d}then reverse of s is dcba.<br> Δ True<br> Δ False
Minchanka [31]

Answer:

True

Explanation:

If s=abcd is a string defined over {a,b,c,d}, it corresponds to a regular expression which can be represented using a finite automata. Then the reverse of the string essentially corresponds to another finite automata where the starting state becomes the accepting state and vice versa.Moreover all the directions of state transitions will be reversed for each of the transitions in the original automata.

With these modifications, the new finite automata will accept a string which is reverse of the original string ,namely, dcba and this string will ne part of the reverse language.

7 0
1 year ago
Prove that f(n) = 20n3 + 10nlogn + 5 is O(n3)
sp2606 [1]

Answer:

The proof is in the explanation

Explanation:

f(n) is O(n^{3}) if f(n) \leq cn^{3} for n \geq n_{0}.

So, basically, we have to solve the following inequality

f(n) \leq cn^{3}

20n^{3} + 10n\log{n} + 5 \leq cn^{3}

Dividing everything by n^{3} to simplify, we have

20 + \frac{10\log{n}}{n^{2}} + \frac{5}{n^{3}} \leq cn^{3}

I am going to use n = n_{0} = 1. So

20 + 5 \leq c

c \geq 25

There is a solution for the inequality, which proves that f(n) = 20n^{3} + 10n\log{n} + 5 is O(n^{3})

7 0
1 year ago
List at least three kinds of harms that a company could encounter from lost of service, that is, failure of availability. List t
WINSTONCH [101]

Answer:PART A

(1) Virus attack

(2) Fraud achieved by manipulating records by hackers

(3) Intellectual property theft.

PART B

COMPUTER SYSTEM

PART C

It will hurt the company in the following ways

(1) Loss business opportunities

(2) Increase in cost of operation as it will result in making certain expenses for it to be restored

(3) Loss of work time.

Explanation: Harm is any unanticipated eventualities that are capable of adversely affecting a person or an organisation. Harm can be as a result of theft or loss of certain resources which includes the COMPUTER SYSTEM.

When this loss takes place it can lead to Virus attack,fraud can be achieved by harkers through the manipulation of records, intellectual property theft.

THROUGH THIS HARM THE COMPANY WILL LOSS WORK TIME, LOSS SOME AMOUNT OF MONEY AND SOME BUSINESS OPPORTUNITIES.

5 0
1 year ago
UDP and TCP use 1s complement for their checksums. Suppose you have the following three 8-bit bytes: 01010011, 01100110, 0111010
Aleonysh [2.5K]

Answer:

One's complement = 1 1 0 1 0 0 0 1.

To detect errors, the receiver adds the four words (the three original words and the  checksum). If the sum contains a zero, the receiver knows there has been an error. All  one-bit errors will be detected, but two-bit errors can be undetected (e.g., if the last digit  of the first word is converted to a 0 and the last digit of the second word is converted to a  1).

Explanation:

See attached pictures.

6 0
1 year ago
Other questions:
  • The term drive app is used to describe applications stored on a computer true or false
    11·2 answers
  • Allie is choosing a URL for her band’s website, which is the best method of making the URL easy to understand? creating a URL wi
    8·2 answers
  • In its simplest form, communication is defined as ________.
    7·1 answer
  • A slide in Blake's presentation contained the following information:
    11·1 answer
  • Which data type change will require the app builder to perform the additional steps in order to retain existing functionalities?
    14·1 answer
  • The Web can play a significant role in making large amounts of information available to decision makers. Decision makers must be
    10·1 answer
  • Allison wants to use equations to simplify the process of explaining something to the Sales team, but the default eq
    8·2 answers
  • Assign max_sum with the greater of num_a and num_b, PLUS the greater of num_y and num_z. Use just one statement. Hint: Call find
    5·1 answer
  • A computer application such as Microsoft Access that is used to store data and convert it into information is a ________________
    6·1 answer
  • Which 2 problems does the Pay down credit card workflow solve for clients? (Select all that apply) It helps clients stay on top
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!