Zelda has been a victim of cybersecurity attacks twice, losing considerable sums of money each time. How can she ensure that she does not become a victim to it again

Answers

Answer 1

What Zelda who has been a victim of cybersecurity attacks do so as to avoid the occurrence in future is to : configure all her gadgets so they can download as well as install security updates automatically.

cybersecurity attacks can be regarded as cyber crime where the information of people are used to commit crime.

So for Zelda not be a victim again she need to configure her gadget so security update can be done automatically so as to avoid the occurrence.

Learn  more

https://brainly.com/question/24189453?referrer=searchResults


Related Questions

2. It enables you to gather data on a specific topic. *a.Interviewb.Questionnairec.Surveyd.Research

Answers

Answer:

Explanation:

am pro

Latonya wants to include a website link in her newsletter so readers can click the link and go straight to the website. What kind of formatting does she need to use

Answers

Based on the information given the kind of formatting she need to use is hyperlink.

Hyperlink is link that enables users or readers to go directly to another website or another webpage.

Hyperlink can be included in a website in form of  text or in form of a bookmark which help to lead  user to another page once the user click on the link.

This link can be included in a webpage or newsletter to serve as a reference for user and they are often  underlined or may include "click here".

Inconclusion  the kind of formatting she need to use is hyperlink.

Learn more about hyperlink here:https://brainly.com/question/3027709

The variable names references an integer array with 20 elements. Write a for loop that prints each element of the array.

Answers

Answer:

what language?

Explanation:

In Java:

import java.lang.reflect.Array;

public class Main {

public static void main(String[] args) {

 

 int[] arr = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20};

 

 for (int i = 0; i < Array.getLength(arr); i++) {

  System.out.println(arr[i]);

 }

}

}

------------------------------------------------------------------------

Notice, the program is printing the value equivalent to the index at given moment, so if you array is made of String or other type that's not int, it will work the same.

Following are codes to the given question:

Code Explanation:

In this code, a for loop is declared that uses an integer "i" variable that holds array value and inside the loop, a print method is used.In this print method, it's the all array element value.

Code:

for (int i = 0; i < length; i++)//defining a for loop that holds array value and use print method that prints array value    

cout<<names[i]<<endl;//print array value

Please find the program in the attached file.

Learn more:

brainly.com/question/15207448

Martha pays $3,335 every month for her house payment. She has made 86 payments up till now. How much has Martha paid for her house in all so far?

Answers

Answer:

286810

Explanation:

86*3335=286810

what is the advantage of 2022 maxima’s over-the-air software and map updates?

Answers

The benefit of 2022 maxima’s over-the-air software and map updates is that it keeps an individual to be connected on-the-go.

It should be noted that over-the-air software and map updates are typically performed automatically with minimal input from the driver through the available wireless network.

An advantage of 2022 maxima’s over-the-air software and map updates is that it keeps an individual to be connected on-the-go. It's essential to provide the driver with the ability to turn the vehicle into a powerful WiFi hotspot.

Read related link on:

https://brainly.com/question/25660340

Match all the words to its definitions

Please, no links, and answer all of the 7 words to its definition.

Answers

Answer:

Explanation:

from top to bottom

1

2

7

3

4

5

6

question. answer

1.1

2.2

3.7

4.3

5.4

6.5

7.6

What connection method eliminates the need to provide a bank user name and password after the initial setup process

Answers

Based on the internet and networking process, the connection method that eliminates the need to provide a bank user name and password after the initial setup process is known as "OAuth."

This is because OAuth is a type of connection that allows users not to provide their bank username and password after initial setup.

OAuth is a common internet protocol known as an open standard for access delegation.

OAuth is utilized on web applications to allow users to log in without passwords.

Hence, in this case, it is concluded that the correct answer is "OAuth."

Learn more here: https://brainly.com/question/17079128

What is a computer? (in your own words)

Answers

Electronic device used to do work or play on

A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

Answers

Malware
Hope this helps

Answer:

Dictionary Attack

Explanation:

Melody is organizing a bake sale and making a program to help her plan the ingredients. Each batch of cookies requires 3 eggs, and she's going to make 9 batches. This code calculates the total eggs required:

Answers

The program is a sequential program, and does not require loops, iterations or conditions.

The program in Python, where comments are used to explain each line is as follows:

#This initializes the number of batches to 9

batches = 9

#This initializes the number of eggs per batch to 3

eggs = 3

#This calculates the total number of eggs

totalEggs = eggs * batches

#This prints the total number of eggs

print("Total=",totalEggs)

Read more about Python programs at:

https://brainly.com/question/16397886

Instructions
Write a program that uses a while loop to calculate and print the multiples of 3 from 3 to 21. Your program should print each number on a separate
line.
Expected Output
3
6
9
12
15
18
21

Answers

Answer:

num = int(input('1'))

while num < 21:

   num = num * 3

   print(num)

i think this is correct, but i only know some basics to python.

In the event of a file catastrophe, ____ can be used to restore the file or database to its current state at the time of the last backup.

Answers

In computer technologies, there are some ways that data which has been lost, can be retrieved. But not in all cases. In the event of a file catastrophe, recovery procedures can be used to restore the file or database to its current state at the time of the last backup.

In computing, data recovery is simply known as the method of saving or  salvaging data that are inaccessible, lost, corrupted, damaged or formatted from secondary storage, removable media etc.

This form of recovery often  restores data that has been lost, accidentally deleted etc.

In Firm or organization IT, data recovery is simply the restoration of data to a desktop, laptop, server or external storage system from a backup.

Learn more from

https://brainly.com/question/17968818

2. 25 POINTS!!!!!!!!!
The essential idea behind digital citizenship is that _____.

A. we all have rights

B. we all impact each other

C. we must defend against attacks

D. we all have responsibilities

Answers

Answer:

d. we all have responsibilities.

Explanation:

The essential idea behind digital citizenship is that we all have responsibilities.

Why digital citizenship is an essential?

Digital citizenship is known to be a type of citizenship  where there is a responsible use of technology.

Hence, It is essential of digital citizenship to be taught as it helps students to attain and know more about digital literacy, digital responsibility, and others.

Learn more about citizenship from

https://brainly.com/question/11052165

How do you tell if a text message offer is a scam?

Answers

Answer:

By the #

Explanation:

the web __________ the same thing as the internet.

Answers

it would be the world wide web:) hope this helps!

Each box on a spreadsheet is called a?
row
column
cell
box

Answers

c. a cell :))
got the right answer <3

Grayson received a text message from his friend asking him to play video games. He is going to send this message back: "I can't today. I have swim practice." Grayson wants to change the tone of his message to show he is excited. What can he do to add emotion?

Answers

Answer:

Add an exclamation mark to show he's excited.

Explanation:

true or false computers in a LAN are most likely to be connected using infra red

Answers

Answer: false

Explanation:

Why does my phone keep shutting off and restarting?

Answers

Answer:

If you rooted it, it might be because the action bricked the phone somewhat. There's also a possibility that some hardware component is faulty.

What describes Accenture's approach to automation?

Answers

There are different ways that are often used to achieve a goal. Accenture's approach to automation is said to be human-centered.

Accenture's approach entails giving their client custom based service via the use of a cloud based system that helps their clients to focus on automatic system. This is known to result in better business operations.

Accenture's myWizard often helps their clients through their automation journey. They help by creating, implementing, and measure enterprise-wide automation strategies for their client.

See full question below

What describes Accenture's approach to automation?

1.cloud-centered

2.human-centered

3.intelligence-centered

4.machine-centered

Learn more from

https://brainly.com/question/24434735

Discovery of user requirements, existing system evaluation, and logical system design are part of the _____ phase of the Systems Development Life Cycle (SDLC).

Answers

Answer:

analysis

Explanation:

The Discovery of user requirements, existing system evaluation, and logical system design are part of the analysis phase of the Systems Development Life Cycle (SDLC).

What is the System Development Life cycle?

The systems development life cycle (SDLC) is a project management conceptual model that defines the processes involved in an information system development project, from early feasibility studies to application maintenance. SDLC is applicable to both technical and non-technical systems.

The phase of the system development life cycle whose parts involve the discovery of user requirements, existing system evaluation, and logical system design is the Analysis phase.

Hence, the phase is the Analysis Phase.

Learn more about the System Development Life cycle here:

https://brainly.com/question/28498601

#SPJ2

If the characters 'd', 'c', 'b', 'a' are placed in a queue (in that order), and then removed one at a time, in what order will they be removed?.

Answers

Answer:

a b c d

Explanation:

I'm just using the characters to reach the characters minimum

Which of the following statements regarding animation in a slide use is true?

Question 3 options:

Animations occur automatically by default


An object can have up to three stacked animatios.


A slide can only have one animation


Animations occur On Click by default

Answers

Answer:

Animations occur automatically by default

100 POINTS!!!!!!!!
To safeguard against losses of computer equipment and important information, businesses should train their employees about _____. Select 3 options.

A. not using unknown devices

B. securing unattended equipment

C. avoiding natural disasters

D. monitoring colleagues

E. not using free WiFi

Answers

Answer:

A, B and E

Explanation:

Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.

Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.

Option C is not correct as it is simply not possible.

Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.

Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).

Hope this helps!

Please answer the following questions:

[1] What is cyberbullying? [5marks]

[2] What is plagiarism? [5marks]

[3] What do you understand by ergonomics? [5 marks]

[4] What is identity theft? [5 marks]

[5] Who is an excellent digital citizen? [5 marks]

Answers

1) Bully that takes place on technology/ social media
2) copying of work, is illegal
3) ergonomics is the study of people's efficiency in their working environment
I think it’s asking you what helps you learn
4) Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
5) my mom, she knows what is right and wrong, exhibits intelligent technology behavior, and makes good choices when using technology

A(n) __________ structure is a structure that causes a statement or a set of statements to execute repeatedly.

Answers

Answer:

you cant do anything with the start of the question unless you explained more about it

Explanation:

Anybody know the answer to this question?

Answers

Answer:

sorry i need pointssssss

Which of the following is NOT an example of an Information system?
Electrical system
Transaction processing
Expert system
Customer relationship management

Answers

Answer:

Electrical system is not an example of an info system.

The following option which is NOT an example of an Information system is electrical system.

What is information system?

The system of hardware and software that are integrated to form a integrated system. This system allows information to transfer from one user end to another user.

Transaction processing, Expert system and Customer relationship management requires end to end encryption with information sharing. These are the information system except electrical system. The electrical system only supplies electricity to lighten up homes and industries.

Thus, Electrical system is not the information system.

Learn more about information system

https://brainly.com/question/13299592

#SPJ2

The amount of memory used by an array depends upon the array's data type and the number of elements in the array. True False

Answers

Answer:

True

Explanation:

If a student ate 3/4 (three-fourths) of their meals away from home, what % of the total day is spent eating other than at home?

Answers

Answer:

Its 6%

Explanation:

8% = 0.08

3/4 = .75

(0.08) (.75) = 0.06 Or 6%

Hope It Helps ••

Other Questions
What was sandras relationship with alex General George C. Marshall's role in the U.S.Government after WWII was which of thefollowing?A. Secretary of StateB. Vice PresidentC. Minister of Defense A sample of a compound has been analyzed and found to contain the following:38.71% carbon, 9.75% hydrogen, and 51.54% g oxygen. If the molar mass ofthe compound is determined by experiment to be between 62 and 63 g, what arethe empirical and molecular formulas of the compound? Someone plz help me :( Which of the following describes an action-reaction pair?A. The Sun's gravity pulls on you, and Earth's gravity pulls on you.B. Your backpack pulls down on your shoulders, and your feet pushon the ground.C. Your feet push down on the ground, and the ground pushes up onyour feet.D. You push on a wall, and your feet push on the ground. greg invested 20 dollars and doubled his money in 4 years. ashley also invested 20 dollars, and after 4 years the amount was equal to 20 to the second power. who had more money after four years? What is 8m+7+m=16 and i need the work too pls help me Find the value of xplease helpPlease show work- 7.4x = - 22.2 A sum of 2 integers is 41 and their difference is 5. Find the integers. Author Kristin Lewis writes, The objects didnt seem to have pilots, though they occasionally darted and flipped. The words darted and flipped tell you that the objects."?A. landed and took off.B. grew smaller and bigger.C. moved slowly and cautiously.D. moved quickly and unusually. why are viruses referred to as obligate parasites? Im not the greatest at physics my strong points are writing but I really need to do this to pass science this trimester pls help!Theres more questions but I can only add 5 questions so- haha ima put the rest in different questions! Solve for g .g + (-5) = 27g = ???(PLZ SOLVE CAREFULLY) How do individuals develop values and beliefs? what was part of president johnsons plan for reconstrusction A gas has a volume of 0.215 L and a temperature of -20.0 oC. The gas is heated to 60.0 oC at constant pressure. What will happen to the volume of the gas Please help i need to do this and study a different class later in the diagram below, line AB bisects CD at point E. If CD = 13x-15 and EC=5x+9, find the length of EC and the length of CD a student places iron metal over a flame, and begins to react with oxygen gas in the air. A red, powdery solid begins to form on the iron. What is the name of the red solid? The total time that it takes all 5 students ahead of you to receive help from the TA is a random variable. What is the mean of this total time