Explanation:
Hacktivist comes from the combination of two words --- "Hack" and " Activism" .
Hacktivist perform hacktivism that means they make use of technology and knowledge to support as well as promote the political agenda and any kind of change in the social event.
Cyberterrorism, on the other hand uses internet and technology and conduct terrorism and other anti national activities like to coerce the societies or the governments in pursuit of their goals which are religious, ideological or political.
While Hacktivism is used for a political cause, and is done in a peaceful manner; whereas cyber terrorism tries to grab the attention of the public through their aggressive ways, specifically by putting fear among the public.
But there is no instance of any person of getting killed by a cyber-attack or cyber terrorism. The larger damage is however done by those viruses or malware which gets into other persons computers or enemy organization computer system and weakens them and steals information and data. They damage and harm the economy in a larger scale.
When Chinese government first introduced the Trojan virus on the computer systems of their opponents abroad, is that can be called as Hacktivism? In essence, this act may be called as cyber terrorism and not hacktivism. Because the Chinese Government intend to cause major economic damage and harm to their opponents or enemy organization by targeting the software giants in the West.
These companies crashed and and many left jobless and unemployment, they caused economic problems and damage to the technologies. However, the Chinese Government's perspective on this is that they addresses such a thing as hacktivism as it advocates the state censorship by filtering the politically or the socially-unacceptable ideas in their e-mail.
Thus, the answer is relative as to whose perspective we are looking. Either we are taking the perspective of the Chinese government or that of the enemy organization which is affected by the act of the state censorship and targeting the Western software giants.
Cyberterrorism will somehow become a serious threat to the society when people adept at hacking will sympathize and also align with terrorists activities and cause. It has become appealing since some of computer programs have the features that are easily exploited and conducive for committing cyber terrorism.
What is the difference between operating systems and application software?
* Application software translates itself into language for the BIOS, whereas operating systems are what users
interact with
Application software is what the user interacts with, and operating systems are what translate application
software.
Application software is located within the hardware, and operating systems are what the user interacts with.
Application software is located within the hardware, and operating systems are what translate application
software for the BIOS.
Answer:
Application software is what the user interacts with, and operating systems are what translate application software
Explanation:
The difference between the operating system and the software is that the application system has user interaction and the operating system has a translate application. Hence option B is correct.
Waht is a opering system ?An operating system is software that manages the computer hardware and software resources and also provides the services to the computer program. The operating system works on the basis of time-sharing and schedules the tasks for efficient allocation of time.
The application software is based on the application that is developed by the company such as Microsoft or adobe.
Find out more information about the operating system.
brainly.com/question/1763761
Which explains extrinsic motivation? motivation in which there is a reward motivation that is personally satisfying motivation that is personally meaningful motivation in which the subject is interesting
Answer:
Motivation in which there is a reward.
Explanation:
Hope this helps God Bless.
The one that explains extrinsic motivation is motivation in which there is a reward. The correct option is a.
What is extrinsic motivation?Extrinsic motivation is characterized as an incentive to engage in an activity based on achieving an external goal, winning a competition, gaining acclaim and approval, or receiving a prize or cash.
The extrinsic incentive includes things like getting paid to complete a task. Even though you might prefer to spend your day doing something else, you are motivated to go to work because you need the rewards from your job to pay your bills.
In this case, your ability to pay for your everyday expenses serves as your extrinsic motivation. Such a desire or incentive is intrinsic if the reward is inherent in the job. However, if the reward is said to be unrelated to the position, the motivation is said to be extrinsic.
Therefore, the correct option is a, motivation in which there is a reward.
To learn more about extrinsic motivation, refer to the link:
https://brainly.com/question/1658150
#SPJ6
Which of these jobs would be most appropriate for someone who majors in information systems?
Answer:
An Architect, System Designers, IT business analysts etc...
Explanation:
Answer:An Architect and System Designers someone who studies complex work
Explanation:
Complete the statement below with the correct term.
A utility that provides names to each computer on a network is called a ____________naming service.
Answer:
DOMAIN
Explanation:
A utility that provides names to each computer on a network is called a DOMAIN naming service.
Question: 8
Which of the following is a benefit of the fault-tolerant nature of Internet routing?
The ability to use a hierarchical naming system to avoid naming
conflicts
The ability to provide data transmission even when some connections
between routers have failed
The ability to resolve errors in domain name system (DNS) lookups
The ability to use multiple protocols such as hypertext transfer
protocol (HTTP), Internet protocol (IP), and simple mail transfer
protocol (SMTP) to transfer data.
Answer:
The ability to provide data transmission even when some connections
between routers have failed
The statement which represents a benefit of the fault-tolerant nature of Internet routing may include the ability to provide data transmission even when some connections between routers have failed. Thus, the correct option for this question is B.
What is Internet routing?Internet routing may be defined as the process of transmitting and routing IP packets over the Internet between two or more nodes. It is identical to standard routing methodologies but incorporates packet routing techniques and processes on external networks or those that are hosted or Internet-enabled.
The fault-tolerant nature of Internet routing determines a benefit in the capability to deliver the transmission of data even when some connections between routers have failed without any disconnection and disturbances. Through this process, the selection of a path for traffic in a network or between or across multiple networks has been successfully carried out.
Therefore, the correct option for this question is B.
To learn more about Internet routing, refer to the link:
https://brainly.com/question/24812743
#SPJ5
WILL DO A BRAINLY! help pls.
How do you add a section break that would start the new section on the same page?
Answer:
Click the Page Layout tab, click Breaks, and choose Continuous.
A _____ pattern is a heart-shaped pattern that captures sound from a single direction, mostly from the front.
Answer:
Cardioid
Explanation:
Answer: A cardioid pattern is a heart-shaped pattern that captures sound from a single direction, mostly from the front.
Explanation:
How do you clean and maintain a mouse, keyboard, optical drive, computer display, and printers?
Answer: Mouse: to clean a traditional Mouse twist the plate that holds the ball and remove the ball then use a damp cloth to wipe the ball played and the surfaces and edges of the mouse to clean it Optical Mouse use the damp cloth to wipe the upper and lower surface of the mouse the lands area and ages of the mouse.
Keyboard: first shake the keyboard after turning it upside down to remove the does that might have accumulated in the slots and Cavities use a compressed air spray to blow away the contaminant between the keys of a keyboard. In addition spray with disaffected and wipe the keyboard throughly to remove all germs.
Optical drives: after a long. Of use the laser on an optical drive gathers dust and dirt therefore uses lens cleaner disc to remove contaminants from the laser in addition remove the optical drive in clean the tray with a damp cloth finally use a dry cloth to dry the tray before placing it back in the drive.
Computer display: to clean an LCD monitor use soft dip cotton cloth to gently wipe the screen if the computer display has a CRT screen dampen a cloth with the glass cleaner and gently wipe away the dirt from the screen.
Printers: use a damp cotton cloth to clean the inner and outer surfaces of the printer if there are cleaning Buns on the printer used in forehead cleaning and Cat cartridge cleaning in case he's cleaning buttons are not present when the computer contact the printer vendor for accurate directions to clean it.
Explanation: Here are some of the procedures that I would used to keep the peripheral devices clean.
16.
A cone has a volume of 4950 cm². If its vertical height is 21 cm, find its base radius.
take PI = 22/7
r = 15 cm
Explanation:formula
V = πr²×h/3
replace
4950 = 22/7×r²×21/3
4950 = 22/7×r²×7
4950 = 22×r²
r² = 4950/22
r² = 225
r = √225
r = √15²
r = 15 cm
Which of the following tasks is an interactive media professional most likely to do? Check all of the boxes that apply. 1. decide how a website should look 2.install an art-design–oriented software program for other users 3. monitor the network connection 4. test a software program to ensure that the visual elements are working 5. set up a new computer for the president of a company
Answer:
decide how a website should look and
test a software program to ensure that the visual elements are working
Explanation:
Answer:
A,D
Explanation:
The person above was right
The process of images displayed on the screen that enables the user to interact with the computer is called what?
Time-sharing
Networking
Graphical user interface
Program execution
After spending a year in India, Giovanna returns home to the United States and is inspired to raise money to help her new friends build a school. She makes a pitch to the Rotary Club in her hometown. This was the best experience of my life. Not only did I get to learn about a new culture and explore new ideas, but I am learning to speak their language. But don't just take my word for it. I've asked the children to join us today from India through web-conferencing, and they'd like to say a few words. Giovanna is using digital communications in a civic-minded way to improve the conditions of people in other countries. demonstrate the language of the children of India. increase her chances of getting into a top-notch college. do away with the digital divide
Answer: A) Improve the conditions of people in other countries. :)
Program code that can be evaluated to a value is called a(n):__________
Answer:
The answer is "expression"
Explanation:
An expression is a term or phrase, which is commonly used to transmits certain concepts, perceptions as thoughts. It is a mixed form of more than one operands, which is used to determines the values. It is a legal symbol, that combines the representing word like, operators, constants, and variables, that is arranged by language law.
please find the attachment for example.
If you were to conduct an Internet search on vegetarian restaurants, which of the following searches would be the best
to use?
'vegetarian restaurants
"restaurants
"vegetarians"
all of these
Answer:
A.
Explanation:
just did it
you really need to ask brainly for this question? obviously its vegetarian restaurants
which is the best reason for john to bring snacks to his study sessions.
To stay energized? There's no answers to choose from.
Answer:
C to ensure he has enough caffeine
Explanation:
You need energy to think and do and the other answers don't make much sense. Ex: He wouldn't avoid taking breaks because you need breaks, it's required, an essential of life pretty much. B makes no sense at all because why would you avoid leaving to get food? And a makes it difficult to decide whether it's A or D but if you really think about it, it doesn't make sense to bring food to enjoy yourself while in a studying session.
Hope this Helps! :)
9
How many total numbers can be represented with an 8-bit binary (base-2) system?
А. 127
В. 12В
Ос. 255
OD. 256
Answer:
D:256
Explanation:
Trust me
Answer:
The correct answer is 256
Explanation:
2^0=1
2^1=2
2^2=4
2^3=8
2^4=16
2^5=32
2^6=64
2^7=128
1+2+4+8+16+32+64+128=255, but 00000000(which is 0) also counts as a number, so the answer is 256.
The user enters a URL into a web browser, the web browser sends the information to the DNS server to look up the IP address, then the IP address is sent to the web (host) server. What is the final step in the DNS process?
A) The client sends a request to the DNS server.
B) The DNS server the IP adress back to the URL.
C) The process starts over back at the beginning.
D) The web server sends information back to the web broswer.
The final step in the DNS process is The web server sends information back to the web broswer.
What occurs when you enter a URL in one's browser?Note that if you enter a URL into a web browser. The browser is said to search for the IP address for the domain name through the use of DNS.
Furthermore, The browser then sends a HTTP request to the server and the server is known to also sends back a HTTP response back.
Learn more about web browser from
https://brainly.com/question/18455725
how many 16ths are in 3/8 of an inch
Answer:
0.375
Explanation: i think
What is the name of the access panel where you can configure the
appearance or actions in an application, operating system, or hardware?
Answer:
control panel
Which features can Danica use to fix the issue
Answer:
Hope you uderstand this answer
Alexis wants to learn HTML and CSS. She wants to test your coding skills in these design languages how can she practice code writing abilities?
what is similar software engineering, Hardware engineer, Network Architect, and Web developer?
I Am Pretty Sure The Answer Is - "B"
Hope This Help's
it is used to replace numeric number of a website
greatflombles or gr8flombles or go2flombles
Explain the four basic operation performed by every computer
Answer:
computer is a machine that, under a program's direction, performs four basic operations: input, processing, output, and storage. A program is a list of instructions that tells a computer how perform the four operations.
Answer:
A computer is a machine that, under a program's direction, performs four basic operations: input, processing, output, and storage. A program is a list of instructions that tells a computer how perform the four operations.
Explanation:
Some fashion designers use this type of technology to produce clothing.
Select one:
a. 3-D printing
b. dot matrix printing
c. color printing
d. inkjet printing
Answer:
The answer is A. 3-D printing.
Explanation:
As with other industries, 3D printing in fashion offers clothing manufacturers the chance to produce prototypes and final products in a way that saves time, money and manpower. 3D printing in the world of fashion is still very much in the primary stages, but it's certainly something to watch.
answer im timed i'll mark brainliest
Robert is creating a newsletter in Word and needs to have the ultimate flexibility on the placement of images and text. Which component is treated like an image but still allows free-flowing text? shapes styles pictures text box
Answer:
The answer is shapes.
Explanation:
Answer:
D: Text box
Explanation:
What type(s) of media can be pre-recorded (read only), recordable (write once), or re-recordable (read and write multiple times)? (2 points) Enter your answer
Answer:
An optical disc.
Explanation:
An optical disc is a small and flat digital-optical disc that is usually circular and used to store computer data by using a laser beam.
The optical disc is able to store digital data because it is made up of a polycarbonate (a tough-brittle plastic) with one (1) or more metal layers.
Additionally, the data stored in an optical disc cannot be scrambled by a magnet because it isn't made of a magnet or doesn't have a magnetic field. There are different types of optical disc and these are; CD-ROM, CD-R, CD-RW, DVD-RAM, DVD-ROM, DVD+/-RW, BD-RE, DVD+/-R, BD-R, BD-ROM.
Where; CD is an acronym for compact disc.
DVD is an acronym for digital video disc.
BD is an acronym for Blu-ray disc.
R represents read only.
RW represents read and write.
RE represents read, write and erasable.
Hence, an optical disc is a type of media that can be pre-recorded (read only), recordable (write once), or re-recordable (read and write multiple times).
Audiovisual means that a presentation combines film and photos.
true or false?
Answer:
False
Explanation:
Using both sight and sound.
Its false , as audio means it should have music or sound tracks in it.
Does this photo look good? I took it myself for photography class