subject
Computers and Technology, 02.10.2019 17:30 mochoa4

Adiscount store chain has a data breach, which means that a hacker now has the credit card numbers of every customer who shopped at that store in the last month. as a result, customers are angry with the store because they have to respond to credit card fraud, and so sales decrease at the store. which of the following would have most likely prevented this problem?
a
investing in faster processors

b
investing in more mainframes

c
investing in better security

multiple choice
question 10
which of the following is not a way that a company can improve the security of the data that it collects?
1points
a
increasing its upload speed

b
requiring stronger passwords

c
encrypting information

multiple choice
question 11
which of these statements describes the difference between binary and decimal numbers?
1points
a
binary numbers are shorter to write than decimal numbers.

b
binary numbers use only the digits 0 and 1; decimal numbers use 0 through 9.

c
binary numbers are easier for people to read than decimal numbers.

multiple choice
question 12
which of these number systems uses the most unique characters?
1points
a
binary

b
decimal

c
hexadecimal

multiple choice
question 13
if you saw the number bdb76b used to describe a color in a computer program, which number system is being used?
1points
a
decimal

b
hexadecimal

c
roman numerals

multiple choice
question 14
why are hexadecimal values used to represent color in computer programs?
1points
a
they are easier for humans to interpret.

b
they are easier for computers to interpret.

c
they are able to represent more colors than binary numbers.

multiple choice
question 15
processor speeds are given in hertz. one hertz refers to what?
1points
a
one transfer from binary to hexadecimal

b
one use of an input device

c
one fetch-decode-execute cycle

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 04:31
Q13 what function does a security certificate perform? a. creates user accounts b. scrambles data c. identifies users d. creates password policies e. provides file access
Answers: 1
question
Computers and Technology, 23.06.2019 06:40
What are the three uses of a screw?
Answers: 2
question
Computers and Technology, 23.06.2019 13:30
Font size, font style, and are all aspects of character formatting.
Answers: 2
question
Computers and Technology, 23.06.2019 15:00
1. which of the following statements are true about routers and routing on the internet. choose two answers. a. protocols ensure that a single path between two computers is established before sending packets over it. b. routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic. c. a packet traveling between two computers on the internet may be rerouted many times along the way or even lost or "dropped". d. routers act independently and route packets as they see fit.
Answers: 2
You know the right answer?
Adiscount store chain has a data breach, which means that a hacker now has the credit card numbers o...
Questions
question
Mathematics, 02.08.2019 21:00
question
Mathematics, 02.08.2019 21:00
Questions on the website: 13722367