A technology specialist is investigating a computer infected with malware. The investigator discovers that a data leak, which reveals the religious and political beliefs of a high-profile executive, results from the malware. Which data type did the malware compromise

Answers

Answer 1

The data type that was compromised by the malware is personally identifiable information (PII).

What is a PII?

PII is an acronym for personally identifiable information and it can be defined as a type of information (data type) that can be used by business firms (companies) on its own or with other relevant data, so as to identify a specific individual.

The examples of PII.

Some examples of personally identifiable information (PII) include the following:

Social Security numbersEmail addressHome address.Full nameReligious and political beliefs.

In conclusion, the data type that was compromised by the malware is personally identifiable information (PII).

Read more on PII here: https://brainly.com/question/24439144


Related Questions

what is live ware in relation to computer​

Answers

Answer:

It is a slang term used to denote people using (attached to) computers.

This is the tendency for items at the beginning of a list to be recalled more easily than other item:

A.) recency effect
B.)primacy effect
C.) butterfly effect

Answers

Answer:

B. Primacy effect

Explanation:

:3 have a wonderful day hope this helps

Answer:

B. Primacy effect

Explanation:

I need to code a simple racing game in c++. Help, please. ​

Answers

Can you attach what you have so far

Which of the following commands CANNOT be found on the Page Design tab? Question 2 options: Insert a text box Delete a page Change page orientation Specify a color scheme.

Answers

Answer:

The answer is, Insert A Text Box.

Hope this helps.

The command "Delete a page" cannot be found on the Page Design tab. The correct option is B.

What is command?

An instruction or collection of instructions issued to a computer or software program is referred to as a command in computing.

The Page Design tab does not contain the "Delete a page" command.

All of the additional instructions mentioned in the query can be discovered on the Page Design tab or other relevant tabs in different word processing or desktop publishing programs.

A frequently used tool for adding more text or graphic elements to a page is "Insert a text box," "Change page orientation" is frequently used to switch between portrait and landscape mode.

Also the "Specify a color scheme" might let users select from predefined color schemes for the text, background, and other elements.

Thus, the correct option is B.

For more details regarding command, visit:

https://brainly.com/question/3632568

#SPJ6

Portable devices have a software-controlled switch that disables all wireless functionality. What is the name of this software-controlled switch?.

Answers

I think airplane mode but I’m not 100%

A monitor is an output device. Which of the following is not a type of monitor? *

Light Emitting Diodes
Cathode Ray Tube
Laser Crystal Diodes

Answers

Answer:

cathode ray tube is the correct answer

Which call of the function correctly follows the instructions laid out in the api?.

Answers

Answer:

MoveElement("button1", "down", 25); This function finds the minimum number in a list.

Explanation:

Hope this helps

A row-level trigger requires use of the _____ keywords and is executed once for each row affected by the triggering statement.

Answers

Answer:

FOR EACH ROW

--

Hope this Helps!

A row-level trigger requires use of the  FOR EACH ROW keywords keywords and is executed once for each row affected by the triggering statement.

What is a row-level trigger?

Every row in the transaction has a row-level trigger that runs once. Triggers at the normalized only run once per transaction. used solely for data monitoring. used to enforce all extra security on transactions at the tabletop.

The FOR EACH ROW keywords must be used with a row-level trigger. Each row impacted by the trigger statement receives a single execution of this kind of trigger. A named group of SQL procedural instructions is known as a stored procedure.

Regardless of if the rows are changed by the add, updated, or removal event, a line trigger only fires once per trigger event. For each row impacted by the traumatic incident, a row trigger fires once. The trigger doesn't fire if none of the row are affected.

Learn more about row-level trigger, Here:

https://brainly.com/question/6850610

#SPJ12

Your development team is planning to host a development environment on the cloud. This consists of EC2 and RDS instances. This environment will probably only be required for 2 months. Which types of instances would you use for this purpose

Answers

The type of instances would you use for this purpose is known as On-Demand.

What is an on demand instance?

On-Demand Instances is known to be one that allows a person to pay for compute capacity usually by the hour or second with no long-term payment.

This is one that gives one a level of freedom from the costs and complexities of planning, purchasing, and keeping hardware.

Learn more about cloud from

https://brainly.com/question/25130975

who made the game Monopoly???

Answers

Answer:Lizzie Magie, Charles Darrow

Explanation:

What is the name of an instruction that interrupts a program being executed and requests a service from the operating system

Answers

“Interrupt” is what I think the answer is

HELPPP! MARK YOU THE BRAINLIEST!
Write one smart goal It has to be realistic ?
Background information The SMART in SMART goals stands for Specific, Measurable, Achievable, Relevant, and Time-Bound Defining these parameters as they pertain to your goal helps ensure that your objectives are attainable within a certain time frame.

Answers

Answer:

My goal is to have good grades because I failing now and I want to try and try to get my grade up

Explanation:

Microsoft cerrar sesion how to change it to english.

Answers

Press the three circles at the top I believe

During a slide show, Luis wants a picture to appear on one of his slides after the slide appears on the screen. Which type of animation should he use

Answers

The type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.

What is an Entrance Animation?

An entrance animation is an effect that controls how an object appears on a slide, starting at the start point of the object.

For example, using the entrance animation, Luis can make the object move slowly into the slide using a float-in effect.

Thus, the type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.

Learn more about entrance animation on:

https://brainly.com/question/20082198

Data ________ is important because it establishes an organization's rules for sharing, disseminating, acquiring, standardizing, and classifying data.

Answers

Data protection policy is important because it establishes an organization's rules for acquiring, standardizing and disseminating data.

What is Data protection policy?

These are policies adopted by organizations that help to ensure data is adequately protected.

When data isn't protected , it could get to the hands of criminals which could use it for different types of cybercrime and also to ensure compliance with data protection laws in the country.

Read more about Data protection policy here https://brainly.com/question/26493645

What are two advantages and disadvantages of using computer software?

Answers

Answer:

Advantages:

Multitasking

Multitasking is one among the main advantage of computer. Person can do multiple task, multiple operation at a same time, calculate numerical problems within few seconds. Computer can perform millions or trillions of work in one second.

Speed –

Speed –Now computer isn’t just a calculating device. Now a day’s computer has vital role in human life. One of the most advantages of computer is its incredible speed, which helps human to finish their task in few seconds.

Disadvantages:

Virus and hacking attacks –

Virus and hacking attacks –Virus may be a worm and hacking is just an unauthorized access over computer for a few illicit purpose. Virus can go to other system from email attachment, viewing an infected website advertisement, through removable device like USB etc.

Online Cyber Crimes –

Online Cyber Crimes –Online cyber-crime means computer and network may have utilized in order to commit crime. Cyberstalking and fraud are the points which comes under online cyber-crimes.

Advantage: It does EXACTLY what the programmer told it to do.

Disadvantage: It does EXACTLY what the programmer told it to do.

Software is instructions for a computer to follow. A computer will do so virtually always without fail other than the rare hardware or power issues, even in cases where it shouldn’t, and even in cases where any human would instinctively know that the instructions do not apply. I compare programming to writing instructions for a robotic idiot. It must be perfect, it must address every minute detail, and it must handle every case that will ever arise correctly. Humans write software. Perfection is rare for humans.

What is the name of the proicess of submitting and checking credentials to valideate or prove user identiy

Answers

Answer:

Authentication

10. Version control is a way to store code files with a detailed history of every modification to that code. True or False
This is for computer programming, I’m having a really hard time in this class and I need some help with this question. Any incorrect or spam answers will be reported. Thanks in advance!

Answers

Answer:

true

Explanation:

I hope this helps

when was the first computer built..

Answers

Answer:

1822 but it was a medical computer. not the same as computers today

Explanation:

The first computer was invented in 1822 but was built in 1991. It was invented by Charles Babbage.

Hope this helps!

True/False: Before a computer can execute a program written in a high level language, such as C , it must be translated into object code. True False

Answers

Answer:

True

Explanation:

How do i copy a canvas course from old class to new course.

Answers

Answer:

Open Settings. In Course Navigation, click the Settings link.Copy Course Content. Click the Copy this Course link.Create Course Details. ...Select Migration Content. ...Adjust Events and Due Dates. ...Create Course.

Explanation:

Follow The Steps

That's it

An IP address specifically belongs to:

Answers

Answer: An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network.

Explanation:

Pls help i need all of it today ill make you brainiest


In the text "my friend Walt Whitman" by Mary Oliver


1. Infer oliver does not directly state her purpose for writing. It is up to you to infer it based on details in the text. What is the main purpose for writing?Cite text evidence in your response



2. Evaluate how do the quotations from Whitman create an organization design for the essay? How does this organizational design support Oliver’s ideas?



3. Analyze how does Oliver support in the idea that Whitman was her friend? Cite evidence from the text in your response

Answers

The inference shows that the main purpose of writing the essay was to describe the benefits she got from getting to know Whitman.

What is an inference?

An inference simply means the conclusion that can be deduced based on the information presented in a literary work.

In this case, the main purpose of writing the essay was to describe the benefits she got from getting to know Whitman through his work.

Furthermore, the organizational design supports the idea of Oliver as she's trying to insinuate her writings and thoughts by Whitman's work.

Oliver supported the idea that Whitman was her friend as she was into Whitman's books that she spent most of her mornings reading them. She succored the idea that he was her friend through his poems.

Learn more about inference on:

https://brainly.com/question/24729498

A coworker is taking a computer overseas and asks you what concerns he should have. What do you tell him

Answers

Answer:

The components within the computer can get damage during travel, so he could improve the box protection with foam thingies

Explanation:

How to check if students viewed an assignment canvas.

Answers

Which app are you using?

Why are my texts green when texting another iphone.

Answers

Answer:

The green message background indicates the traditional SMS text message. It actually means a message that you have sent to someone else is through SMS message service instead of Apple iMessage

:

Which of the following is NOT a responsibility of an IT project manager?

A.
writing code

B.
managing the budget

C.
managing the schedule of the project

D.
assigning work to team members

Answers

Answer:

I think that The answer is A.

Explanation:

A project manager needs to be a leader which is assigning work, managing the schedule, and manage the budget.

In the name, it says Manager.
This is how I know that.

The one that is not a responsibility of an IT project manager is writing code. The correct option is A.

What is IT project manager?

The unique IT objectives of enterprises must be planned, organized, resourced, budgeted, and successfully carried out by IT project managers. Examples of such initiatives include the creation of apps and software.

One of the most difficult occupations is project management since no day is ever the same and you must use all of your project management abilities to address every issue.

Additionally, when an issue arises, your team will turn to you first. They might assume you have all the solutions to their questions. A project manager must be a leader who manages the budget, schedule, and job assignments.

Therefore, the correct option is A. writing code.

To learn more about IT project managers, refer to the link:

https://brainly.com/question/15404120

#SPJ2

the bookstore sold 8 books for $66 at that rate how much was one book

Answers

8x=66

8x/8 = 66/8

x=8.25$

Can someone please help me answer this question.
1. Select the correct answer. What is a digital portfolio?
A. a summary of your portfolio.
B. a presentation of your portfolio
C. a representation of your work
D. a preview of your most important work

2. Hadoop is a popular framework used for storing and processing big data. Which programming language was used while building this framework?
Hadoop is a popular_____ based framework used for storing and processing big data.​

Answers

Answer:

1. C. or D.

2. Hadoop is a popular Java-based framework used for storing and processing big data.​

Explanation:

For number 1 I think it's C because:

A digital portfolio is an online collection of work that represents your abilities and skills as a professional in your field. I could be D aswell!

Hope you do well!

How can you quickly locate emails with large attachments.

Answers

To locate emails with large attachments, go to your email and then choose the option of Choose File > Cleanup Tools > Mailbox Cleanup.

Here , one has to Log into their email account and open their inbox and then use the Search Mail bar and type Size to locate or they Set the Find items that are larger than to 9999 and then one has to click Find.

How do I find emails by attachment size?

This can also be done for messages that has a size equal to or bigger than 25.

One has to open their message and then they have to right-click on the attachment. You can choose Save As and save to the location of the choice you want.

Learn more about attachments from

https://brainly.com/question/978078

Other Questions
When preparing to capture video for a client, which three questions are important to ask the client? (Choose 3.)A) Marketing strategyB) Target audienceO C Client goalsD) Video purposeE) Target video codec When Akbars son was four years old, Akbar put $250 into an account that guaranteed a 10% annual return. The equation f(x)=250(1.10)^x-4 represents the amount of money in the account when the child will be x years old.Which graph models the scenario? why is music calming when your trying to concentrate The equation for line p can be written as y= 5/4 x6. Line q includes the point (5, 8) and is parallel to line p. What is the equation of line q? Whats the answer?????? Which of the three factors affecting image quality is altered by the light source?. Kennedy is working two summer jobs, making $11 per hour babysitting and making $8 per hour clearing tables. In a given week, she can work at most 17 total hours and must earn no less than $160. If x represents the number of hours babysitting and y represents the number of hours clearing tables, write and solve a system of inequalities graphically and determine one possible solution. PLEASE ANSWER how is Marian Anderson's singing changed the way Americans thought about African-American performers. Drag each tile to the correct box.Put the events in the correct order.NEED HELP ASAPPPThe Supreme Court ruled that thegovernment had not proven theircase for "prior restraint."The government sued the newspapersto get them to stop publishingthe information.Daniel Ellsberg leaked thePentagon Papers toThe New York Times andThe Washington Post.The New York Times publishedarticles that revealed a patternof government false statementsto the American people. What is the answer and how did you get it Find angle measure x on each given figure. (Lessons 9.2, 9.4, 9.5) Help me answer this question please Its not hard IM JUST REALLY TIRED I about 5 hours worth of khan lolI will consider marking Brainliest Complete the ghost story using the simple past/past progressive and past perfect/past perfect progressive.Jen:_________(tell )you what happened to my friend Paul? Tom: No, I don't think so. What________(happen)? Jen: Well, at the time of the incident, he________(live) in a house outside a small village. He________(walk) home one night when he________(see) someone outside his house. The man (6)________(wear) strange old-fashioned clothes. He said he________(be) in an accident and________(need) help. Tom: What________(happen) to him? Jen: He_______(stay) at a house on the hill and________(wake up) to discover that the house_______(be) on fire. By the time he_________(manage) to get out, the house_________(be) almost completely destroyed. Tom: How_______(react/Paul)? Jen: He_______(take) out his phone to call for help, but when he______(look up), the man________(go). Apparently, there was no house on the hill. The house that_________(be) there_______(burn down) a hundred years ago. What is one major problem created by globalization?A. Military conflicts between powerful nations have Increased.B. It has become more difficult to get products made in othercountries.C. Fewer workers are able to get an education related to their jobs.O D. An increase in international shipping has led to more pollution.SUBMI Ruth has a piece of wood that measures 2 2/9 feet. She cut off 1 1/3 feet of wood for a project. How much wood does she have remaining? (100 points) scatter plot is shown.A scatter plot is shown with numbers from 1 to 10 at increments of 1 on the x axis and numbers from 0 to 10 at increments of 1 on the y axis. The ordered pairs 0, 2 and 1, 3 and 1, 9 and 1.2, 4 and 1.9, 4 and 2.6, 4.2 and 3, 5 and 4, 5 and 4, 6 and 4.8, 6.1 and 5, 7 and 5, 7.9 and 6.9, 7.1 and 6, 8 and 7, 3.8 and 7, 8.2 and 7, 9.1 and 7.1, 9.8 and 8, 10 and 10, 7 and 9, 5.How many outliers does the graph show?1234 What does Schrdinger's cat explain in quantum mechanics?. What is the gist in spies in petticoats(if u do get me the gist of this article I will get u brainlist) Please please look at the picture and answer it. Thank you! I search it on Brainly but it kind of didnt answer this so please help-