Question and answer
Define Emotion
Emotion is a strong feeling (such as love, anger, joy, hate, or fear).
Expert answered|arthur2647|Points 61|
Question
Asked 9/23/2012 6:11:20 PM
Updated 3/31/2015 11:15:54 PM
0 Answers/Comments
This answer has been confirmed as correct and helpful.
Edited by yumdrea [3/31/2015 11:15:44 PM]
s
Get an answer
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
Where should Biliofind have placed firewall in its network and what kind of rules they should have used tofilter network traffic?
Weegy: The computers we use in today’s society are advancing every day. Every child and adult can operate or manipulate most home computers. [ We are being taught that to succeed in today’s electronic world, the computer will help in providing all the answers. One of the problems we face with the computer is that there are so many rights versus wrong, or good versus bad things that can be done using a computer. In this report we will discuss how Bibliofind might have used firewalls to prevent the intruders from gaining access to its transaction servers, how encryption might have helped prevent or lessen the effects of Bibliofind’s security breach, and the California law requiring companies to inform customers when private information might have been exposed during a security breach. How Bibliofind might have used firewalls to prevent the intruders from gaining access to its transaction servers, where the firewalls should have been placed in the network, and what kinds of rules they should have used to filter network traffic at each point. For people who are not familiar with a lot of computer terms, “a firewall is software or a hardware-software combination that is installed in a network to control the packet traffic moving through it. The firewall provides a defense between a network and the Internet or between a network and any other network that could pose a problem (Schneider, 2011, p.479)”. If Bibliofind had wanted to prevent intruders from gaining access to its transaction servers they should have used “trusted” networks where they had the client information. It is known that networks outside the firewall are unreliable (untrusted) and could cause a problem. The firewall acts as a filter to allow selected messages to flow in and out of the network. The firewall should not stop people who want to do business with Bibliofind, but restrict any and all (employees included) ] (More)
Question
Expert Answered
Asked 9/16/2012 7:47:23 AM
0 Answers/Comments
explain how encryption might have helped prevent or lessen the effects of Bibliofind's security breach.
Weegy: If Bibliofind used secure sockets layer (SSL) encryption to transmit data over secure sockets, the security breach would have failed, or at least would have been less severe. [ Had the data been encrypted, the hackers would have ended up with MD5 hash, or some other form of encrypted values that they could not decrypt without the server-side keys. The architecture of the Bibliofind database should have had encrypted fields that could only be decrypted with the server-side encryption keys. The cost of this would have been very minimal as we can get SSL keys from various providers (ie – Verisign) for very cheap. Data encryption does not stop intruders from opening or exposing security holes on a server, however encryption makes it very difficult to render stolen data in to any kind of usable format. If Bibliofind did utilize data encryption, the intruders would have either spent a lot of time trying to break the encryption keys, but more than likely moved on to another site that did not have any encryption. From this we learn how important data encryption is any time we conduct e-business. Unfortunately it sometimes takes these breaches in order make our technologies stronger, but we learn lessons and learn to become more effective in future projects. ] (More)
Question
Expert Answered
Asked 9/18/2012 8:42:02 AM
0 Answers/Comments
What legal issues a company would have t deal with if their data is compromised?
Weegy: When the compromise could result in harm to a person or business, call your local police department immediately. Report your situation and the potential risk for identity theft. [ The sooner law enforcement learns about the theft, the more effective they can be. If your local police are not familiar with investigating information compromises, contact the local office of the FBI or the U.S. Secret Service. For incidents involving mail theft, contact the U.S. Postal Inspection Service. Check the blue pages of your telephone directory or an online search engine for the number of the nearest field office. Notifying Affected Businesses Information compromises can have an impact on businesses other than yours, such as banks or credit issuers. If account access information — say, credit card or bank account numbers — has been stolen from you, but you do not maintain the accounts, notify the institution that does so that it can monitor the accounts for fraudulent activity. If you collect or store personal information on behalf of other businesses, notify them of any information compromise, as well. ] (More)
Question
Expert Answered
Asked 9/25/2012 6:13:12 AM
0 Answers/Comments
What is a Synopsis?
Weegy: A synopsis is a brief summary of the major points of a subject or written work or story, either as prose or as a table; an abridgment or condensation of a work. (More)
Question
Expert Answered
Updated 4/23/2015 9:23:17 PM
0 Answers/Comments
34,876,502
questions answered
Popular Conversations
The correct plural of the noun attorney is _______. The primary ...
Weegy: The correct plural of noun attorney is attorneys.
12/3/2021 7:52:06 PM| 14 Answers
______ contain close to 70% of all the fresh water on Earth. _______ ...
Weegy: Glaciers contain close to 70% of all the fresh water on Earth.
12/6/2021 2:35:52 PM| 9 Answers
For each blank, write a word that is an antonym of the italicized ...
Weegy: 1. He couldn't bear the cold of Alaska after living in the heat of Texas. He has been accused of theft, but we ...
12/1/2021 5:52:40 PM| 8 Answers
1. What was the purpose of the Articles of Confederation? 2. When ...
Weegy: The purpose of the articles of confederation was To create a system of government to run the nation.
12/2/2021 7:00:06 PM| 7 Answers
_______ contain close to 70% of all the fresh water on Earth. _______ ...
Weegy: Glaciers contain close to 70% of all the fresh water on Earth. Wind erosion is most common in flat, bare areas ...
11/27/2021 6:09:43 PM| 7 Answers
The four main purposes for academic writing are to _______, _______, ...
Weegy: The four main purposes for academic writing are to Inform, Entertain, Persuade, and Convince.
11/29/2021 9:35:28 PM| 5 Answers
A stream s velocity is _______ at the bottom and edges. A stream s ...
Weegy: A stream velocity is slowest at the bottom and edges.
12/6/2021 9:20:14 PM| 5 Answers
The painting _______ is an example of a political work of art. A/an ...
Weegy: The painting Massacre in Korea is an example of a political work of art. A carving is a design or impression ...
12/4/2021 12:38:26 AM| 4 Answers
GET
Answers.
GET THE APP.
weegy*
*
Get answers from Weegy and a team of really smart live experts.
S
L
Points 183 [Total 631] Ratings 0 Comments 173 Invitations 1 Offline
S
L
P
P
L
P
P
P
L
P
Points 177 [Total 10354] Ratings 2 Comments 157 Invitations 0 Offline
S
L
Points 173 [Total 584] Ratings 2 Comments 153 Invitations 0 Offline
S
L
Points 93 [Total 226] Ratings 0 Comments 93 Invitations 0 Offline
S
Points 87 [Total 87] Ratings 0 Comments 87 Invitations 0 Offline
S
Points 36 [Total 36] Ratings 0 Comments 36 Invitations 0 Offline
S
L
1
1
1
Points 21 [Total 3596] Ratings 2 Comments 1 Invitations 0 Offline
S
L
R
R
Points 19 [Total 539] Ratings 0 Comments 19 Invitations 0 Offline
S
L
Points 19 [Total 860] Ratings 0 Comments 19 Invitations 0 Offline
S
Points 10 [Total 54] Ratings 0 Comments 0 Invitations 1 Offline
* Excludes moderators and previous
winners (Include)
Home | Contact | Blog | About | Terms | Privacy | © Purple Inc.