Answer:
Find answers below.
Explanation:
Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.
Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.
Phishing is simply a form of cyber attack which typically involves making an attempt to obtain sensitive user informations such as usernames, passwords and credit card details or bank account details by disguising one's self as a trustworthy entity in an electronic communication usually over the internet.
Generally, the type of people who are susceptible to being duped by "phishing" attacks are those who post or share their email address or contact informations on public forums and don't scrutinize and examine a message before acting on it.
In conclusion, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.
Answer:
what do you look like?
PLEASE I NEED HELP FAST
Answer:
your answer will be src=
pls any one what is pheumatic and hydrautic
Answer:
pheumatic is a branch of engineering that make use of gas
hydraulic is a technology and aplied science using engineering
En la 4ta revolución industrial se caracteriza con 3 procesos de aprendizaje o criterios, los cuales son:
Explanation:
-Uso de herramientas digitales
-La inteligencia artificial
-El análisis de datos para formar personas altamente competitivas
write a program to enter RADIUS of a CIRCLE and PRINT AREA of TRIANGLE using Q Basic. (class 8)
Answer:
The program is as follows:
10 INPUT RADIUS, BASE, HEIGHT
20 CIRCLE = 3.142* RADIUS * RADIUS
30 TRIANGLE = 0.5* BASE * HEIGHT
40 PRINT CIRCLE
50 PRINT TRIANGLE
60 STOP
Explanation:
The program description doesn't tally;
In other words, it is impossible to calculate the area of a triangle using the radius of a circle.
So, I designed the program to get input for radius, base and height.
Get input for radius, base and height
10 INPUT RADIUS, BASE, HEIGHT
Calculate area of circle
20 CIRCLE = 3.142* RADIUS * RADIUS
Calculate area of triangle
30 TRIANGLE = 0.5* BASE * HEIGHT
Print area of circle
40 PRINT CIRCLE
Print area of triangle
50 PRINT TRIANGLE
End of program
60 STOP
The lines that can be formatted to display on the edges of cells are called _______.
style lines
edge lines
borders
underlines
Answer:
borders
Explanation:
Borders can be formatted in cells of excel or goog.le sheets. You can change width, shape, color, and whole plethora of things!
The lines that can be formatted to display on the edges of cells are called [tex]\boxed{ borders . }[/tex]
a. style lines
b. edge lines
c. borders ✔
d. underlines
[tex]\large\mathfrak{{\pmb{\underline{\orange{Mystique35 }}{\orange{❦}}}}}[/tex]
whats the answer :)?
i will give brainslist
Answer:
Transmission medium is the answer
Software and technology that allow people to work together on a task are known as
Collaborative software or groupware.
Answer:
Collaborative software
1.can you identify the materials needed in making simple circuit???
2.what is the use of each material
in making simple circuit???
Explanation:
Small light bulb (or a flashlight bulb): To detect the power supply through the circuit.Wire (of suitable length and ampere specifications): To connect the electrical elements for the supply of power as electric current. Bulb holder: To mount the bulb, connecting it to the power source.Battery with the appropriate voltage for the light bulb: As a source of electric power. Two alligator clips: To connect the wire-terminals of the circuit to the terminals of the battery. Electrical tape: To insulate the wire joints/connections at any point. Switch: To toggle the power supply in the circuit.Use the drop-down menus to complete the sentences describing the important ideas in Hess's theory. Hess expanded on Wegener's theory of continental drift . Hess proposed the idea that are places where crust is created.
Answer:
Following are the solution to the given question:
Explanation:
The hypothesis of continental drift from Wegener; Stein suggested that crust was formed within mid-ocean crises.
The first one is mainland drift, and the second is mid-ocean ridges. You have taken the test Use the dropdown menu to type out the phrase that describes Hess's theory as true major ideas.
Wegener's hypothesis of plate tectonics was expanded by Hess. Hess suggested that crust is produced in the mid-ocean ridges.
Answer:
Continental drift
mid-ocean ridges
Explanation:
What is machine level language ?
Explanation:
The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1. As we know that computers can understand only machine instructions, which are in binary digits, i.e., 0 and 1, so the instructions given to the computer can be only in binary codes.
E) ¿Entiende usted que tendría repercusión legal un mal manejo de los datos del cliente por parte de la empresa? ¿Por qué?
Answer:
Efectivamente, un mal manejo de los datos del cliente por parte de la empresa tendría repercusiones legales que afectarían negativamente a la compañía. Esto es así porque un eventual mal manejo de los datos personales de los clientes implicaría una filtración de dichos datos hacia el resto del público, con lo cual los datos personales y privados de cada cliente se verían expuestos en forma pública, generando así posibles daños a estos a través de la mala utilización de dicha información por parte de terceros malintencionados.
I get such an error when I turn on the computer, how can I fix it?
Answer:
Use the HLL ( Java C++ ) code to fetch the commands of that program, then translate them using any translatory program such as Microsoft notepad.
Or:
Download any utility software such as Avast, thunderbird, Dr. Solomon, or Norton software
Then install it to memory.
Define the terms data and information ??
Answer:
Data is an individual unit that contains raw materials which do not carry any specific meaning. Information is a group of data that collectively carries a logical meaning. Data doesn't depend on information. Information depends on data. It is measured in bits and bytes.
The remove() method in the Queue interface ________. Group of answer choices retrieves, but does not remove, the head of this queue, returning null if this queue is empty retrieves and removes the head of this queue, or null if this queue is empty retrieves, but does not remove, the head of this queue, throwing an exception if this queue is empty retrieves and removes the head of this queue and throws an exception if this queue is empty
The remove() method in the Queue interface ________.
A. retrieves, but does not remove, the head of this queue, returning null if this queue is empty
B. retrieves and removes the head of this queue, or null if this queue is empty
C. retrieves, but does not remove, the head of this queue, throwing an exception if this queue is empty
D. retrieves and removes the head of this queue and throws an exception if this queue is empty
Answer:D. retrieves and removes the head of this queue and throws an exception if this queue is empty
Explanation:In Java, the Queue interface is found in the java.util package and inherits from the Collection interface. It is used to store elements which are processed in the order in which they are inserted. This means that the first element will be processed first.
The Queue interface has many methods. Some of them are;
i. add(): allows elements to be added to the queue.
ii. remove(): retrieves and removes elements from the head of the queue. The head of the queue points to the first element of the queue. If the queue is empty, the remove() method throws an exception called the NoSuchElementException
iii. poll(): retrieves and removes the element at the head of the queue. Unlike the remove() method, if the queue is empty, a null is returned.
iv. peek(): retrieves but does not remove the element at the head of the queue. Just like the poll() method, a null is returned if the queue is empty.
_________________________ are people, places, and materials, either printed or non-printed, that can provide answers to inquiries.
Answer:
Information/knowledge resources
Explanation:
The process of looking for answers to questions that will lead to improved knowledge about a subject is known as an inquiry. The theories of enquiry includes abduction, induction, and deduction
An inquiry can provide the reasoning behind observation by making use of the theories of inquiry and sources that provide answers (information) about the (interrelated) events of the inquiry
Therefore, information and knowledge resources are the people, materials, and places, which can be in the printed, verbal, appearance form that have the capacity to proffer answers to inquiries
Choose the term that matches each description.
_____________ allows users to interact with computer hardware and application software.
______________allows users to complete specific tasks, such as creating a document.
______________allows programmers to create new applications.
Answer:
operating systems, word software, computer concepts for end users
Explanation:
operating systems allow users to interact with computer hardware and application software.
word software allows users to complete specific tasks, such as creating a document.
computer concepts for end users allows programmers to create new applications.
The answer is "operating systems, word software, and end-user computer concepts", and its further explanation can be defined as follows:
The OS includes and administers all applications and software which a computer or mobile device could indeed execute, meaning the governance of the device software or hardware.The software for word processing is used for manipulating texts like a resume or report these text documents. Usually, you type in text and the software offers copy, delete, and numerous page layout devices.Study tools and coding areas allow finished to tailor apps to their needs and understanding instead of expert developers.Thus, the answer is "operating systems, word software, and end-user computer concepts".
Learn more:
brainly.com/question/17798901
Write a structured algorithm that prompts the
user to input two numbers. The algorithm should
multiply both numbers and then prompt the
user to enter the answer. The algorithm should
compare the answer entered with that calculated
and output "correct answer" or "incorrect answer"
accordingly. At the start, input how many sums
will be done.
Answer:
Step 1 : Start
Step2 : Input first number, num1
Step3 : Input second number, num2
Step4 : product - - > num1 * num2 (product of num1 and num2)
Step5 : Input product, myanswer
Step6 : comparison - - - > correct or incorrect based on myanswer and product
Step6: print(comparison)
Step7: End
Explanation:
Algorithm is a sequence of instructions a computer is expected to follow to solve a particular problem.
Required :
Two inputs ; num1 and num2
Expected output
Algorithm :
Step 1 : Start
Step2 : Input first number, num1
Step3 : Input second number, num2
Step4 : product - - > num1 * num2 (product of num1 and num2)
Step5 : Input product, myanswer
Step6 : comparison - - - > correct or incorrect based on myanswer and product
Step6: print(comparison)
Step7: End
The two numbers to multiply are entered ; the product is calculated by the program ; the the user inputs his or her own expecteted product ;
Both are compared and the output of the comparison is displayed (either correct oe incorrect)
what are the advantages of saving files in a cloud?
Please help!!
how is a trade off best described ?
dilema
compromise
demand
complication
Write a loop that continually asks the user what food the user has in their refrigerator until the user enters apples, in which case the loop ends. It should acknowledge the user in the following format. For the first food, the user might say "hamburger," so your response would be, "You have a hamburger with a total of 1 food(s) if they enter hamburger, and so on until they enter “apples” at which point the loop ends. ---- make sure you save your file as "may28.py" *
(Disclaimer: I am not a professional, so it might not be the most concise answer possible, but I did run the Python script and it works)
Answer:
user_input = input("What food do you have in your refrigerator? ").lower()
count = 0
while True:
if user_input != 'apples':
count += 1
print(f'You have a {user_input} with a total of {count} food(s)\n')
user_input = input("What food do you have in your refrigerator? ")
else:
break
low frequency radio wave travel in straight line and high frequency radio wave can travel in all direction true or false
Answer:
The correct answer is True.
Explanation:
The electromagnetic spectrum consists of various waves. The Radio waves are categorized to be at the low-frequency end of this spectrum.
Radio Waves have multiple communication uses. Some of them are television and radio broadcasting, communications, and satellite transmissions.
Radio waves are not harmful to biotic life when absorbed by living matter and their transmission is unimpeded by air. Their transmission can also be absorbed, deflected, reflected, refracted, or diffracted by air molecules and the earth's surface.
Cheers
Tin học đã làm thay đổi công tác văn phòng ngày nay như thế nào?
What is a header row?
O the title of a document when it is centered
O the top row of a table that shows titles for the cells below
O the bottom row in a table that shows sums of numbers in cells
O the hidden space at the top of each page
Please help ASAP taking unit test
Answer:
b. the top row of a table that shows titles for the cells below
Explanation:
A header row is the first row of a given table that shows titles of the cells below it. In many cases, the header row has different styles from the other rows in the table. A header row can be found in, among others, both Microsoft's Excel and Word applications.
In the attached figure, the first row with a darker shade of background color is the header row for the table.
list 5 uses of computer
Answer:
if you a student..then you need it for sure
Explanation:
Microsoft Office
Doing assignment
doing report
answer online test/quiz
movie
make money
typing
play game
Identify characteristics of object-oriented programming design. Choose all that apply
-It breaks the solution into independent objects.
-it is a simple, uncomplicated approach to programming.
-It uses objects that send data to other objects.
-It supports a modular design that encourages the reuse of code.
Answer:
It breaks the solution into independent objects
It supports a modular design that encourages the reuse of code
Explanation:
Object-Oriented programming (OOP) is a programming language type that makes use objects and classes in its construct. With object-oriented programming software is structured as classes which are both reusable and simple code blueprints used for the creation of instances of the objects of the program
An object oriented program design breaks the solution of the problem the program is solving into independent objects, such that the objects are made of classes which are modular and reusable code
Therefore, the correct options are;
It breaks the solution into independent objects
It supports a modular design that encourages the reuse of code
Answer:
all expect b
Explanation:
use of concave mirrors
Explanation:
concave lens use for shaving mirrors and satellite
What is a signature?
a distinctive characteristic of a virus or virus family
an anti-spyware feature of Windows 7
a computer program that replicates itself and damages a computer system
a program that tracks a user’s activities online
Answer:
option a
never heard of b, c would be called a virus and d a cookie
Which risk mitigation framework allow scope for research and acknowledge for risk mitigation.
Answer:
NIST SP 800 30
Explanation:
Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Risk management can be defined as the process of identifying, evaluating, analyzing and controlling potential threats or risks present in a business as an obstacle to its capital, revenues and profits.
This ultimately implies that, risk management involves prioritizing course of action or potential threats in order to mitigate the risk that are likely to arise from such business decisions.
NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.
The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.
Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.
hvhblfffffffff
eafafaefafsa
What is a benefit of using a client/server network?
Cheap to maintain
Easy to install
Has a central, powerful computer
Unable to share files
Answer:
Has a central powerful computer
Explanation:
When operating a client - server network, a certain access mediun is created such that clients can access information, materials and services from a central computer, this poses great advantage in the area of security and control. Clients would be able to gain access from this central computer using either a local or wide area network. The accessibility provided through this powerful, central computer allows the the network to monitor what actions are being performed and make appropriate restrictions on the network, hence, preventing the invasion of malware and viruses. Hence, the central control is a great feature of a client - server network.