Answer:
social engineering
Explanation:
The above scenario of USB use is an example of social engineering.
What is Social Engineering?This is known to be when a person gets phishing email via any method known as social engineering.
Conclusively, Social Engineering is a term that connote non-technical intrusion that depends on human linkage and it I one where a person is been tricked into breaking normal security means. It often makes use of USB drive for its purpose.
Learn more about social engineering from
https://brainly.com/question/26072214
A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.
It means that thw operating system is up to date with all the lastest protection systems like an anti virus. An example is that the operating system has a built in ransomware protection system ib place.
Hope this help please give the brainliest award
Why do we collect feedback on the code we write?
Answer:
to improve our code
Explanation:
"To improve our code" we collect feedback on the code we write.
Collecting feedback helps the users to learn whatever your consumers think approximately company reputation, performance, as well as merchandise or their items.Going beneath their basic likes as well as their dislikes and assisting you in understanding and evaluating wherever you may grow and where the business position in comparison to your competition.
Thus the above answer i.e., "option a" is correct.
Learn more about feedback here:
https://brainly.com/question/1603365
Which device do you think is the most important in the development of human civilization
Answer: The most important characteristic for the development of a civilization is the presence of advanced cities because they were centers of trade, which established economies and allowed for further development of the civilizations.
Explanation:
Your welcome :)
a falsh movies consist of how many frame?
what is my assurance wireless account number and pin
Answer:
Call Assurance Wireless at 1-(888)-898-4888 to access your account number. Your PIN is the 6-digit (or 10-digit) number you created, which is located on your welcome letter. Your account number can be found in the top right corner of any bill or by logging into your online account. Do not enter any dashes or hyphens.
Explanation:
pls mark as brainliest and hope this helps
It should be noted that your assurance wireless account number can be found at upper right-hand corner of any bill, and the PIN is the 4 digits that was given to the carrier during the call in.
According to the question, we are to discuss how individuals can know his assurance wireless account number as well as the pin.
As a result if this we can see that the Account number can be obtained at upper right-hand corner of bill as well as invoice, and the pin is usually 4 digit number.
Therefore, your assurance wireless account number upper right-hand corner of any bill.
Learn more about wireless account number at:
https://brainly.com/question/13162939
____ describes the period of time in a twenty-four-hour period that is spent at work.
I believe "Work-Shift" should be in the blank
in 2014, what percentage of the world population has access to the internet?
Answer:
At that time 43.9% of people have access to the global internet.
A mouse that emits and sense light to detect its movement is called an _______________ mouse.
Which TWO are examples of the internet reducing the use of paper?
Answer:
Using word documents instead of paper can save lots of paper especially, when lots of people are doing that already. Using emails can reduce the amounts of letters being sent to people.
cookies that remain on your device indefinitely are called
Answer:
Persistent Cookies: Persistent cookies stay on the user's browsing device until the user clears them or until they reach their expiration. Persistent cookies are those that retain information on the user's specific preferences so that we can provide a “personalized” user experience.
Explanation:
I hope that this helps, if you have anymore questions, please, feel free to ask. I hope that you have an amazing rest of your day. ;D
Cookies that remain on your device indefinitely are called persistent cookies.
What are persistence cookies?Cookies that remain on your device indefinitely are called persistent cookies.
These cookies are stored on the user's device even after the browser is closed, and can be used to track the user's activity over time.
We have,
Persistent cookies:
It can be useful for storing information such as login credentials or user preferences, as they allow the user to remain logged in or have their preferences saved between browsing sessions.
However, they can also be used for tracking and advertising purposes, which has raised concerns about online privacy and security.
Many web browsers offer options for managing cookies, including the ability to delete or block persistent cookies.
Users can also use browser extensions or privacy tools to control how cookies are used on their devices.
Thus,
Cookies that remain on your device indefinitely are called persistent cookies.
Learn more about persistent cookies here:
https://brainly.com/question/29608733
#SPJ5
qbasic program to check whether the given number is odd or even
Answer:
CLS
INPUT "Enter a Number: ", n
IF n MOD 2 = 0 THEN
PRINT "Input Number is Even"
END IF
IF n MOD 2 = 1 THEN
PRINT "Input Number is Odd"
END IF
END
Explanation:
CLS
INPUT "Enter a number:",N
IF N MOD 2=0 THEN
PRINT "given number is even"
ELSE
PRINT"given number is odd"
END IF
END
What is the maximum number of guesses it will take to find a number between 1 and 1000? Explain your answer.
Answer:
The maximum number of guesses without binary search is 999 since we would be going sequentially and guessing the numbers. When we reach number 999 and find that is not the answer, we know it has to be 1000, and don't have to guess, so the number of max guesses is 999.
The maximum number of guesses to find a number between 1 and 1000 is 10, using a binary search algorithm. Each guess divides the search range in half until the number is found.
Given that,
The number we are trying to find is between 1 and 1000.
We are trying to determine the maximum number of guesses it would take to find this number.
To find the maximum number of guesses it would take to find a number between 1 and 1000, we can use a binary search algorithm.
In a binary search, we start by guessing the middle number, which in this case would be 500.
If the number we are looking for is higher than 500, we then guess the middle number between 501 and 1000, and so on.
If it's lower, we guess the middle number is between 1 and 499, and so on.
Using this approach,
As dividing the problem in half with each guess. Since we have 1000 possible numbers and we divide by 2 with each guess,
It would take a maximum of log base 2 of 1000 (or approximately 9.97) guesses to find the number.
Therefore, we can conclude that the maximum number of guesses it would take to find a number between 1 and 1000 using this binary search algorithm is 10.
To learn more about number system visit:
https://brainly.com/question/33311228
#SPJ3
which type of broadband internet offers connections nearing the speed of light?
Answer:
FiberOptic connections
Explanation
One of the fastest data transfer methods for computers.
The type of broadband internet that offers connections near the speed of light is fiber-optic. The correct option is c.
What is fiber-optic?Information can be sent from one location to another via optical fiber. Communications over the internet, cable television broadcasts, and telephone calls all use it.
Data transmission through the internet is one typical application. Most likely, a fiber optic cable connecting my computer and Brainly's servers to your browser allowed it to obtain this webpage.
Fiber optics is used in communications, medicine, optical inspection, lighting, and in the making of sensors. The Internet is a connection of computers from different places without wires. It is transferring information.
Therefore, the correct option is c. fiber-optic.
To learn more about fiber-optic, refer to the link:
https://brainly.com/question/10062531
#SPJ2
The question is incomplete. Your most probably complete question is given below:
Cable.
DSL.
fiber-optic.
satellite.
what is the answer ??
= Option b Minicomputer ..........
Answer:
Minicomputer answer The HP 2100 is a series of 16-bit minicomputers that were produced by Hewlett-Packard (HP) from the mid-1960s to early 1990s. Bro please follow me we should help each other
did someone really hang themselves on wizard of oz
Answer:
Yes they did
Explanation:
If you look closely in the back, in the part where they sing where off to see the wizard the wonderful wizard of oz. Just look behind dorothy's head and you will see a man hanging himself
rocks created from compaction and cementation of sediments are called:
Answer:
Sedimentary Rocks
Explanation:
Sedimentary rocks are essentially the Frankenstein monsters of the rock world. They're made up of pieces of igneous and metamorphic rocks, sand, clay, and other sedimentary rocks.
Answer:
A sedimentary
Explanation:
hope this helps please mark as brainliest
how can a robot differentiate between positive or negative product reviews?
Answer:
Some of the sites have the rating system for example 3 stars, or the bot has a feature that can capture keywords that include a list of possible indicator that it is a negative review. For example if a user review includes a word "bad" or "horrible" the bot will flag that as a negative review.
Please give brainliest.
you type out a few sentences in an ms word file, and save it on your desktop. how is this data stored in the computer?
When one is typing on MS word and one save the file, this data would be stored as combination of 1s and 0s in the computer.
Computer data storage can be regarded complex system, immediately a data is saved then; The first be converted to simple numbers of 1s and 0s , this number are very easy for a computer to store and these number are regarded as Binary Numbers and all letters as well as photographs are converted to numbers, The hardware will record this saved numbers inside the computer. These numbers are then organized and transferred to temporary storage which be manipulated by programs, or software.Therefore, data are been stored as 1s and 0s in the computer.
Learn more at:https://brainly.com/question/21571591?referrer=searchResults
what information most likely presents a security risk on your personal
An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.
A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.
Some of the social characteristics and details of an individual that are shared on social media websites include the following:
Date of birth.Occupation.Religion.Gender (sex).Location.Friends.However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.
In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.
Read more: https://brainly.com/question/21765376
Consider the following declarations:
class bagType
{
public:
void set( string, double, double, double, double);
void print() const;
string getStyle() const;
double getPrice() const;
void get( double, double, double, double);
bagType();
bagType(string, double, double, double, double);
private:
string style;
double l;
double w;
double h;
double price;
};
bagType newBag; // variable declaration
Requried:
a. How many members does class bagType have?
b. How many private members does class bagType have?
c. How many constructors does class bagType have?
d. How many constant functions does class bagType have?
e. Which constructor is used to initialize the object newBag?
Answer:
12, 5, 2, 3
bagType
Explanation:
I just did it
________ is the use of information technology to support the sharing of content among networks of users.
Answer:
The social media is the use of IT to support the sharing of content among network of users.
what must you ensure if your work involves the use of different types of smart card security tokens
Answer:
Avoid a potential security violation by using the appropriate token for each system.
what feature is required to track customer search terms on a website?
Answer:
Site Search feature is required to track customer search terms on a website..
Explanation:
Hope it helps you..
Your welcome in advance..
(ㆁωㆁ)
Who, in 1937 tried to build a computer with no gears, cams, belts, or
shafts?
Answer:
But we're getting ahead of our story. One of the earliest attempts to build an all-electronic (that is, no gears, cams, belts, shafts, etc.) digital computer occurred in 1937 by J. V. Atanasoff, a professor of physics and mathematics at Iowa State University.
Explanation:
hope this will help you
have a great day
please mark me as the brainliest
Answer: Atanasoff
Explanation: he was a doctor whom tried to built a computer to test the capacity of storing data
A_______VPN connection is a private network that uses a public
network to operate.
A)Point-to-Point
B)Point-to-Tunnel
C)Point-to-Site
D)Site-to-Site
Answer:
letter c. point to site po sagot diyan
ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!
1. A means of giving credit to a source when their information is used.
A) Citation
B) Wi-Fi
C) Asynchronous Communication
D) Malware
2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
A) Spyware
B) Phishing
C) Malware
D) Wi-Fi
3. A device that translates analog carrier signals to encode and decode digital information.
A) USB
B) Computer Virus
C) Intranet
D) Modem
4. A virus or Trojan horse designed to cause harm to computer or device.
A) Hardware
B) Malware
C) Modem
D) Antivirus Application
5. Software that is used to detect and eliminate computer viruses.
A) Wi-Fi
B) Cable Internet
C) Antivirus Application
D) Browser
6. Transmits data through a cable television network as a means to connect a computer to the internet.
A) Desktop Interface
B) Cable Internet
C) Operating System
D) USB
7. An application used to access websites on the internet.
A) Malware
B) Internet
C) Proprietary
D) Browser
8. Communication that does not happen in real time.
A) Asynchronous Communication
B) Wi-Fi
C) Ethernet Cable
D) Malware
9. A network of computers that provides access to information on the web.
A) Phishing
B) Internet
C) Antivirus Application
D) Modem
10. The cable used to connect computers in a network.
A) Computer Virus
B) Ethernet Cable
C) Intranet
D) Hardware
Easy Peasy Lemon Squeezy
1. A means of giving credit to a source when their information is used.
A.) Citation
2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
B.) Phishing
3. A device that translates analog carrier signals to encode and decode digital information.
D.) Modem
4. A virus or Trojan horse designed to cause harm to computer or device
B.) Malware
5. Software that is used to detect and eliminate computer viruses.
C.) Antivirus Application
6. Transmits data through a cable television network as a means to connect a computer to the internet.
B.) Cable Internet
7. An application used to access websites on the internet.
D.) Browser
8. Communication that does not happen in real time.
A.) Asynchronous Communication
9. A network of computers that provides access to information on the web.
B.) Internet
10. The cable used to connect computers in a network.
B) Ethernet Cable
Answer:
your mom
Explanation:
how much did netflix pay dave chappelle for the closer
if you could travel back in time where would you go? what would you do? explain
Answer:
I would challenge the temporal paradox.
Explanation:
A temporal paradox, time paradox, or time travel paradox is a paradox, an apparent contradiction, or logical contradiction associated with the idea of time and time travel.
Tim has joined a new firm as a network engineer. Which three personal qualities will help him in his career? A. open-mindedness B. flexibility C. willingness to learn D. confidentiality E. ethnicity
Answer:
I would say A B and C
Explanation:
Draw a logic gate circuit for each of the following Boolean expressions.
1- F= AB’
2-F = A’ + (B*C)
3-F= (A*B) + (A*C)
Answer:
can you explain more please I didn't understand