1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solong [7]
3 years ago
10

Warning or pop-up that convinces a user that his or her computer or mobile device is infected with a virus or other problem that

can be fixed by purchasing and downloading software, which may do nothing or install malware quiz
Computers and Technology
1 answer:
o-na [289]3 years ago
3 0
Idk... just dont trust those pop-ups unless your device is acting weird.
You might be interested in
When would you use the code snippet American?
USPshnik [31]

Answer:

You would use the code snippet B. while inserting a radio button. I hope this helps you!

6 0
3 years ago
Read 2 more answers
TRUE/FALSE QUESTIONS: T F 1. An intruder can also be referred to as a hacker or cracker. T F 2. Activists are either individuals
Law Incorporation [45]

Answer:

1. True 2. False 3. True 4. True 5. True 6. False 7. True

Explanation:

1.  A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.

2. Activists are people who campaign to bring about a positive political or social change.

3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.

4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.

5. Yes, intruders have a common attack methodology.

6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.

7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.

5 0
3 years ago
Ivan inputs a phone number into cell A2 of an Excel workbook. He formats the cell using a phone number format: (555) 987-6543. I
Temka [501]
The formula if he copies correctly if not plain numbers
8 0
3 years ago
Chemical reaction to metal​
NeX [460]

Answer:

Metals can react with water, acid and oxygen. The reactivity of the metal determines which reactions the metal participates in.

Explanation:

In general, acids react with metals to give salt and release hydrogen gas. In general, bases do not react with metals and release hydrogen gas.When metals react with other substances, the metal atoms lose electrons to form positive ions .

5 0
3 years ago
To use cut and paste, click the cut button from the ____ group on the home tab.
Setler [38]

I guess the correct answer is Clipboard

A clipbοard is a tеmpοrary stοragе arеa fοr data that thе usеr wants tο cοpy frοm οnе placе tο anοthеr. In a wοrd prοcеssοr applicatiοn, fοr еxamplе, thе usеr might want tο cut tеxt frοm οnе part οf a dοcumеnt and pastе it in anοthеr part οf thе dοcumеnt οr sοmеwhеrе еlsе.


5 0
3 years ago
Other questions:
  • Assuming your computer only has one network card installed; explain how your virtual machine is able to share that card with you
    10·1 answer
  • What is one major component that would not be found in a tablet or phone, and how has modern computing made that component less
    13·2 answers
  • Normal wear and road conditions can take their toll on a car’s steering and suspension system, altering __________. A. wheel ali
    15·2 answers
  • What is the 16-bit hexadecimal representation of each of the following signed decimal integers?
    13·1 answer
  • A(n) _______________ is a collection of configuration and security settings that an administrator has created in order to apply
    14·1 answer
  • Why is weather forecast so important for hang gliders?
    12·1 answer
  • Before posting a picture online, make sure to
    7·1 answer
  • Suppose that a 2M x 16 main memory is built using 256kB x 8 RAM chips and memory is word addressable, how many RAM chips are nec
    6·1 answer
  • Draw the Abstract Syntax Trees for the following statements and represent them in text form. i) 1+2+3 ii) 6÷3×4+3
    7·1 answer
  • Viruses that load from usb drives left connected to computers when computers are turned on are known as.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!