1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
8

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals

is called a. profiling. b. phishing. c. spamming. d. targeting.
Computers and Technology
1 answer:
pantera1 [17]3 years ago
5 0
A.Profiling! Hope this helps
You might be interested in
What is the basic body structure of html.
hodyreva [135]

Answer:

A line holding HTML version information, a declarative header section (separated by the HEAD element), and a body containing the document's actual content make up an HTML 4 page.

8 0
2 years ago
Read 2 more answers
User-system interaction is?
Mandarinka [93]
A multidisciplinary, post-Master<span> educational program which provides practical training in the field of </span>human-computer interaction and user interface design<span>.</span>
8 0
3 years ago
Why can’t I see one individual’s questions in the app through their profile, but I can see their questions on the website?
Mumz [18]

Answer:

I think thats just a software issue. i have the same problem

Explanation:

7 0
3 years ago
Read 2 more answers
Ana is a music lover. She loves to download songs and videos on her computer every time she hears a new song. One day, her compu
o-na [289]

Answer:

Storage outage

As many new songs are released to the Internet every day, Anna might have download thousands of them, which made her computer ran out of storage and RAM(random access memory )

5 0
2 years ago
What type of malicious software tries to gather information about you without your consent?
AlekseyPX

Answer:

B-malware

Explanation:

I do tech and i help work on computars.

6 0
3 years ago
Other questions:
  • A(n) ____________________ stores copies of data or programs that are located on the hard drive and that might be needed soon in
    9·1 answer
  • Look at the four schematic symbols shown in the figure above. Each of the symbols is labeled with a number. Which of the followi
    5·2 answers
  • which of the following is a malicious program that can replicate and spread from computer to computer? A. Email B. Virus C. Spam
    15·1 answer
  • How do you mark peoples answer as the brainliest answer? I have trouble doing so. Please help!
    10·2 answers
  • Nonverbal communication includes _____.
    9·2 answers
  • Data is best described as
    10·2 answers
  • What is a function of Agile software development?<br>​
    7·1 answer
  • Task 2: Typing a School Speech
    12·1 answer
  • Prokaryotes are __________________ and include ________________________.
    8·1 answer
  • What is the name of the directory that contains symbolic links to unix sysv rc scripts for runlevel 2?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!