1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
8

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals

is called a. profiling. b. phishing. c. spamming. d. targeting.
Computers and Technology
1 answer:
pantera1 [17]3 years ago
5 0
A.Profiling! Hope this helps
You might be interested in
Which of the following are best practices that should be done in Photoshop before placing images in InDesign?
SSSSS [86.1K]
I’m pretty sure it’s C good luck luv
8 0
4 years ago
A unique aspect of Java that allows code compiled on one machine to be executed on a machine of a different hardware platform is
notka56 [123]

Answer:

Java's bytecode

Explanation:

To execute its operations, java programming languages uses bytecodes.

These bytecodes are literally instructions of a java virtual machine (or JVM). They are generated in form of a class file as soon as the java program is ran and executed. In other words, the java compiler compiles the code and generates the bytecode.

As soon as the bytecode is generated, it can be transferred to a different machine and platform completely and one can run this bytecode on this different machine.

8 0
3 years ago
If you have two pennies, the probability of both coming up heads when flipped
aleksandrvk [35]
50% is the answer to your question
5 0
3 years ago
Read 2 more answers
Xor meaning in computer science
Jlenok [28]

<h2>eXclusive OR</h2>

<h3>✅X. (eXclusive OR) A Boolean logic operation that is widely used in cryptography as well as in generating parity bits for error checking and fault tolerance. XOR compares two input bits and generates one output bit. The logic is simple. If the bits are the same, the result is 0.</h3>
8 0
3 years ago
Read 2 more answers
You have just connected a new computer to your network. The network user static IP addressing. You find that the computer can co
choli [55]

Answer:

Default gateway

Explanation:

The default gateway would be needed to change for the configuration value because when plugged to the computer system into other's network. The Internet Protocol addressing for network users that is static. Then, the other user finds the system can connect on a similar subnet with hosts and not with hosts on another subnet and no further computer systems have facing the problem.

3 0
4 years ago
Read 2 more answers
Other questions:
  • When a class declares an entire class as its friend, the friendship status is reciprocal. That is, each class's member functions
    14·1 answer
  • For microsoft word tabs are very useful when you want to
    13·1 answer
  • Which equation gives you the amount of work performed?
    13·1 answer
  • All wireless networks have their own name, referred to as the ________, which is used to identify the network.
    11·1 answer
  • What is blogging
    15·2 answers
  • . The NFiPA 704 system uses a numerical value between _____ and _____ to indicate the level of hazard for that particular chemic
    7·1 answer
  • You can enter _____ in a cell to display tomorrow’s date
    12·1 answer
  • JAVA
    13·1 answer
  • How do web-based applications and websites differ? (2 points)
    13·1 answer
  • WILL GIVE BRAINLIST Which statements accurately describe electronic tools? Check all that apply. Electronic tools collect large
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!