1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sindrei [870]
3 years ago
11

PLEASE HELP, TEST MULTIPLE CHOICE QUESTIONS

Computers and Technology
1 answer:
Dima020 [189]3 years ago
8 0

Answer:

sorry i came for the points idk

Explanation:

You might be interested in
How do i use a computer (i'm 99999 years old)
AlekseyPX

Answer:

grandma?

Explanation:

is it you?

6 0
3 years ago
Read 2 more answers
The method of loci, peg-word system, substitute word system, and method of word association are all examples of _____.
Yakvenalex [24]
The answer is Mnemonic devices

Mnemonics enable us remember things more easily and often refer to such internal strategies like reciting a rhythm or reciting the order of colors of the rainbow. In cognitive psychology of memory, peg-word method, keyword method, and the method of loci are discussed as formal mnemonic techniques.



5 0
3 years ago
You want to discard your old computer and want to securely erase the data from your hard drive. What can you use to do this and
qwelly [4]
Go here this should help bunches!
http://www.microsoft.com/security/online-privacy/safely-dispose-computers-and-devices.aspx
Hope this website helps!
5 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
When installing conduit for a mast service, what type of conduit should you use?
lesya692 [45]
The answer is (b) Rigid-metal

If you are installing a conduit for a mast service, the type of conduit to be used should be a rigid metal type. Among the three types of steel conduit, the most preferable to install is the rigid metal type instead of an intermediate metal conduit and electrical metallic tubing. Rigid metal conduit is a ferrous metal.
7 0
3 years ago
Read 2 more answers
Other questions:
  • What is the name of the domain controller database that windows server 2016 uses to store data about user access and resources o
    10·1 answer
  • you are concerned with security at your company and want to implement a technology that requires no configuring on the users sid
    15·1 answer
  • Please refer to the MIPS solution in the question above. How many total instructions are executed during the running of this cod
    10·2 answers
  • HIPAA requires the following controls for medical records: A. Encryption of all data B. Technical safeguards C. Physical control
    12·1 answer
  • A class is a _____, which encapsulates _____ and _____. (Points : 2) programming language construct; attributes; behavior
    7·1 answer
  • Write a java program that prompts the user to input the elapsed time for an event in hours, minutes, and seconds. The program th
    13·1 answer
  • Plz tell the answer I I'll mark u as the brainliest
    14·1 answer
  • Write a program that keeps track of a simple inventory for a store. While there are still items left in the inventory, ask the u
    12·2 answers
  • Will give brainliest
    8·1 answer
  • Why does python code generate fewer types of syntax errors than code in other programming languages?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!