1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brrunno [24]
3 years ago
6

Observing users as they enter passwords or other personal information to a computer Auditing software often used to test compute

r data An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans A software program specifically designed for computer forensic investigations Federal legislation aimed specifically at computer crime A type of fraud in which the perpetrator steals small amounts from many different accounts A malicious software program embedded in another innocent-looking one A software program or hardware device designed to prevent unauthorized data communications Malicious software similar to a computer virus
Computers and Technology
1 answer:
GuDViN [60]3 years ago
8 0

Answer:

Explanation:

1. Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data - (shoulder surfing)

2. An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer --- (CSI)

3. A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans - (COOKIES)

4. A software program specifically designed for computer forensic investigations - (EnCase)

5. A type of fraud in which the perpetrator steals small amounts from many different accounts - (salami technique)

6. A software program or hardware device designed to prevent unauthorized data communications - (firewall)

7. Malicious software similar to a computer virus -- (_worm)

8. Federal legislation aimed specifically at computer crime (CFAA)

You might be interested in
9.2.8 last names codehs
ZanzabumX [31]

Using the knowledge of computational language in python it is possible to write a code that tries to organize the names in an assorted way and any name can be included.

<h3>Writing code in python:</h3>

<em>names_list = []</em>

<em>for i in range(0, 5):</em>

<em>    names_list.append(input("Name: "))</em>

<em>sorted_last_names = sorted([name.split()[-1] for name in names_list])</em>

<em>print(sorted_last_names)</em>

See moer about python at brainly.com/question/18502436

#SPJ1

8 0
2 years ago
A regional bank implemented an automated solution to streamline their operations for receiving and processing checks/cheques. th
denis-greek [22]

In the case above, Machine Learning technology could be combined with the current solution.

<h3>How will Machine Learning help?</h3>

Machine Learning is known to be a tech that can help to streamline the bank operations  in terms of receiving and processing checks/cheques.

Therefore, In the case above, Machine Learning technology could be combined with the current solution.

Learn more about Machine Learning  from

brainly.com/question/25523571

#SPJ1

3 0
2 years ago
PLEASE HELP YOU GUYS
lorasvet [3.4K]
C stay away from his or her vechicle
3 0
3 years ago
Read 2 more answers
Write a function where you are given: a list of numbers "nums", a number to search for "num". Return the index of "num" in the l
ASHA 777 [7]

The program is an illustration of functions; functions are used to represent collection of named statements

<h3>The program in Python</h3>

The function in Python where comments are used to explain each line is as follows:

#This defines the function

def checkList(nums,num):

   #This checks if num exists in nums

   if num in nums:

       #If yes, this returns the index of num

       return nums.index(num)

   #If otherwise, this returns -1

   return -1

Read more about Python programs at:

brainly.com/question/26497128

#SPJ1

6 0
2 years ago
You are going to do a bubble sort on the following list. What are the missing members of the list? Select 3 options.
Nadya [2.5K]
The bubble sort makes multiple passes through a list. It compares adjacent items and exchanges those that are out of order. Each pass through the list places the next largest value in its proper place. In essence, each item “bubbles” up to the location where it belongs.
4 0
3 years ago
Read 2 more answers
Other questions:
  • Which class of fire extinguisher is appropriate for a fire involving electrical/energized electrical equipment?
    13·2 answers
  • 6. Write a program that can multiply an n x m matrix and m x n matrix together: The input specifications are these: Read n and m
    11·1 answer
  • Which of the following is the most significant outcome of the formation of the SMPTE?
    6·2 answers
  • To make slides in a PowerPoint Online application presentation have the same transition effect, select __________ on the Transit
    11·2 answers
  • Write a print statement that displays a random integer between 5 and 5000. Assume the random library is imported.
    12·1 answer
  • Que papel tuvo la innovación en la propagación de la telefonía móvil?​
    7·1 answer
  • Can anyone fix this code for me?
    8·1 answer
  • Consider the following method substringFound, which is intended to return true if a substring, key, is located at a specific ind
    14·1 answer
  • Write A Code In Python
    8·2 answers
  • What rpm command can be used to list the full paths for files within the bash package?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!