1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brrunno [24]
3 years ago
6

Observing users as they enter passwords or other personal information to a computer Auditing software often used to test compute

r data An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans A software program specifically designed for computer forensic investigations Federal legislation aimed specifically at computer crime A type of fraud in which the perpetrator steals small amounts from many different accounts A malicious software program embedded in another innocent-looking one A software program or hardware device designed to prevent unauthorized data communications Malicious software similar to a computer virus
Computers and Technology
1 answer:
GuDViN [60]3 years ago
8 0

Answer:

Explanation:

1. Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data - (shoulder surfing)

2. An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer --- (CSI)

3. A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans - (COOKIES)

4. A software program specifically designed for computer forensic investigations - (EnCase)

5. A type of fraud in which the perpetrator steals small amounts from many different accounts - (salami technique)

6. A software program or hardware device designed to prevent unauthorized data communications - (firewall)

7. Malicious software similar to a computer virus -- (_worm)

8. Federal legislation aimed specifically at computer crime (CFAA)

You might be interested in
An automated search feature used by search engines to find that match your search terms is called a spider or
9966 [12]

Answer

Crawler

Explanation

This is a program that go to various website to read their pages and content provided in order to form entries for a search engine index.All search engines have this program called spider or a bot. It acts as an automated script that browses through the internet to scan the web pages and find words contained in the pages and where the words are used.


5 0
4 years ago
Read 2 more answers
What are the similarities between vertical and horizontal scroll bar​
professor190 [17]

Answer:

1. They both have arrows at the beginning and end of their scroll.

2. They are both used for extending the users view to rangers that are not currently present on the screen.

3. They are both located at the far right bottom of an open program in a computer screen.

4.They can be used in thesame way by dragging the scroll bar or clicking on the arrows on either side of the scroll bar.

Explanation:

Note that:

The vertical scroll bar is the one which extends from top to bottom.

While the horizontal scroll bar extends from left to right.

8 0
3 years ago
Read 2 more answers
I have the assembly for the max. can someone change the variables of it and make it min. I mean, the assembly for finding the mi
tatyana61 [14]
Bruh i honeselty dont know
4 0
4 years ago
How has technology effected the way we communicate?
horsena [70]

Indeed it has.

Advancements in technology and changes in communication generally go hand in hand. Landlines displaced the telegraph and cell phones replaced landlines. The arrival of the internet opened new doors of personal communication. E-mails replaced postal mails and social media took the place of text messages.

Communication technology, such as mobile phones, email, text messaging, instant messaging and social networking have had a profound effect on nearly everyone's business and personal lives. While technology makes communications faster and easier, at times it can also be intrusive and misinterpreted.

Increased isolation, reduced social interaction and social skills, and increased human-to-machine interactions are all a result of an overuse of technology, which has created a wall between many people globally.

Technology has the ability to enhance daily living from appliances to mobile devices and computers, technology is everywhere. ... In the rise of digital communication, technology can actually help communication skills because it allows people to learn written communication to varying audiences.

<em>-Astolfo</em>

3 0
3 years ago
The correct order of operations is _____. brackets, exponents, division, multiplication, addition, and subtraction subtraction,
bija089 [108]

brackets, exponents, division, multiplication, addition, and subtraction

6 0
4 years ago
Read 2 more answers
Other questions:
  • Jeff is preparing for a presentation on effective communication skills. He has to face an audience of over 50 people. Which stra
    9·2 answers
  • Positive thinkers tend to
    9·2 answers
  • Building a linked list forward places the new item to be added at the beginning of the linked list.
    15·1 answer
  • The Integrated Services Digital Network (ISDN) sends telephone transmissions across what type of lines?
    15·1 answer
  • By default, power search will
    14·1 answer
  • What is the maximum number of edges for an undirected graph? A directed graph?
    10·1 answer
  • Strengths and weaknesses about esport
    10·1 answer
  • PUBG mobile id and name plz
    12·1 answer
  • WILL GIVE BRAINLIEST!!! Danielle is warehouse supervisor for a large shipping company. Most shipments need to leave the warehous
    7·1 answer
  • HELP QUICK!!!!!!!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!