1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brrunno [24]
3 years ago
6

Observing users as they enter passwords or other personal information to a computer Auditing software often used to test compute

r data An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans A software program specifically designed for computer forensic investigations Federal legislation aimed specifically at computer crime A type of fraud in which the perpetrator steals small amounts from many different accounts A malicious software program embedded in another innocent-looking one A software program or hardware device designed to prevent unauthorized data communications Malicious software similar to a computer virus
Computers and Technology
1 answer:
GuDViN [60]3 years ago
8 0

Answer:

Explanation:

1. Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data - (shoulder surfing)

2. An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer --- (CSI)

3. A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans - (COOKIES)

4. A software program specifically designed for computer forensic investigations - (EnCase)

5. A type of fraud in which the perpetrator steals small amounts from many different accounts - (salami technique)

6. A software program or hardware device designed to prevent unauthorized data communications - (firewall)

7. Malicious software similar to a computer virus -- (_worm)

8. Federal legislation aimed specifically at computer crime (CFAA)

You might be interested in
Is this really a American Server ???
zloy xaker [14]

Explanation:

I am from Nepal and i don't know about this topic.

6 0
3 years ago
A friend was just promoted to a new job that requires part-time travel, and he has also been promised a new laptop after his fir
frutty [35]

Answer:

Well, I would definitely advise him to buy USB hubs.

Explanation:

USB hub is a device that can give additional USB slot for the user just by consuming one single slots. In recent years, USB hubs can contain more than 9 slots with different variety, including HDMI and DVI that is required by this particular friend.

Using this device will make it easier to plug in and plug out all the devices he wants to his laptop since it all connected to one single hub.

Since he only has the budget under 100$ , Dell DA300 6-in-1 USB-C Hub could be a good option for Him.

6 0
3 years ago
Write a program that solves the following problem:
Sedbober [7]

Answer:

def main():

   singleMarkerPrice = 0.80

   packageOfMarkersPrice = 3.50

   tax = 0.065

   shipping = 0.050

   userInput = int(input("How many markers do you want? "))

   amountOfPackages = 0

   singleMarkers = 0

   if userInput % 5 == 0:

       amountOfPackages = userInput / 5

   else:

       amountOfPackages = userInput // 5

       singleMarkers = userInput % 5

   # Just for syntax so if the single marker amount is one, it prints package instead of packages

   if amountOfPackages == 1:

       print("You have " + str(int(amountOfPackages)) + " complete package")

   else:

       print("You have " + str(int(amountOfPackages)) + " complete packages")

   # Just for syntax so if the single marker amount is one, it prints marker instead of markers

   if singleMarkers == 1:

       print("You have " + str(int(singleMarkers)) + " single marker")

   else:

       print("You have " + str(int(singleMarkers)) + " single markers")

   totalAmountBeforeTax = (amountOfPackages * packageOfMarkersPrice) + (singleMarkers * singleMarkerPrice)

   print("The total amount before tax comes out to " + str(float(totalAmountBeforeTax)))

   costOfShipping = float(round((totalAmountBeforeTax * shipping), 2))

   costOfTax = float(round((totalAmountBeforeTax * tax), 2))

   print("The cost of shipping is " + str(costOfShipping))

   print("The cost of tax is " + str(costOfTax))

   totalAmount = totalAmountBeforeTax + costOfShipping + costOfTax

   print("The total amount comes out to " + str(round(totalAmount, 2)))

main()

Explanation:

This should be correct. If it isn't let me know so I can fix the code.

6 0
3 years ago
An organization is implementing a preselected baseline of security controls, but finds not all of the controls apply. What shoul
WINSTONCH [101]

The answer is Tailoring the baseline to their needs.

After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.

8 0
4 years ago
Which of the following are true if you pay only the minimum amount each month towards your credit card bill ?
kobusy [5.1K]
Where are the statements so i may help you 
5 0
3 years ago
Other questions:
  • Need help with this file and due today!!
    6·1 answer
  • ____ are the device drivers that provide the interface to I/O hardware.
    9·1 answer
  • Imagine your friend wants to apply
    5·1 answer
  • Step 1: Configure the initial settings on R1. Note: If you have difficulty remembering the commands, refer to the content for th
    10·1 answer
  • A network administrator was testing an IPS device by releasing multiple packets into the network. The administrator examined the
    13·2 answers
  • Being able to express your thoughts in an email is a primary technology skill. true or false.
    9·2 answers
  • What feature do you need on a computer if you want to take it on vacation to another continent?A. Dual-voltage selector switch B
    10·1 answer
  • The enhanced for loop _____ Group of answer choices reduces the number of iterations necessary to visit all elements of an array
    12·1 answer
  • Why is internet download speed slower on a computer vs phone
    5·1 answer
  • True or False: Once you rename a field, the new field name must be used in the rest of the search string.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!