1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
11

_____ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.

Computers and Technology
1 answer:
kap26 [50]3 years ago
6 0

Answer:

"Social engineering" is the correct answer for the above question.

Explanation:

  • Social engineering is a process, which gives the idea for the hacker or unauthorized user to get inside the system or hack the system.
  • It is used to read the humans data or psychologically hack human data.
  • It teaches the processor by an attacker to be the master of the authorized user. By this, an attacker can able to know the authorized term with the help of an authorized person.
  • The above question asks about the term, which is used to help the hackers to hack the system. This term is known as Social Engineering.

You might be interested in
Salesforce organizes your data into: A. Objects and records, like tabs and rows on a spreadsheet. B. Objects and fields, like co
pshichka [43]

Salesforce organizes your data into option A. Objects and records, like tabs and rows on a spreadsheet.

<h3>How does Salesforce organize data?</h3>

Salesforce is known to be a tool that helps one to put together their your into objects and records and it is said to have standard objects that has been set up and ready for use.

Hence, Salesforce organizes your data into option A. Objects and records, like tabs and rows on a spreadsheet.

Learn more about Salesforce from

brainly.com/question/7452075

#SPJ1

7 0
2 years ago
What is the main function of an operating system​
alina1380 [7]

Here are the main functions of an operating system:

1) Manage the resources of the device

The operating system controls how much of each resource is distributed, and it controls things like the processing unit and memory.

2) Establish a interface for the user of the device

The operating system must classify what the classes of the script/code have to do and what they implement.

3) Service application software

The operating system must service each application that is downloaded onto the device. It must balance it's use of storage between apps.

4 0
3 years ago
Netiquette is the
e-lub [12.9K]

Answer:

C

Correct or acceptable way of communicating

4 0
3 years ago
Microsoft s trash receptacle is called
solmaris [256]
The term that is being looked for in this problem would be most probably and most likely to be the Recycle Bin.

Microsoft's trash receptacle is called the Recycle Bin. This is where deleted files and folder are moved after being deleted. Simple selecting the file or files and pressing the delete key would prompt you to make sure that you really wanted to do this. This is a precautionary action of the computer to let you know what you are about to do. This is to make sure that errors wouldn't happen in the future since some files are highly sensitive, some programs also are, and some files are just too big for the Recycle Bin to be handled, thus they are deleted permanently.
3 0
4 years ago
After the following code runs, what will be the value of result? var x = 30; function get () { return x; } function set (value)
PilotLPTM [1.2K]

Answer:

Null

Explanation:

It entirely depends on the language you are using to implement this.

But generally by the rule of scope, "result" will return null since get() was not defined to accept any argument, and it neither know the global "x" not defined it's own x in the function.

5 0
3 years ago
Other questions:
  • A(n) ______ is a flash memory storage device that contains its own processor to manage its storage.
    13·1 answer
  • How many times is "Alert" displayed in the following loop? for (int k =0; k&lt;= 100; k++) cout &lt;&lt; "Alert"; O 101 0 1 oo О
    7·1 answer
  • The number of pixels displayed on the screen is known as ________.
    14·1 answer
  • Name 8 different types of packages that are widely used​
    8·1 answer
  • One software license model allows software to be freely distributed, downloaded, and installed without paying a license fee but
    15·1 answer
  • the id selector uses the id attribute of an html element to select a specific element give Example ?​
    11·1 answer
  • Write method reverseString, which takes a string str and returns a new string with the characters in str in reverse order. For e
    8·1 answer
  • how to get into harvard stanford mit ivy league guaranteed upper middle class need aid 9th grade, computer science major have no
    15·1 answer
  • someone please do this for and send a screeshot or picture please its really important for my examsss :D​
    9·1 answer
  • A department store maintains data on customers, products, and purchase records in three tables: customer, product, and purchase.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!