1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
11

_____ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.

Computers and Technology
1 answer:
kap26 [50]3 years ago
6 0

Answer:

"Social engineering" is the correct answer for the above question.

Explanation:

  • Social engineering is a process, which gives the idea for the hacker or unauthorized user to get inside the system or hack the system.
  • It is used to read the humans data or psychologically hack human data.
  • It teaches the processor by an attacker to be the master of the authorized user. By this, an attacker can able to know the authorized term with the help of an authorized person.
  • The above question asks about the term, which is used to help the hackers to hack the system. This term is known as Social Engineering.

You might be interested in
Design a circuit that will tell whether a given month has 30 days in it.
Ipatiy [6.2K]

The simplified equation is given as Y=A_3A0+A3A0. To draw the circuit diagram using a minimum number of gates we use this equation and the x^2 equation to form the truth table. This is further explained below.

<h3>What is a circuit?</h3>

Generally, a circuit is simply defined as a full circular channel via which electricity travels in electronics. A power flow, terminals, and a drain make up a basic circuit.

In conclusion, The circuit will need 4 inputs to produce 16 combinations in order to determine if the month contains 31 days. At 4 inputs, there are 12 inputs required. the

Hence,we use this information and the x^2 equation to form the truth  table

the Equation is given as

Y=A_3A0+A3A0

Read more about  circuit

brainly.com/question/27206933

#SPJ1

6 0
2 years ago
Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test,
tamaranim1 [39]

An Information System is when key components such as hardware, software, data, and process are combined for collection, processing, and distribution of data. All of these scenarios mentioned on the choices above are considered transactions in an information system. There is an exchange of information that fully satisfies the request of a user and describes what transactions in information systems are. They are good examples of users entering information whether, physically or electronically, as data into computers. This data is then processed, and the database changes adjusted with some being made permanent.

3 0
3 years ago
A paradigm innovation occurs when:
Viktor [21]
B. Because major shifts in thinking can cause change.
4 0
3 years ago
How do you do basic addition and subtraction in binary, octal and hex?
olasank [31]

Explanation:

The use of numerical systems arose from the need of man to improve certain mathematical calculations as time goes.

Several factors demanded the study and application of mathematical operations using decimal numbers. Among these factors, technological advancement essentially from the first experiments in the use of electronics.

There are several numeric systems, but four of them stand out: decimal, binary, octal and hexadecimal.

The decimal system is used every day in countless ways and, no doubt, is the most important number system. He has ten digits with which can form any number through the law.

Non-decimal systems such as binary, octal and hexadecimal are critical in the areas of digital and computer techniques. Through these systems is possible to perform logical combinations and working with computer programming languages. This article will show the link between the logical circuits and these numbering systems.

2 - The Binary Numbering System

The binary numbering system is composed of only two digits:

Zero (0)

One (1)

To represent zero amount using the number 0; to represent a quantity, use the digit 1.

Assuming you need to represent the number two. Which digit you can use, if there is no number 2 in that system?

We have the following response. In the decimal system, we do not have the number ten and represent the amount of ten using the digit 1 followed by the digit 0. In this case, the number 1 means that we have a group of ten and the digit 0, no drive, which means ten.

In the binary system, do likewise. For you the amount of two, we use the digit 1 followed by the digit 0. The figure 1 means that there is a group of two elements and 0, a group of any unit, thus representing the number two.

The table below helps us to understand the differences between the decimal and binary system, using this rule. The number sequence displayed to the number nine.

Decimal

Binary

0

0

1

1

2

10

3

11

4

100

5

101

6

110

7

111

8

1000

9

1001

2.1 - System Conversion binary to Decimal System

To better understand the conversion we use a decimal number either, for example, 356. This number means:

3 x 100 + 5 x 10 + 6 x 1 = 356

Hundred ten unit

3 x 10 � + 5 x 10 � 6 x 10 + 10 = 356

We realize that the least significant digit (6) multiplies the unit (1), the second digit (5) multiplies the ten (10) and the most significant (3) multiplies the hundred (100). The sum of these results will represent the number.

In General, the formatting rule of a number is the sum of each digit multiplied by the corresponding base (in the example, the number ten) high for an index as the positioning of the digit in the number.

In another situation, we will use a binary number, for example, the number 101. We can conclude that it is equivalent to number 5 in the decimal system. Using the concept of a number, we will convert the number to the decimal system as follows:

1 0 1

1 x 2� + 0 x 2� + 1 x 2

6 0
3 years ago
चार फरक छुट्याउनुहोस् ।) 3. Write down any four provisions of cyber ethic साइबर नैतिकताका कुनै चार प्रावधानहरु लेख्नुहोस् ।​
Kruka [31]

Answer:

Five provisions of cyber ethics are:

Your computer or system should not be used to harm others. Your cyber knowledge should not be used to steal other people's resources. One should not use or copy softwares for which you have not paid. ... Never use other people's resources without their consent.

7 0
3 years ago
Other questions:
  • Information goes into a computer through _______ and comes our through _______
    6·2 answers
  • Please use Python 3 to solve the following problem. Please also show all outputs and share code.The variable sentence stores a s
    6·1 answer
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • Ar count = 10;
    13·1 answer
  • Three common risk factors for young drivers and how you plan to minimize these factors.
    13·1 answer
  • Which alignment aligns text to the left and right side margins?
    15·1 answer
  • Do you think communities or countries can survive without the internet?why or why not?​
    11·1 answer
  • A customer wants to increase his storage capacity by 25gb
    7·1 answer
  • This is an image of the ...........................Topology.
    5·1 answer
  • consider a pipelined risc cpu with 14 stages. what is maximum speedup of this cpu over a non-pipelined implementation?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!