1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
11

_____ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.

Computers and Technology
1 answer:
kap26 [50]3 years ago
6 0

Answer:

"Social engineering" is the correct answer for the above question.

Explanation:

  • Social engineering is a process, which gives the idea for the hacker or unauthorized user to get inside the system or hack the system.
  • It is used to read the humans data or psychologically hack human data.
  • It teaches the processor by an attacker to be the master of the authorized user. By this, an attacker can able to know the authorized term with the help of an authorized person.
  • The above question asks about the term, which is used to help the hackers to hack the system. This term is known as Social Engineering.

You might be interested in
Elizabeth types in the following search terms: "Adoption AND cats AND NOT Persians." what results will her search provide?
bazaltina [42]

Answer

pages that reference adoption and cats but not Persians

Explanation

Search terms are the words or phrases that a user enters into a search engine. Also known as the search query. They are also referred to as keywords or  words, terms, and phrases that visitors use to find your site or when one wants to search something on the search engines. You just need to type into search box order to pull up list of results. there are different types of search like search queries where a user enters into a web search engine to satisfy his or her information needs, they are often plain text or hypertext with optional search directives. and the Navigational search queries  is a search query entered with the intent of finding a particular website, web-page or a certain phrase.

3 0
3 years ago
Read 2 more answers
The specific instructions that a computing device needs to boot up and control the hardware
dlinn [17]

Answer:

Firmware

Explanation:

7 0
2 years ago
Given the arra
Scrat [10]

Answer: B. hummer

Explanation:

Given the array :

Given the arra

("explorer", "testa", "hummer", "corvette", "civic", "mustang")

Array indexing usually begins from 0

That is ; the first element in the array is indexed as being in position 0

Using the given array as an example :

Index ____ element

0 ______ explorer

1 _______ tester

2 _______hummer

3 _______ corvette

4 _______ civic

5 _______ mustang

Hence, element in index 2 of the array is hummer

4 0
3 years ago
In windows, a(n) ________ follows the file name and a period and indicates the file type.
larisa [96]
Ans : Extention

In windows, a(n) extension follows the file name and a period and indicates the file type.
4 0
3 years ago
Suggest names for a coding club
bulgar [2K]

Answer:

  • <u>Abstract Connoisseurs.</u>
  • <u>Hypertext Assassins.</u>
  • <u>Callback Cats.</u>
  • <u>Boolean Autocrats.</u>
  • <u>Runtime Terror.</u>

Explanation:

<em><u>Hope it's help you !!</u></em>

3 0
2 years ago
Other questions:
  • Running the cpu at a faster speed than the manufacturer recommends is called ________.
    11·1 answer
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • There was a thunderstorm in your area and the power is out. The traffic lights are not functioning. Explain what you should do w
    8·2 answers
  • Studying MyMagic+ helps one understand the costs associated with information systems deployment at scale. According to your read
    12·1 answer
  • Desmond must enter a long string of numbers (1 4 9 2 1 6 2 0 1 7 7 6) into an old computer every two hours or the computer will
    12·1 answer
  • 1. Zack sees an online contest. He could win $10,000 instantly! On the sign-up form, he enters his name and email address. He is
    15·1 answer
  • An extranet is like an intranet except that it allows company employees access to corporate Web sites from the ______
    13·1 answer
  • Why is it important to evaluate the website on which you plan to shop?
    13·1 answer
  • ____ is the process of drawing a series of increasingly detailed DFDs, until all functional primitives are identified.
    7·1 answer
  • What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control peopl
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!