1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sophie [7]
3 years ago
11

_____ relies on lies and misrepresentation to trick an authorized user into providing information or access to an attacker.

Computers and Technology
1 answer:
kap26 [50]3 years ago
6 0

Answer:

"Social engineering" is the correct answer for the above question.

Explanation:

  • Social engineering is a process, which gives the idea for the hacker or unauthorized user to get inside the system or hack the system.
  • It is used to read the humans data or psychologically hack human data.
  • It teaches the processor by an attacker to be the master of the authorized user. By this, an attacker can able to know the authorized term with the help of an authorized person.
  • The above question asks about the term, which is used to help the hackers to hack the system. This term is known as Social Engineering.

You might be interested in
The FTC found CardSystems Solutions and its predecessors __________ the FTC Act 15, U.S.
umka21 [38]

Take because it is lit

6 0
3 years ago
What symbol should you look for to determine who owns the intellectual property of a website? the logo the web address the domai
devlian [24]

Answer:

Answer:

the logo of the company or corporation

Explanation:

Usually, the symbol that determines who owns the intellectual property is the logo of the company or corporation. The logo of a website is technically the logo of the brand which has the rights to all of the information represented on the site and ultimately the intellectual property of the site itself. Since there are various board members that usually make up the company that owns the intellectual property, the logo is a way of representing all of these members as a single entity.

8 0
2 years ago
Read 2 more answers
Which of the following are ways that
Viefleur [7K]

Answer:

A and b

Explanation:

3 0
2 years ago
Blank Are input instructions you give to a computer
kotegsom [21]

Explanation:

A computer is a machine that can be programmed to accept data (input), process it into useful information (output), and store it away (in a secondary storage device) for safekeeping or later reuse. The processing of input to output is directed by the software but performed by the hardware.

4 0
2 years ago
How do the World Wide Web and the Internet work together?
Firlakuza [10]

Answer:

Explanation:

The relationship between the World Wide Web and the Internet is that the Internet is a collection of connected computers through gateways by which the information that is stored in databases and on servers is transferred from one computer to another and the World Wide Web is the software that is used to retrieve the information requested by the users.  The World Wide Web (which we call the Web because we’re lazy typists) lives “on top of” the Internet. The Internet’s network is at the core of the Web, and the Web is like an attractive parasite that requires the Net for survival (dummies.com, 2010).  The Web page that are accessible on the web usually contain hypertext links and are sometimes called links. These links connect to other pages that are store on the same or even a different server; these servers can be in any location throughout the World.  This system of interlinked documents is known as hypertext (Dummies.com, 2010).

Links can create connections that let you go directly to related information. These invisible connections between pages are like the threads of a spider web — as you click from Web page to Web page, you can envision the Web created by the links. What’s so remarkable about the Web is that it connects pieces of information from all around the planet, on different computers and in different databases (Dummies.com, 2010).  Every Web page has a name attached to it so that browsers, and you, can find it. The name of this naming convention: URL, or Uniform Resource Locator. Every Web page has a URL, a series of characters that begins with http://. (Pronounce each letter, “U-R-L” — no one says “earl.”), (Dummies.com, 2010).  The Internet is a world wide network of computers that are connected (networked) and are using the communication method called TCP/IP. The Internet was named ARPANET in 1969 by the Advanced Research Projects Agency of the U.S. Department of Defence with just four computers connected together (Comentum.com, 2010).  The Internet, sometimes called simply “the Net,” is a worldwide system of computer networks – a network of networks in which users at any one computer can, if they have permission, get information from any other computer (SearchWinDevelopment.com, 2010).  Computers are connected to the Internet via modems and gateways. Some computers are used as servers which are continuously connected to the Internet and used to store web pages; these computers are usually referred to as servers. A house hold computer is primarily used by ordinary people to search for information on the web is usually known as a client. The request for information or search result is passed by the browser on the client to the server that contains the pages which have the relevant information in them via the net. The request passes through the modem then along the net to the correct server, the server then serves up the correct page, which is then sent back to client computer and presented to the user through the browser.

5 0
3 years ago
Other questions:
  • The protocol that enables computers on the Internet to communicate with one another is called _____.
    10·2 answers
  • Give an example of an app, website, or a game that used addictive design. Describe three features of addictive design it uses.
    11·2 answers
  • A computer with a frequency 2 GHZ and its average cycle per instruction is 2. what is the MIPS of the computer?
    6·1 answer
  • All of the following are organization habits except:
    10·1 answer
  • During an upgrade for a new web server, Glen's company experienced a power surge. The power surge hit the new server, and now th
    10·1 answer
  • Hiya people. I am a game developer and I need an idea for a new game. If you have any ideas, pls feel free to tell me. Best idea
    6·2 answers
  • Gus has decided to organize his inbox on June 26 by using folders and deleting irrelevant messages. He creates a folder called "
    12·2 answers
  • What happened to China and India after they modernized their workforces by providing more training and education?
    8·1 answer
  • Class ____________ allow you to create one version of a class, without having to replicate code to handle multiple data types.
    7·2 answers
  • China sends a computer virus that shuts down telephone service in the United States. In retaliation, the United States hacks int
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!