1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
14

____ is a practice where a user in enticed by possible rewards and then asked to provide personal information.

Computers and Technology
1 answer:
Alina [70]3 years ago
8 0
Baiting is the answer
Hope it helped!
You might be interested in
A special kind of keyboard that can help people type really fast is the Colemak.
Lady bird [3.3K]
The answer is True there is a keyboard like that here

4 0
3 years ago
Read 2 more answers
ven if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are
makkiz [27]

Complete Question:

Even if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are;

Group of answer choices

A. policy and procedure development

B. use case activity diagram testing

C. method design and coding

D. data conversion and user training

Answer:

C. method design and coding

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are six (6) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Deployment.

6. Maintenance.

Among the listed stages, there are two (2) most important stages which cannot be ignored in the creation of a software application are.

<em>Hence, even if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are method design and coding.</em>

I. Method design: this is the third step of the software development life cycle, it comes immediately after the analysis stage. This is the stage where the software developer describes the features, architecture and functions of the proposed solution in accordance with a standard.

II. Coding (development): this is the fourth step in the software development process and it involves the process of creating a source code which would enable the functionality of the software application.

3 0
2 years ago
What should you do first to best use your personal goals as a mean for a promotion?
Leona [35]

Hi,


First to achieve any goal that is in the range of high ambition you need a great deal of work in other words you must not be lazy. Now if i got this right your goal is to be promoted by using personal goals. I suggest you separate your personal and work goals. Try harder for what feels right!


Hope this helps.

r3t40

3 0
3 years ago
The reading element punctuation relates to the ability to
Goshia [24]
The ability to pause
3 0
2 years ago
Consider the following configuration. ​ Computer ""A"" IP address: 172.16.100.100 Subnet mask: 255.255.0.0 ​ Computer ""B"" IP a
denpristay [2]

Answer:

There is nothing to change.

Explanation:

In the following configuration given in the problem, the necessary IP addresses and the subnet masks have been included in the configuration. The computers can be used to send and/or receive information to/from each other. The computers have been properly set-up and there is nothing to be done to the settings or configurations.

4 0
3 years ago
Other questions:
  • What is the role of the ieee in computer networking and wireless communications?
    14·1 answer
  • The internet connects millions of computers connected through millions of ____ worldwide.
    9·1 answer
  • What are motion graphics?
    9·1 answer
  • HELP 25 POINTS!!!!!
    6·2 answers
  • NEED BY 15 MINUTES PLEASE! WILL MARK BRAINLIEST!You can create special effects in an image using a camera or a photo-editing too
    5·1 answer
  • Exercise 3.16.4: Happy Face Solita
    10·1 answer
  • Why should we be careful about opening email attachments?
    8·2 answers
  • Write a program that performs the following tasks: Display a friendly greeting to the user Prompt the user for the value to conv
    13·1 answer
  • Museum web sites are generally good resources for information.<br> A.) True<br> B.) False
    11·2 answers
  • Write JavaScript code to declare a variable of the name favoriteColor
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!