1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
4 years ago
7

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________

. phishing pretexting polymorphing pharming?
Computers and Technology
2 answers:
Levart [38]4 years ago
4 0

Answer:

The answer is Pharming.

Explanation:

  • When a hacker steals your confidential and private information by installing a malicious code on your computer which misdirects you to fake and fraudulent websites, this is called pharming.
  • Hacker installs virus on your computer which manipulates the host files on your computer.
  • The hacker uses DNS cache poisoning to attack DNS services on your computer which makes many users to enter fraudulent site, unknowingly, as they type the URL of the real website.
  • These fraudulent website developed by hacker can install virus on your computer and steal confidential information from your computer.
tresset_1 [31]4 years ago
3 0
The answer is Phishing
You might be interested in
A government agency is getting rid of older workstations. The agency will donate these workstations, along with other excess com
algol [13]

The simplest ways are being used to help eliminate the previously stored data, by deleting hard disc storage facilities with the same data wherever that used a sequence of all zeros.

<h3>What is a hard disc?</h3>

The "DoD Standard" is a term used during the data sanitizing industry and refers to DoD 5220.22-M, and the further discussion can be defined as follows:

The simplest ways are being used to help eliminate the previously stored data, by deleting hard disc storage facilities with the same data wherever that used a sequence of all zeros.

The sparging eliminates statistics to entirely delete the gravitational flux from electronic media.

Hard drives as well as other data storage devices, for example, computer tapes, retain magnetic data.

It could no longer be seen as storage after a disk is degaussed.

Therefore, the final answer is "Using the DoD 5220.22-M method and  Degauss media with a magnet".

Learn more about hard disc at:

brainly.com/question/13329582

#SPJ1

3 0
2 years ago
I know this isn't a school question but it is important! how do I get out of hp hardware diagnostics UEFI on hp pc? (step by ste
Debora [2.8K]

Answer:

1. Turn off the computer and wait five seconds.

2. Press the Power button to start the computer and repeatedly press the F10 key to enter the BIOS setup menu.

3. On the BIOS Setup screen, press F9 to select and load the BIOS Setup Default settings.

4. Press F10 to Save and Exit.

5. Use the arrow keys to select Yes, then press Enter when asked Exit Saving Changes?

6. Follow the prompts to restart your computer.

After you have get to the operating system,

1. Press CTRL + Alt + Del on the blank screen.

2. Click on Task Manager

3. Click "File" - "Run a new task" If there is no "file" option, please click on the task manager under the "details"

4. In the pop-up window, enter "msconfig" click "OK"

5. In the system configuration window that appears, click "Service" and uncheck "App Readiness".

6. Click "Apply" --- "OK"

7. In the following window appears to click on the "restart"

6 0
3 years ago
You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone betwe
lorasvet [3.4K]

Answer:

A and C

Explanation:

From the above scenario, the Ethernet standards that meet the above guidelines are:

A. 1000BaseSX; and

C. 10GBaseSR.

Cheers

3 0
3 years ago
Which of the following statements are true regarding technology and learning? Select 3 options.
bekas [8.4K]

Answer:

<h2>Knowledge can be acquired throughout your life, through both formal and informal methods.</h2>

As long as a person is alive, they can keep learning. With the amount of knowledge available in the world, it is improbable that a person can acquire all of it before they pass on. It is therefore possible to acquire information until the day a person dies.

<h2>Changes in technology both enable and require lifelong learning.</h2>

Technology keeps changing and developing in order to make things better and more efficient. As such, humans need to keep learning for their entire lives or else they will be left behind as newer technology comes out. Take smartphones for instance, a lot of older grandparents have had to learn how to use them to keep in contact with with their families.

<h2>Virtual reality simulations are being used for training in industries like healthcare and the armed forces.</h2>

Virtual reality has improved the effectiveness of training in both the medical and armed forces industry because with training capable of being done in a virtual world, it can be more in-depth. For instance, medical students can use more realistic subjects to learn the intricacies of the human body and soldiers can embark on dangerous training missions without actually risking their lives.

5 0
3 years ago
PARTNERING AS IT RELATES TO BPR.​
balandron [24]

Answer:

The answer to this question can be defined as follows:

Explanation:

The term BPR stands for "business processes reengineering", It is the recreating of the core business process to improve product performance or reliability or lower costs.

  • It generally includes analyzing business processes, which identifying sub-par or ineffective processes but identifying ways to dispose of or change it.
  • IT important for improving changes, especially to shift in aspects of the work, its incorporation in business operations, or competitive strength change.
  • It might contribute to making reconfiguration improvements, and is known as a BPR enabler.
6 0
4 years ago
Other questions:
  • You have been tracking your exercise routine, which involves running, lifting weights, yoga, and stretching. You want to see wha
    15·2 answers
  • The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs
    7·1 answer
  • A nonpipelined system takes 300ns to process a task. The same task can be processed in a 5-segment pipeline with a clock cycle o
    10·1 answer
  • The _____ search algorithm searches a list for a given item, starting with the first element and continues to compare the item w
    12·1 answer
  • What is the best way to learn JavaScript?
    5·2 answers
  • 2. Integer plot function (find a smart way to code big integers) Write a program BigInt(n) that displays an arbitrary positive i
    8·1 answer
  • You have created a PivotChart showing sales by quarter by sales rep. Before presenting it to management, you notice thename of a
    7·1 answer
  • What is the Is option that prints the author of a file​
    7·1 answer
  • Nora has shared a document with others, and she needs to be able to easily identify when others are modifying the
    5·1 answer
  • Jerry purchased 25 dozens of eggs. He used 6 eggs to bake 1 cake. How
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!