1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
3 years ago
7

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________

. phishing pretexting polymorphing pharming?
Computers and Technology
2 answers:
Levart [38]3 years ago
4 0

Answer:

The answer is Pharming.

Explanation:

  • When a hacker steals your confidential and private information by installing a malicious code on your computer which misdirects you to fake and fraudulent websites, this is called pharming.
  • Hacker installs virus on your computer which manipulates the host files on your computer.
  • The hacker uses DNS cache poisoning to attack DNS services on your computer which makes many users to enter fraudulent site, unknowingly, as they type the URL of the real website.
  • These fraudulent website developed by hacker can install virus on your computer and steal confidential information from your computer.
tresset_1 [31]3 years ago
3 0
The answer is Phishing
You might be interested in
What type of maintenance is required of a computer’s power supply to ensure that it remains in working order?
True [87]
<span>d. Clean any dust or debris from the air vents in front of the fans.</span>
5 0
3 years ago
Read 2 more answers
The border that defines the outer boundary of a shape or other object
Over [174]
The answer is outline
8 0
3 years ago
A large global retail corporation has experienced a security breach, which includes personal data of employees and customers.
sergeinik [125]

The act that  Accenture would offer as the best solution to ensure enhanced security in the future is Data Protection program.

<h3>What is Accenture  about?</h3>

In Keeping client data protected, Accenture’s Information Security Client is known to be well built up with Data Protection program that can help client teams with a good approach and the security controls, etc.

Therefore, The act that  Accenture would offer as the best solution to ensure enhanced security in the future is Data Protection program.

Learn more about Accenture from

brainly.com/question/25682883

#SPJ1

5 0
2 years ago
Given a string variable s that has already been declared, write some code that repeatedly reads a value from standard input into
valina [46]

Answer:

The code to this question can be given as:

Code:

while ((s!="Y" && s!="y" && s!="N" && s!="n"))  //loop for check condition

{

cin >> s;  //insert value

}

Explanation:

The description of the following code:

  • In this code, we use a string variable s that has been to define in question.
  • In code, we use a while loop. It is an entry control loop in loop we check variable s value is not equal to "y", "Y", "n" and "N".  
  • In the loop we use AND operator that checks all value together. If this is true So, we insert value-form user input in string variable that is "s".
4 0
3 years ago
Without exception, you must always stop when ______________.
Rina8888 [55]
It would be much better if you've provided additional information, as it's not clear what your question is about. Anyway, I've found this question with options.
And the answer is Without exception, you must always stop when <span> A traffic officer instructs you to stop</span>.
7 0
3 years ago
Other questions:
  • List 3 ways that you can use excel and the features it includes and explain why a spreadsheet is the best choice for this task.
    5·1 answer
  • In terms of object-oriented programming, after a class is defined,
    11·1 answer
  • True or false questions:
    11·1 answer
  • How can the function anotherFunc2 change the contents of the second element of t?
    5·1 answer
  • What is the range of values that a short can represent?
    14·1 answer
  • Write a program that administers and grades quizzes. A quiz consists of questions. There are four types of questions: text quest
    13·1 answer
  • A user finished working on a computer in the lab. What should the user do so
    15·1 answer
  • How would you delete a slide from your presentation after selecting it?
    14·1 answer
  • What makes a source credible?
    9·2 answers
  • By default word documents include _______ margins on all sides of the document.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!