1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
11

Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h

er computer to record her keystrokes and send the data to Travis. He uses the data to obtain her personal information and access her financial resources. This is:
Computers and Technology
1 answer:
12345 [234]3 years ago
3 0

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

You might be interested in
Assume that a file containing a series of integers is named numbers.txt. Write a program that calculates the average of all the
Anna [14]

Answer:

Program in Python:

file = open("numbers.txt", "r")

count = 0

isum = 0

content = file.readlines()

for nums in content:

    num = nums.rstrip('\n').split(" ")

         for i in num:

              isum= isum + int(i)

              count = count + 1

print("Average: "+str(isum/count))

Explanation:

This line opens the file named numbers.txt

file = open("numbers.txt", "r")

This line initializes num to 0

count = 0

This line initializes sum to 0

isum = 0

This line reads the content of the opened file file

content = file.readlines()

This iterates through the content of the file

for nums in content:

This removes trailing new lines and blank spaces from each number

    num = nums.rstrip('\n').split(" ")

This also iterates through the content of the file

         for i in num:

This calculates the sum of the numbers in the file

              isum= isum + int(i)

This counts the numbers in the file

              count = count + 1

This calculates and prints the average of the numbers

print("Average: "+str(isum/count))

8 0
3 years ago
Salesforce organizes your data into: A. Objects and records, like tabs and rows on a spreadsheet. B. Objects and fields, like co
pshichka [43]

Salesforce organizes your data into option A. Objects and records, like tabs and rows on a spreadsheet.

<h3>How does Salesforce organize data?</h3>

Salesforce is known to be a tool that helps one to put together their your into objects and records and it is said to have standard objects that has been set up and ready for use.

Hence, Salesforce organizes your data into option A. Objects and records, like tabs and rows on a spreadsheet.

Learn more about Salesforce from

brainly.com/question/7452075

#SPJ1

7 0
2 years ago
What is the purpose of TCP?
dimaraw [331]

Answer:

The purpose of TCP / IP is to provide computers with a method to transmit data to each other. TCP/ IP provides the means for application to send data between computers and for networks to deliver that data to applications on others computers.

Explanation:

The internet control protocol (TCP/ IP, transmission control IP / internet protocol) is the set of protocols used to transport information on the internet and in most private networks. The TCP/IP name leaves two more important protocols of the transport layers (TCP) and the network layer (IP).

Each internet application depends on the communication of data between two or more processes. The most common is that they are two processes, and that their roles are well defined as client and server. The applications under this model ''client-server'', will issue a service request on the client side, and the server will elaborate a response and return it to the client.

To communicate these two processes it is necessary that the data that configure the requirement made by the client, and those that configure the response, produced by the server, can circulate through the network in both directions. The TCP/IP protocol suite resolves this need. For this, IP performs communication between devices, hosts, or nodes of the network, creating virtual paths between them through its fundamental function, which is routing.

4 0
3 years ago
Modify theme in excel
11111nata11111 [884]

Answer:

Explanation:

Theme may be explained as a group of different formatting options such as appearance, color, font size and so on, which could be applied on a workbook simultaneously (without having to manually format each change to the document one after the other.) Once a certain theme is selected, all formating options related to the theme is applied to the document. Themes are located in the page layout tab in excel. However, one can modify or edit each of the individual properties or options of a certain theme. Such that by the time, the theme modification would have been effected.

4 0
3 years ago
Loa (speaker) thuộc nhóm thiết bị nào ?
dlinn [17]

Answer:

this say's "Which device group?" hope i helpped

8 0
3 years ago
Other questions:
  • Bill needs to make a presentation in which he has to represent data in the form of a pyramid. Which feature or menu option of a
    14·1 answer
  • A. True
    6·1 answer
  • Regular maintenance is a key component of automotive lift safety.
    10·1 answer
  • Which of the following best reflects why lighting systems are used when filming on location outdoors? (Select all that apply.)
    10·1 answer
  • You are configuring two switches of different vendors such that they connect to each other via a single link that will carry mul
    13·1 answer
  • A recursive method without a special terminating case would _________. Hint: Self Check 13.3 had infinite number of isLucky() me
    5·1 answer
  • virtue by which you need to secure information by limiting computer access to authorized personnel only
    11·1 answer
  • What operating system is an open source program
    15·1 answer
  • In 1-2 sentences, describe how to use the thesaurus in the Word Processor you have used.
    7·2 answers
  • _____ involves storing data and running applications outside the company’s firewall. answer grid computing parallel computing cl
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!