If you are using Google Slides, Click the plus arrow in the top left hand corner of the webpage. That will add another slide to the presentation you are working on
Next to the close-window-button, is the minimize/maximize button
Answer:
1. Surge protector.
2. Power-saving mode.
3. Hardware and software.
4. Hard disk.
5. Eject.
Explanation:
1. A surge protector is a device used to protect computers against surges and spikes in power.
2. Sleep and Hibernate are examples of Power-saving modes.
3. Regular maintenance on a computer is good for both hardware and software.
4. Bad sectors are sections of the hard disk that are physically damaged.
5. To protect some devices such as flash drives and external hard drives from corruption, it is best to eject the devices.
Answer:
C. Social Engineering
Explanation:
Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.
Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.
Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.
Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.
In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.