1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
3 years ago
5

A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, p

rogram, or computer to gain access to some resource.
Computers and Technology
1 answer:
Bad White [126]3 years ago
7 0

Answer:

For Plato users the Answer is C

Explanation:

You might be interested in
What is generation of computer ?​
mestny [16]

I HOPE THIS INFORMATION WILL HELP YOU A LOT......

3 0
3 years ago
Read 2 more answers
What are the top and side margins for a letter typed in standard format?
BabaBlast [244]
Should be 1’ on each side
4 0
3 years ago
7. Suppose that a RISC machine uses 5 register windows. a. How deep can the procedure calls go before registers must be saved in
Semenov [28]

Answer:

bbbbbbbbbbbbnbbnnnnnnnnnnnnnnnnn

6 0
2 years ago
How do networks help protect data? -by preventing access by more than one person at a time -by restricting access to department
Whitepunk [10]

Answer:

because they have to rest

3 0
3 years ago
Read 2 more answers
Dell Computer uses recycled and recyclable materials in its product and packaging design in an effort to minimize damage to the
RoseWind [281]

Answer:

sustainability

Explanation:

Sustainability -

It refers to the method to meet the needs of the present generation without hampering the needs of the future generation as well , is referred to as sustainability .

The process of sustainability require to follow the concept of reuse and recycle to be safe for the environment .

The process is very safe for the planet , as it environmental friendly .

Hence , from the given scenario of the question ,

The correct answer is sustainability .

6 0
3 years ago
Other questions:
  • To change the background color of a page, which tab would you use?
    15·2 answers
  • An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo
    11·2 answers
  • Can someone please give me two (2) thesis statement for this question?
    5·1 answer
  • True or false: when an ospf route sends its link state information, it is sent only to those nodes directly attached neighbors.
    14·1 answer
  • How to create a distribution list in outlook?
    7·1 answer
  • Heidi uses her computer to write articles for a newspaper. She uses a program to listen to the articles before she submits them
    5·1 answer
  • Select the correct answer.
    8·1 answer
  • One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
    14·2 answers
  • A software giant is enabling a city with smart parking, using real-time information captured by sensors on the vehicle and senso
    7·1 answer
  • In which number system do the digital computer work​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!