1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew-mc [135]
3 years ago
14

______ is an example of unauthorized access to your computer or accounts.

Computers and Technology
1 answer:
pychu [463]3 years ago
4 0
Well, it wouldn't be Adware because that just has to do with ads and stuff...
It wouldn't be cookies either because they just store things to make life easier.

It would be between Phishing and Hacking. I don't think it's Phishing because that's tricking someone into giving them your account information.

I think it would be hacking.

I hope that this helps. If it does, please rate it as Brainliest :D


You might be interested in
What is the name of a shortcut you can click to access other websites? A. A post B. A key C. HTML D. A link
schepotkina [342]

Answer:

D. A link

Explanation:

I hope this helps.

7 0
4 years ago
Which CIDR network has the smallest possible number of hosts? a. 123.0.0.0/8 b. 123.45.0.0/16 c. 123.45.67.0/24 d. All have the
Lina20 [59]

Answer:

CIDR is based on a variable-length subnet masking technique, which allows a new method of representation for IP addresses. Routing prefix is written with a suffix number of bits of the name, such as 123.0.0.0/8, as the CIDR network has the smallest possible amount of hosts.

Explanation:

CIDR ( Class Inter-Domain Routing ) It is a method that is allocating IP addresses and routing the IP. CIDR is introduced in 1933 and replace the architecture of network design on the internet. CIDR slows down the growth of the routing across the web and helps to slow the IP addresses such as IPv4 addresses.

CIDR consists of two groups of bits in the address. In the new age, the network prefix identifies the whole network. This is used as the basis of routing between IP networks and allocation policies.

IPv4 in-network prefix is 8-bit groups.

A typical IPv4 address is 192.168.0.5 the lowest value is 0, and the highest value is 255

In the given choices, 123.0.0.0 / 8 of the possible smallest number of hosts.

8 0
3 years ago
Which type of operating system is best for a personal computer?
alina1380 [7]
The answer is MS-Windows
3 0
3 years ago
Read 2 more answers
Iiiii need help asapppp
ohaa [14]

Answer:

If I remember correctly it is arrows.

Explanation:

Every mode I have seen includes lines, never saw any blocks, and arrows makes the most sense between it.

7 0
3 years ago
Create a class Book with two private int fields, numPages and currentPage. Supply a constructor that takes one parameter and set
Law Incorporation [45]

Answer:

The code is in the explanation.

Explanation:

/*Creating the class*/

public class Book{

      /*Here we put the attributes of the class;

      In our case, they are the two private ints*/

      private int numPages;

      private int currentPage;

    /*Here is the constructor.

    The constructor always has the same name as the class

     In (), are the parameters.*/

     public Book(int numberOfPages){

                numPages = numberOfPages; /*sets numPages to the value

                                                                    of the parameter*/      

               currentPage = 1; /*sets currentPage to 1*/    

}

   /*An acessor method is a method with which we can get the value of a      variable*/

    /*Acessor method for numPages*/

   /*numPages is an int, so the acessor method returns an int*/

    public int getnumPages(){

            return numPages;

    }

    /*Acessor method for currentPage*/

    public int getcurrentPage(){

           return currentPage;    

     }

     /*Method next page*/

     /*This method does not return anything, so it is a void method*/

     public void nextPage(){

     /*Verify that currentPage is less than numPages*/

     if (currentPage < numPages){

             currentPage = currentPage + 1;

     }

     }

}

4 0
3 years ago
Other questions:
  • Which of the following Office Online apps is most effective for creating spreadsheets?
    14·2 answers
  • Si la velocidad del sonido en el aire es de 330m/s , calcula la longitud De onda en metros, de una nota musical de frecuencia 55
    5·1 answer
  • Write a test program that prompts the user to enter three sides of the triangle (make sure they define an actual triangle), a co
    5·1 answer
  • Use the drop-down menus to answer questions about the options in the Window group. Which command allows a user to view presentat
    6·2 answers
  • Draw a flowchart to convert 5 kg into gram .​
    10·2 answers
  • You are asked to write the Point class in order to use point-type objects as follows:
    6·1 answer
  • C. List three obstacles to effective listening.
    8·1 answer
  • Dropbox is an example of ________. Bluetooth technology optical storage SSD technology cloud storage
    7·1 answer
  • "using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfe
    12·1 answer
  • Write a c program that asks the user to enter two numbers. the program should use the conditional operator to determine which nu
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!