1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arte-miy333 [17]
3 years ago
5

Match the terms with their definitions.

Computers and Technology
2 answers:
SIZIF [17.4K]3 years ago
6 0

Answer:

1. D. clickjacking

2. C. phishing

3. A. malware

4. B.single sign-on

Explanation:

Malware is a program that is designed to generate damage to computer or networks.

Single sign-on is a process that allows you to access several systems using the same ID and password.

Phishing refers to using a false email to make people believe that it is from an institution so they will enter to a link given to steal information like passwords and credit card details.

Clickjacking is when people are tricked to click on a link that is different from what they think which can result on someone getting access to your computer or to your information.

Sever21 [200]3 years ago
5 0
Phishing is 2
clickjack is 1
malware is 3
single signon is 4

Internet safety tip: Single Sign-On is unsafe. The others are made by hackers with no life and no heart.

You might be interested in
Which option of the AutoCorrect tool enables you to add and delete words that do not follow abbreviation rules?
stellarik [79]

Answer:

Replace text as you type.

Explanation:

Replace text as you type is the Autocorrect option that enables you to add and delete words that do not follow abbreviation rules. This tool is available under the PROOFING tab. For example, if you use a long phrase frequently, simply add it to the replace text as you type. For instance, if you type your address frequently, add 34 Willoughby Street, London, and abbreviate it to 34WS and it was replace it to the long phrase as you type 34WS.

5 0
3 years ago
To protect the computer network of a large organization, network engineers monitor network traffic. This traffic is compared to
ioda

Answer:

To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.

Explanation:

Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.

5 0
3 years ago
Read 2 more answers
The ___________ button represents the start of a hyperlink in Table of contents.
zubka84 [21]

Answer:

An LS button

Explanation:

It appears on the (structure line 3)on the structure line, place your cursor in the <u>whi</u><u>te</u> field to the right of the E button (Recall that the E button represent the entry test).

3 0
3 years ago
True / Fasle
Liono4ka [1.6K]

Answer:

False

Explanation:

3 0
3 years ago
Which things computer case contains
Ronch [10]

Inside the case are the components that make up the computer itself, such as the RAM memories, the processor and the hard disk, all of which are directly or indirectly connected to the motherboard. In addition, the case allocates the power suplly, which is responsible for supplying power to the computer.

<h3>What is a computer case?</h3>

The case is the hardware component used to house most parts of a computer. It is inside it that components such as CPU, motherboard, SSD, video card and power supply are placed.

In addition, it is where the outputs for connections to other equipment are found, such as USB and HDMI outputs, plug for sound box and microphone and input for memory card.

The case has the important function of protecting the internal components of a computer from knocks, heat, light, moisture and dust. That's because most of the electronic components inside a computer are very sensitive and need this protection.

It is also used to connect to other hardware components, such as a monitor, keyboard, mouse and headset, through the various outputs provided on its exterior.

See more about computing at: brainly.com/question/15707178

#SPJ1

5 0
1 year ago
Other questions:
  • How can you logout your account and do not want to have this anymore
    12·2 answers
  • Why does everyone refer to dogs as being loyal
    11·2 answers
  • How do you resolve conflicts in your life??
    11·1 answer
  • Discuss two business information systems that are used in two different sectors in a modern economy.
    11·1 answer
  • Need help fast this is do a 4
    5·1 answer
  • Este tipo de software sirve para controlar e interactuar con el sistema operativo, proporcionando control sobre el hardware y da
    11·1 answer
  • In the program below, which two variables have the same scope?
    9·2 answers
  • Help me
    5·1 answer
  • Which layer of the OSI model provides a user interface in the form of an entry point for programs to access the network infrastr
    10·1 answer
  • Windows is a GUI Operating System, what is the other type?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!