1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arte-miy333 [17]
4 years ago
5

Match the terms with their definitions.

Computers and Technology
2 answers:
SIZIF [17.4K]4 years ago
6 0

Answer:

1. D. clickjacking

2. C. phishing

3. A. malware

4. B.single sign-on

Explanation:

Malware is a program that is designed to generate damage to computer or networks.

Single sign-on is a process that allows you to access several systems using the same ID and password.

Phishing refers to using a false email to make people believe that it is from an institution so they will enter to a link given to steal information like passwords and credit card details.

Clickjacking is when people are tricked to click on a link that is different from what they think which can result on someone getting access to your computer or to your information.

Sever21 [200]4 years ago
5 0
Phishing is 2
clickjack is 1
malware is 3
single signon is 4

Internet safety tip: Single Sign-On is unsafe. The others are made by hackers with no life and no heart.

You might be interested in
Select the correct text in the passage.
MatroZZZ [7]

Answer:

Answer:Veronica works as an executive in a marketing company.

Explanation:

Today, she has to make a presentation to her advertising agency about market research findings for a new product. Her manager will be assessing her presentation. Veronica has spent the whole week working on the presentation, and she wants to make a good impression. She has used the latest software to develop her presentation. She thought the presentation came out well and that it should give the advertising agency the information it needs to make a new commercial. As she enters the conference room, she sets up her laptop and plugs in the USB drive that has the presentation on it. However, she notices that the files on the USB drive have become corrupt. If she hadn't saved the presentation, she would have had to reschedule the meeting for next week. However, Veronica has a backup of the

8 0
3 years ago
What is a risk or an effect of software piracy?
Butoxors [25]
Piracy is a term used to describe the practice of obtaining or using software in a manner that is illegal or not in keeping with the terms under which the software was distributed. This can range from purchasing or copying the software, to using the software without a license, to selling, renting, or otherwise distributing it without authorization.<span>The Business Software Alliance estimated the losses to software companies in 2005 as a result of piracy at over $30 billion.</span>
5 0
4 years ago
Read 2 more answers
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130
Tatiana [17]

Answer: Eight

Explanation:

A class B address is 255.255.0.0. We need to borrow 8 bits from the network portion to have atleast 130 host per subnet.

11111111.00000000.00000000.00000000

8 0
3 years ago
Who Has any idea How to code?
kkurt [141]
A bit I guess. I can only do C# though
8 0
3 years ago
Read 2 more answers
Is it possible to build something that doesn't exist yet?
Anastasy [175]

Answer:

yes

Explanation:

how do u think other thing were built like when phones were first made

5 0
3 years ago
Other questions:
  • A single point of failure is a piece of hardware or application that is key to ________________________.
    8·1 answer
  • Apollo Couriers, a company providing international express mail services, has a proactive customer communications team. The prim
    8·1 answer
  • To activate Spelling and Grammar check using the ribbon, navigate first to the _____ tab
    14·2 answers
  • Network administrators use _______ technology to get antivirus updates to be automatically downloaded on employees' workstations
    15·1 answer
  • Help me with this please​
    7·2 answers
  • Yo, my Lenovo laptop keeps showing this screen but I can't sign in, can someone help me?
    5·2 answers
  • What is NOT a built-in function in python?<br> sqrt()<br> string()<br> fabs()<br> O print()
    12·2 answers
  • Can someone write me a design brief about a stadium​
    12·2 answers
  • Information about www
    14·1 answer
  • What is the most appropriate data type for each of these items?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!