1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arte-miy333 [17]
3 years ago
5

Match the terms with their definitions.

Computers and Technology
2 answers:
SIZIF [17.4K]3 years ago
6 0

Answer:

1. D. clickjacking

2. C. phishing

3. A. malware

4. B.single sign-on

Explanation:

Malware is a program that is designed to generate damage to computer or networks.

Single sign-on is a process that allows you to access several systems using the same ID and password.

Phishing refers to using a false email to make people believe that it is from an institution so they will enter to a link given to steal information like passwords and credit card details.

Clickjacking is when people are tricked to click on a link that is different from what they think which can result on someone getting access to your computer or to your information.

Sever21 [200]3 years ago
5 0
Phishing is 2
clickjack is 1
malware is 3
single signon is 4

Internet safety tip: Single Sign-On is unsafe. The others are made by hackers with no life and no heart.

You might be interested in
Mrs. Patel uses a computer program to balance her checkbook. Which of the following best explains how the
Alexandra [31]

Answer:

c it reduces errors

Explanation:

Instead of Mrs.Patel doing it she has an online program made for checks to do it for her.

6 0
3 years ago
Natalie wants to create a database to collect information about sales transactions. She would like to use the database to look u
Lynna [10]

Answer:

Customer Table

  1. Customer name
  2. Customer id

Product Table

  1. Product id/number (primary key, auto increment)
  2. Product name
  3. Product sale price

Transactions Table

  1. Transaction Id
  2. Customer Id
  3. Product id
  4. Quantity
  5. Price
  6. Date

Explanation:

Natalie wants to fetch following information from database

  1. Look up customer name and sale price
  2. Sort items in db by product number

To lookup customer name and sale price perform a join on Transactions table and Customer table.Assuming database is build in mysql the query to fetch required results would be

select transction.productId,transaction.customerid,customer.customername from transactions join customer ON

customer.customerid=transcation.customerid

where productid="user provided product id of returned product"

For sorting products by number set produc number in product table a auto increment primary key

7 0
3 years ago
Which is a feature of a search engine? stores web pages belonging to a single website displays web pages within a browser finds
faltersainse [42]
Finds web pages that matches key words
8 0
2 years ago
What does the term "technical skills" refer to and how do they help in the field of computers?
noname [10]
Technical skills is when you are advanced or know lots in Electronics. You are able to diagnose problems and fix them. They help in the computer field so much because they help fix everything if no one had these skills we wouldn’t be able to even use brainly
8 0
3 years ago
In which slot is a video card most commonly installed within a laptop?
lesya692 [45]

Answer:

PCIe

Explanation:

If we're talking about video slot the PCI is the most commonly installed in a laptop, but in this case, we have the PCIE or PCI-Express, this was the most common video slot in 2007 and is confused for the PCI-X.

We can increase the bandwidth with this video slot, this slot PCI-X could be 32 times faster than PCI 2.1, with PCIE 1.1 we can transport 250mb/s in each direction.

8 0
3 years ago
Other questions:
  • (GAME DESIGN)
    15·1 answer
  • You can choose which rules you want excel to use by enabling and disabling them in the ____ area in the excel options dialog box
    11·1 answer
  • Given the following adjacency matrix, what is the approximate rank vector after one iteration of the power iteration method (use
    10·1 answer
  • The simplest method to copy information is to first select the information you want to copy, and then use the Copy button and th
    11·1 answer
  • Jason is working on a project that requires him to manage a huge amount of data. The spreadsheet he is working on has data relat
    10·1 answer
  • This is Very very Important to me[BRAINLIEST)✅​
    5·1 answer
  • Define a function compute_gas_volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use
    12·1 answer
  • A) Calculate the checksum of following 2 bytes: 00110101 and 10101100, and fill in the blank:
    14·1 answer
  • What happened to the ten commandments tablets.
    9·1 answer
  • Match the term with the appropriate definitions : Edge Computer Applications ANSWERED
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!