1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
4 years ago
10

If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’

re E-business. Do you think that cookies are stored and maintain such information on the server-side and hackers can''t steal user''s information from these cookies easily? Do you agree with the above statement? Please give short comments in favor of or against the statement.
Computers and Technology
1 answer:
Nadusha1986 [10]4 years ago
5 0

Answer:

hacker can steal your data in many ways.

Explanation:

if you allow cookie site for fake websites. It can absolutely be possible.

You might be interested in
One of the most obvious initial changes in windows vista is the ____ interface
lana [24]
Answer choices are not provided, but I would go for "Aero."
8 0
3 years ago
Opposite word of reassembling​
Marysya12 [62]
<h3>OPPOSITE WORDS OF REASSEMBLING</h3>

  • disperse
  • disband
  • separate
8 0
3 years ago
Read 2 more answers
1. A thesaurus is best used to _____________.
NemiM [27]
1. The correct answer is <span>B. help find a word that means the same or a similar definition as another word. Thesaurus is a kind of dictionary that contains synonyms (words with the same or similar meaning) or antonyms (words with opposite meaning). It doesn't contain definitions, but only related words. To find definitions, you would have to look in a dictionary.

2. </span><span>Using synonyms can help make your writing more interesting. A text can often become oversaturated with the same word repeated many times, at the expense of nice flow and style. So, sometimes it is better to come up with adequate synonyms and use them. By looking for synonyms, we can find a more vivid and imaginative word than the one we had in mind.

3. A table can help us organize thoughts and ideas. When put into a table, information and thoughts become easily accessible and comprehensible. It helps us organize them, deriving the essence and the most important parts out of a text. A table is, basically, a way to visualize thoughts, which also makes them easier to memorize.

4. The "view side by side" feature would be useful in editing or comparing two different documents, so we don't have to minimize and maximize them all the time. We can create tables, search for words, or use the "search and replace" function perfectly well without using the "view side by side" feature. But when it comes to editing and comparing, it is extremely helpful to see both documents at the same time and compare them directly.</span>
3 0
3 years ago
How do spear phishing attacks differ from standard phishing attacks?
mina [271]

Answer:

Phishing attacks normally target random people on mass amount by sending emails to users. In the other hand the spear phishing only targets 1 person hence the name "spear".

Hope this help please give the brainliest award.

5 0
3 years ago
Can u please help me solve this
azamat

Alice has twice as many pencils as Cara. Leon has three more pencils than Alice. The three children have a total of 58 pencils.

<h3>What are the no. of pencils?</h3>

The no. of pencils are there totally as the 11.

Read more about the basic maths:

brainly.com/question/19493296

#SPJ1

4 0
2 years ago
Other questions:
  • Angela wrote some lines of code that she wants to test. She will need to use __________. IDLE open source a prompt a file path
    15·2 answers
  • Need help with this C++ question
    5·1 answer
  • Suppose the work required to stretch a spring from 1.1m beyond its natural length to a meters beyond its natural length is 5 J,
    14·1 answer
  • Craig wants to create a computing infrastructure that will allow developers within his company to build applications on a primar
    9·1 answer
  • Write a Python function uniquely_sorted() that takes a list as a parameter, and returns the unique values in sorted order.
    15·1 answer
  • The _device provides a means of communication between a computer and outer world.​
    14·1 answer
  • Which of the following is considered a white collar crime?
    13·1 answer
  • Here is a series of address references given as word addresses: 2, 3, 11, 16, 21, 13, 64, 48, 19, 11, 3, 22, 4, 27, 6, and 11. A
    9·1 answer
  • HELP
    11·1 answer
  • Which insert image option allows a user to insert images from the internet?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!