1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlladinOne [14]
3 years ago
8

1-2-1 personal assistance

Computers and Technology
1 answer:
pshichka [43]3 years ago
4 0

Answer:

I am here.

Explanation:

I can help you with all questions but follow me.

You might be interested in
Observing users as they enter passwords or other personal information to a computer Auditing software often used to test compute
GuDViN [60]

Answer:

Explanation:

1. Observing users as they enter passwords or other personal information to a computer Auditing software often used to test computer data - (shoulder surfing)

2. An acronym for security institute that studies computer crime activities The act of altering data that are entered into, or used by, a computer --- (CSI)

3. A small text file that stores information about your browsing habits and interests Stealing personal information from trash cans - (COOKIES)

4. A software program specifically designed for computer forensic investigations - (EnCase)

5. A type of fraud in which the perpetrator steals small amounts from many different accounts - (salami technique)

6. A software program or hardware device designed to prevent unauthorized data communications - (firewall)

7. Malicious software similar to a computer virus -- (_worm)

8. Federal legislation aimed specifically at computer crime (CFAA)

8 0
3 years ago
How would Microsoft Word inform you of the error in the sentence below? (Tip: The error is in bold.)
Artist 52 [7]
It's the second answer since there's not really an error for Microsoft Word to actually catch.
3 0
3 years ago
In response to an alert regarding a possible security incident, you are analyzing the logs for a web application. In the process
SOVA2 [1]

The type of attack was most likely attempted against the application is an  XSS attack.

<h3>Why is the above an  XSS attack?</h3>

This attack is known to be an example of an XSS attack as it is one that is often recorded by the log of a web server's log.

Conclusively, Note that in this attack, if you see the HTML encoding, one can say that is mainly an XSS attack but when you see SQL or XML statements in the string, then it is another.

Learn more about attack from

brainly.com/question/76529

#SPJ1

4 0
2 years ago
A series of events that gets the computer ready for work is known as what?
DedPeter [7]
I think the answer is the third one...
7 0
4 years ago
Read 2 more answers
When using VLOOKUP we can search for information from more than one spreadsheet. <br> True or False
Pepsi [2]

heyy man it's true for sure

7 0
3 years ago
Other questions:
  • To evaluate trends in the workforce, investigate
    14·1 answer
  • How can the connection to salesforce be restricted only to the employee portal server? Universal containers (UC) uses a legacy E
    13·1 answer
  • What can be used to describe and document the analysis and design of complex software systems?
    14·1 answer
  • Suppose that, on average, a certain binary search algorithm takes one second to search through 1,000 items. Approximately how lo
    9·1 answer
  • I’m turning my Pinterest into a professional account what should be my user name please try to think of a good name and not just
    11·2 answers
  • James would like to send a document he has saved on the hard drive to coworkers in Ireland, Brazil, and India. These coworkers h
    6·2 answers
  • What type of data uses numbers that can be used in the arithmetic operations?
    14·1 answer
  • PLEASE HELP!
    5·1 answer
  • A workstation is out of compliance with the group policy standards set by the domain what command prompt would you use to ensure
    5·1 answer
  • What is the purpose of a computer virus? O to spread a disease to humans O to substitute for a human disease a O to disrupt a co
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!