1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilia_Sergeevich [38]
3 years ago
10

5. Drawing Conclusions If you were a person in

Computers and Technology
1 answer:
mr Goodwill [35]3 years ago
8 0

Answer:

During the medieval period, having membership in a guild was important for trade. It would ensure the products traded/sold were held to the standard and sold for the fair price.

You might be interested in
Why when i click home on iphone i still at my grandma house
kramer

Answer:i don't know

Explanation:

3 0
4 years ago
Read 2 more answers
Zack sees an online contest. He could win $10,000 instantly! On the sign-up form he enters his name and email address. He is als
lana66690 [7]

Answer:

Do not please! Online hackers and identity thieves can use such informations or clues to figure out Zack's passwords.

Explanation:

In this scenario, Zack sees an online contest stating that he could win $10,000 instantly! On the sign-up form he enters his name and email address. He is also asked to enter his nickname, the name of any pets, and his mom's maiden name.

Hence, it is advisable, that Zack shouldn't do it because online hackers and identity thieves can use such informations or clues to figure out Zack's passwords.

Basically, this type of cyber attack is simply known as baiting in social engineering.

Social engineering can be defined as a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering are quid pro quo, phishing, baiting, tailgating etc.

8 0
3 years ago
45 points!!
pav-90 [236]

Answer:

ENQUIRE database system

Explanation:

5 0
3 years ago
Read 2 more answers
Changing the configuration of a database falls under which category of databaseâ administration?
harkovskaia [24]
Changing the configuration of a database falls under which category of databaseâ administration?

d. operation
8 0
3 years ago
Do Violent Video Games Make People More violent in Real Life ?
vova2212 [387]
To be honest, NO. Its just a videogame but i see what you are saying...
4 0
4 years ago
Other questions:
  • How will a packet tracer environment be affected if a heater is added to a container named branch office and turned on?
    5·1 answer
  • The expressionvecCont.empty() empties the vector container of allelements.
    13·1 answer
  • Which port-authentication network access control standard forces devices to go through a full authentication, authorization, and
    13·1 answer
  • 1.Customer service is assistance provided by a company to the people who buy or use its products or services.
    13·2 answers
  • An electronic storage file where information is kept is called a cpu. true false
    11·1 answer
  • How to change color of object in photoshop?
    10·2 answers
  • Is there any difference beetween the old version of spyro released on the origional and the newer ones??? or is it only change i
    8·1 answer
  • What is the main difference between a peripheral device and other types of devices? Choose the best answer.
    12·1 answer
  • 70 point Brainlist to best answer
    15·1 answer
  • In a selection, the else clause executes ______________. a. always b. when the tested condition is false c. when the tested cond
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!