1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nastasia [14]
3 years ago
7

Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known

as:
Computers and Technology
1 answer:
Evgen [1.6K]3 years ago
6 0
No it is not broadcast on stations overseas but on overseas military base stations it can sometimes be found.
You might be interested in
Are brake and break pronounced the same way?​
erastova [34]

Answer:

one is correct and yes

Explanation:

4 0
3 years ago
The ___ appears at the bottom of the windows desktop; it is used to launch and manage programs.
asambeis [7]
<span>The taskbar appears at the bottom of the windows desktop. It is used to launch and manage programs. 
</span>The taskbar is part of the GUI (Graphical User Interface) . The most common uses of the taskbar is to<span> to locate and launch programs through the Start button, to view any program that is currently open, check the date an time.</span>
4 0
3 years ago
Portraits should not ever include any objects other than the person. <br>True <br>False
KonstantinChe [14]

Answer:

False

Explanation:

Be safe and make good choices!!

8 0
3 years ago
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
morpeh [17]

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
4 0
3 years ago
This is my new horrible subject lol
AysviL [449]
I’m 98% sure that it is B because customer service would be provided to people who buy from the company and need help
5 0
3 years ago
Other questions:
  • You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need
    13·1 answer
  • The create_python_script function creates a new python script in the current working directory, adds the line of comments to it
    9·1 answer
  • 98 points possible
    12·2 answers
  • POINT AND BRAINLIEIST GIVE AWAY!!!
    11·2 answers
  • To control how and when the slides should appear during the slide show, we use the__________________ feature​
    12·1 answer
  • How many clients has<br> Accenture engaged globally on blockchain?
    12·1 answer
  • 1
    13·1 answer
  • In testing you find that one of the tables in your database has multiple versions of one of the columns, and updating the inform
    6·1 answer
  • The tools, skills, knowledge, and machines created and used by humans is known as.
    13·1 answer
  • Can anyone help my please
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!