1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
3 years ago
6

The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in

""the dark science of social engineering (or ‘hacking the human’).""
Computers and Technology
1 answer:
slega [8]3 years ago
5 0

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

You might be interested in
Why does Brainly say, "We're sorry, but we are not able to complete your registration at this time?" Please tell me, because I r
Rus_ich [418]

just change your age to 13 or above-

6 0
3 years ago
Which of the statements below describe guidelines for effective presentation layouts? (multiple choice)
____ [38]
Putting as much information as possible on a slide is wrong because sometimes, that will create a messy presentation. A messy presentation can become unreadable and if your information is unreadable, it is not effective. Similarly, you do not want to use a font color that blends in with the background. A yellow font on a yellow background could clash negatively or make your information seem to disappear into the background completely. Presenting this on a screen would make it almost impossible to see anything of what you wrote. This would be ineffective, as well. Using the largest font size possible is also not a very good idea because it's going to be too big. It will fill up the entire screen and make everything messy seeming, overwhelming to look at, or unreadable. Another ineffective decision. 

Now, although using a maximum of two fonts on a slide is important, this does not specify the fonts which you should NOT use. There are many unreadable fonts that create a messy an ineffective presentation, and just getting to choose any two of them isn't very specific.

The correct answer would be to use a consistent color scheme. Sometimes the most effective presentations are simple, yet well put together. 
8 0
3 years ago
Read 2 more answers
A hub is a central computer true or false?
klio [65]

Answer:

hub is central computer.....True...

4 0
2 years ago
Read 2 more answers
Although females are born with approximately 2 million ova, this number declines to
Pepsi [2]

Answer: 1

Explanation:

a woman is born with about 1-2million ova, during puberty this figure reduce to between 600,000 and 1million. during her child bearing years the figure drops down to about 300,000 to 400,000 ova, out of which only about 500 would be ovulated during her reproductive years. the rest die out during menopause.

8 0
3 years ago
An intranet is an external network.TrueFalse
maria [59]

Answer:

False

Explanation:

An intranet is not an external network.

An intranet is an internal network which is established by an organization for its own use.

External people can not access the Intranet unlike the internet which is accessible to every one.

An organization owns a private network which is called an intranet. Private means that the network is accessible to all those employed within the organization, staff of the company.

Intranet exists only within the company and indicates the following.

1. The company establishes its own network inside the company so that the staff of the company can access and exchange information among themselves.

2. The staff can communicate and have discussions on the network.

3. The information is not accessible to outside parties such as customers, stakeholders, and others.

4. The network is not accessible and does not exists for the outside parties.

5. The term intra means inside and net means network.

Intranet leads to the following benefits.

1. The staff can view and exchange information with more ease and comfort and in less time.

2. Faster access to information increases employee output. Employees can perform better and have more time to focus on their work.

3. Communication among the employees is encouraged and made easy. Any one can communicate with every one in the company.

4. More communication leads to better working relationships among the staff. Cooperation and collaboration among the staff is given a boost.

5. Staff can give their input for the type of information to be held in the respository. This serves as the single point of information which enables smooth work flow.

Intranet also has some drawbacks.

The employees can take undue advantage of this communication channel for personal communications and information exchange.

Unproductive communication can only hamper the culture of the workplace.

Guidelines should be enforced to avoid unnecessary communication.

3 0
4 years ago
Other questions:
  • ) write a program that creates a vector of string called "vec". vector "vec" grows and shrinks as the user processes the transac
    6·1 answer
  • . Suppose that name is a variable of type string. Write the input statement to read and store the input Brenda Clinton in name
    5·1 answer
  • What type of things can be marketed
    11·1 answer
  • A customer uses an app to order pizza for delivery. Which component includes aspects of the customer's interaction with an enter
    10·1 answer
  • A-1 grdening supply is preparing a reprt to hand out to the customerez in pointes form only.why should the reprts writers avoid
    9·2 answers
  • What are Manuscript signs​
    8·1 answer
  • A photojournalist is more employable than a reporter or a photographer because they can perform more than one job
    13·1 answer
  • Employing the use of a(n) <br> will help you manage a STEM project.
    13·1 answer
  • 9) Which date is assigned the serial number of 1?
    10·2 answers
  • Define a class in Java to accept and store the list of 10 names in an array. Print the
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!