1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
2 years ago
13

Which of the following is most likely to be a result of hacking? Group of answer choices slowing of network speed certain Web si

tes being censored for hurting sentiments pop-up ads appearing frequently small amounts of spam in a user's inbox an unauthorized transaction from a user's credit card
Computers and Technology
1 answer:
olchik [2.2K]2 years ago
3 0

Answer:

The correct answer to the following question will be "an unauthorized transaction from the credit card of a user".

Explanation:

Hacking was the catch-all word for some form of software misuse or exploitation that violates the protection of someone's computing device for stealing data, corrupting systems or information, manipulating the infrastructure or in some way disrupting related to data-activities.

  • The current popular type involves the phishing scam, whereby hackers or attackers try to obtain username names as well as their passwords or add vulnerabilities to networked processing ecosystems by tricking clients through accessing a mail file or transmitting confidential data.
  • The other options are not related to the given scenario like hacking. So, above it the right answer.
You might be interested in
What are the features of G-mail <br><br>(Write in your own words)​
wlad13 [49]

Answer:

here is what I think!

Explanation:

G-mail is:

  1. secure
  2. easy to use
  3. fast
  4. can be used to sign in anywhere!<u>(including brainly)</u>
  5. you don't need to pay when creating one
  6. can help you in billing and buying apps and their paid product
  7. <em><u>you </u></em> can use it because <em>why no!</em>
  8. some websites need G-mail to be used

thats why you should use G-mail

tell me if you have an idea!

3 0
3 years ago
Read 2 more answers
The WorkOrders table contains a foreign key, ClientNum, which must match the primary key of the Client table. What type of updat
OlgaM077 [116]

Answer:

Changing the customer number on a record in the Orders table to a number that does not match a customer number in the customer table would violate referential integrity.

If deletes do not cascade, deleting a customer that has orders would violate referential integrity.

If deletes cascade, customer can be deleted and all orders for that customer will automatically be deleted.

8 0
2 years ago
What is the worst case time complexity of insertion sort where position of the data to be inserted is calculated using binary se
laiz [17]

Answer:

O(n²)

Explanation:

The worse case time complexity of insertion sort using binary search for positioning of data would be O(n²).

This is due to the fact that there are quite a number of series of swapping operations that are needed to handle each insertion.

4 0
2 years ago
#5 Multiple Select Which of the following describes a hardware error? Select 3 options.
DENIUS [597]

Answer:

A, E

Explanation:

Hope this is correct

7 0
3 years ago
Read 2 more answers
Write a program that prints the question " Do youwant to continue? " and reads a user input. if the userinput is " Y ", " OK", o
Nataly_w [17]

Answer:

#include <bits/stdc++.h>

using namespace std;

int main() {

   string in;//string in for taking input...

   cout<<"Do you want to continue ?"<<endl;

   getline(cin,in);//taking input from the user...

   if(in=="y"||in=="Y"||in=="yes"||in=="OK"||in=="Why not?")//conditions..

   cout<<"OK"<<endl;

   else if(in=="No")

   cout<<"terminating"<<endl;

   else

   cout<<"Bad input"<<endl;

return 0;

}

Explanation:

I have taken a string in.

Then taking input from user.

Checking the conditions using if else if ladder.

7 0
2 years ago
Other questions:
  • What are the 6 external parts of a computer
    14·1 answer
  • The camera on a phone or laptop can be used to track a user's eye movements. Which of these is NOT one of the possible applicati
    13·1 answer
  • Why might people feel differently about their digital lives?
    11·1 answer
  • What helped Taylor through her tough time with being bullied
    7·1 answer
  • Write a function stats that takes an array and the number of elements in the array. Then, it computes and prints the minimum val
    8·1 answer
  • What are the disadvantages of using pointers?
    6·1 answer
  • Raul in Colombia can enter data into a spreadsheet. Olivia in England can access the spreadsheet a few minutes later and use Rau
    7·1 answer
  • To print a budget:________.
    9·1 answer
  • NEED HELP ASAP!!!!!!!!!!!
    7·1 answer
  • Write a function called play_round that simulates two people drawing cards and comparing their values. High card wins. In the ca
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!