1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bas_tet [7]
3 years ago
14

If i were to give you free points woulld you take them?

Computers and Technology
2 answers:
kipiarov [429]3 years ago
6 0

Answer:

D) friend me

Explanation:

Nesterboy [21]3 years ago
5 0

Answer:

yesh-

yes-

yes-

okie c:

Explanation:

bc, yes.

You might be interested in
Match each item with a statement below. a.Authentication b.Brute force attack c.Dictionary attack d.Password e.Shoulder surfing
Lana71 [14]

The steps that ensure that the individual is who he or she claims to be

a. Authentication  

Authentication is a process that provides proof that the user is genuine and not an imposter. It is a way to prove that you are allowed to access a system. Usernames and Passwords have been the default method of authentication. These days though, passwords are not the only authentication mechanism.

A password attack in which every possible combination of letters, numbers, and characters is used to match passwords in a stolen password file

b. Brute force attack  

An automated brute force attack involves repetitive successive attempts of password guesses by using a trial and error approach and hoping to guess the encryption correctly. It is an old attack method, but is still in effect and popular with hackers. It can take minutes to crack or an eternity. Using automated brute force attacks tools and programs, and attacker is able to enter parameters such as password length, character set, pattern, language, and skips for the type of password to be generated

A password attack that compares common dictionary words against those in a stolen password file.

c. Dictionary attack  

A dictionary attack is another common offline password attack that begins with the attacker creating encrypted versions of common dictionary words and then compares these words against those in a stolen password file. This is sometimes very successful because users create passwords that are simple English dictionary words. A variation of such an attack is the hybrid attack.

A secret combination of letters, numbers, and/or symbols that serves to authenticate a user by what he or she knows.

d. Password  

Nowadays, when accessing almost any computer device, systems, or a website, we are typically required to provide information that identifies and proves that we are actually that person. This is done by the use of passwords. Despite passwords being the primary means of authentication, they are no longer considered to be a strong defense against attackers.

Viewing information that is entered by another person

e. Shoulder surfing  

An example of shoulder surfing is observing someone entering a code from a keypad while standing from a short distance. Another good example is a hotel room’s cipher lock. Cipher locks are vulnerable to shoulder surfing. Someone passing by from behind is able to see the buttons being pushed and can easily gain access when you leave.

Grouping individuals and organizations into clusters based on an affiliation  

f. Social networking and not social engineering

The definition above is for social networking and not social engineering. Social networking sites are responsible for facilitating individuals with common interests and beliefs and operates and functions as an online community of users. Anyone on social media is able to read information posted by others. Thus, social networking carries with it cyber risks like personal data being used maliciously.

Redirecting a user to a fictitious website based on a misspelling of the URL  

g. Typo squatting

Also known as URL hijacking, Typosquatting is a questionable type of cybersquatting that targets internet users who type a web address incorrectly. It is the extreme version and similar to phishing. When users make such errors, they may be lead to another alternative site owned by a hacker.

Phishing attack in which the attacker calls the victim on the telephone

h. Vishing  

Instead of using emails or other forms of communication to contact the potential victim, a simple phone call can be used. Known as voice phishing, an attacker calls an unsuspecting victim and pretends to be someone working with the victim’s bank. The attacker lies to the user that his or her credit card has experienced fraudulent activity, instructs the victim to call a specific number and hangs up. Upon calling back, the victim is instructed by automated instructions telling them to enter credit card numbers and other essential details.

A phishing attack that targets wealthy individuals  

i. Whaling

Whaling is a type of spear phishing where instead of targeting the small fish, it targets the “bigger fish” or the wealthy individuals who have larger sums of money in a bank account. By putting every effort on this group, the attacker can invest more time in the attack and achieve major success.

6 0
3 years ago
Choose the correct option that completes the sentence.
vekshin1

What are the answer options?

5 0
3 years ago
Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a d
tamaranim1 [39]

The method calcPyramidVolume is an illustration of the java methods; where the methods are executed when called or evoked

<h3>The main program</h3>

The program written in Java, where comments are used to explain each action is as follows:

//This defines the calcPyramidVolume method

public static double calcPyramidVolume(double baseLength,double baseWidth, double pyramidHeight) {

//This calculates the volume of the pyramid

       double PyramidVolume = calcBaseArea(baseLength,baseWidth) * pyramidHeight;

//This returns the volume of the pyramid

       return PyramidVolume;

   }

Read more about java methods at:

brainly.com/question/19271625

7 0
3 years ago
Which of the following is a new feature in Windows Server 2016 that enables block-level data replication to occur automatically
Inessa [10]

Answer:

Option C is the correct answer for the above question

Explanation:

  • The storage replica is a new advantage that is used in the 2016 version of the windows server. It is a feature which is very useful for the user point of view, because of it more secure the data transfer on the internet.
  • It is used to block the duplicate data, by which the storage space is left for the other data and the data will secure when it stores on the server.
  • The above question asked about the features which are a new advantage of the 2016 version and provide block facilities for the duplicate data which is storage Replica which is defined above.
  • Hence the correct option is C, while the other is not because others is not a feature to block the duplicate data.
7 0
3 years ago
There are 12 inches in a foot and 3 feet in a yard. Create a class named InchConversion. Its main() method accepts a value in in
Dafna1 [17]

Answer:

import java.util.Scanner;

public class InchConversion

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

   

 System.out.print("Enter inches: ");

 double inches = input.nextDouble();

 

 inchesToFeet(inches);

 inchesToYards(inches);

}

public static void inchesToFeet(double inches){

    double feet = inches / 12;

    System.out.println(inches + " inches = " + feet + " feet");

}

public static void inchesToYards(double inches){

    double yards = inches / 36;

    System.out.println(inches + " inches = " + yards + " yards");

}

}

Explanation:

In the inchesToFeet() method that takes one parameter, inches:

Convert the inches to feet using the conversion rate, divide inches by 12

Print the feet

In the inchesToYards() method that takes one parameter, inches:

Convert the inches to yards using the conversion rate, divide inches by 36

Print the yards

In the main:

Ask the user to enter the inches

Call the inchesToFeet() and inchesToYards() methods passing the inches as parameter for each method

7 0
3 years ago
Other questions:
  • Identify the publisher in this citation:Carter,Alan.A guide to Entrepreneurship.New York: River’2008.Print.
    9·1 answer
  • Which one of these tasks best describes the process of localization?
    12·1 answer
  • The economist George gilder argued that
    6·1 answer
  • The final step of the DHCP Discovery process is known as...
    8·1 answer
  • A technician is configuring a new SOHO multifunction wireless router at a customer’s location to provide network access to sever
    12·1 answer
  • Rene has added to touches and shoulder stretches to his warm up routine these activities are most likely to improve his
    15·1 answer
  • When entering a expressway using a weave lane you must do what
    7·1 answer
  • Consider the following two code segments. In both, assume that n is an integer variable that has been declared and initialized.
    10·1 answer
  • You work in an office that uses Linux servers and Windows servers. The network uses both the TCP/IP protocol. The Linux server i
    11·1 answer
  • Hi i choose brainlyest 4 free
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!