1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
2 years ago
6

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames

, passwords, personal information, and social security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer’s names. This is a classic example of which of the following security breaches?a) A social engineerb) An insiderc) A spammerd) A dumpster diver
Computers and Technology
1 answer:
nata0808 [166]2 years ago
8 0

Answer:the correct answer is the c)

An insider

Explanation:

Insiders that perform attacks have a distinct advantage over external attackers because they have authorized system access and also may be familiar with network architecture and system policies/procedures.

You might be interested in
Which Tire would you use to explain a set of phones in an HTML document?
timama [110]

Answer:

<dl> tag is used to describe things

So, it is used to create a definition list

So, answer is <dl> , definition list

3 0
2 years ago
Write, run, and test a MARIE assembly language program.The program should allow the user to input 8 numbers and find the smalles
STatiana [176]

The language program is as follows:

<u>Explanation:</u>

ORG 100   / Calculation of the maximum

Load First /loading 1st array member

Store Next /address of next pointer,stores

Load Array /Loading 1st element

Store Max /maximum value with 1st element

Loop, Clear

AddI Next /Load next element!

Subt Max /Comparing with the maximum once

Skipcond 000 /If negative ->skip

Jump NewMax /If not negative ->max value

NextIdx, Load Next

Add One /pointer++

Store Next

Load Count /counter--

Subt One

Skipcond 800 /counter is positive ->same proceeding

Jump Print /else - printing the result

Store Count /counter decresed and stored

Jump Loop

NewMax, Clear / new maximum value

AddI Next

Store Max

Jump NextIdx

Print, Load Max

Output

Halt /Terminate program

First, Hex 11E /starting is location 11E(change as per...,as code changes don't forget to change it too)

Next, Hex 0 /next element index (memory location)

Max, Dec 0 /maximum value

Count, Hex 8 / loop counter decreases

One, Dec 1 /Loop stops

say array:

[Dec -5, Dec 15, Dec -17, Dec 20, Dec -23, Dec 12, Dec 130, Dec -12]

4 0
2 years ago
Need help not sure if I’m correct
77julia77 [94]

Answer:

First and the second option

8 0
3 years ago
Hannah wanted to watch a movie. She typed the movie name on the search engine. In result she found the downloadable link of the
Marat540 [252]

Answer:

So is the actual question?

Explanation:

6 0
3 years ago
MCQ: The data is transferred from one place to another through:
zalisa [80]

Answer:

transmission media... but not sure

5 0
2 years ago
Read 2 more answers
Other questions:
  • Write a pyhton program to calculate area of a circle?
    12·1 answer
  • What are the names of each devices pleaseee​
    13·2 answers
  • What is the computer box called?
    15·2 answers
  • When you move or size a control in the Form Designer, Visual Studio automatically adjusts the ________________ that specify the
    9·1 answer
  • One of the most common causes of fires in the home and workplace is: a. All of the answer choices b. Arson c. Candle d. Faulty e
    6·1 answer
  • A certain manager makes the following statement "Our internet company is in business for the money, making profits, and making t
    13·1 answer
  • Read the poem again and work in pairs or groups to do the following tasks.
    6·1 answer
  • Order the steps needed to design a relational database.
    11·1 answer
  • Define two benefits to members of the community of replacing the printed copy with an online version.
    5·1 answer
  • William brought some data into his Tableau Book, but the data had some null values and incorrect column headers. What did Willia
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!