1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
10

Which of the following attack is a threat to confidentiality?

Computers and Technology
1 answer:
velikii [3]3 years ago
3 0

Answer:

The correct answer is letter "B": masquerading.

Explanation:

The attack referred to as masquerading simply consists of impersonating the identity of an authorized user of an information system. The impersonation could take place electronically -<em>the user has a login and password that does not belong to him to access a server</em>- or personally -<em>employees accessing restricted areas of a company.</em>

You might be interested in
the list of available fonts in the fonts gallery may differ, depending on what fonts you have installed and the type of printer
aalyn [17]
I believe the correct answer is true. The <span>list of available fonts in the fonts gallery may differ, depending on what fonts you have installed and the type of printer you are using. Not all fonts would be available in all computers and for all printers. It should be installed first before use.</span>
5 0
3 years ago
This component is responsible for the logical order of processing?
Svetradugi [14.3K]

Answer:

A) ALU

Explanation:

The arithmetic logic unit (ALU) performs the arithmetic and logical functions that are the work of the computer.

So, the correct option is - A) ALU

6 0
3 years ago
What should you change if you want one particular slide to have a different arrangement of text box placeholders?
Ganezh [65]
<span>slide layout you should change the slide layout hope this helps  ................</span>
8 0
3 years ago
Each vertex in a graph of n bertices can be the origin of at most ____edges
EastWind [94]

Answer:

B. n-1

Explanation:

If there are n vertices then that vertex can be origin of at most  n-1 edges.Suppose that you have a graph with 8 vertices you can select a vertex from these 8 vertices now you have 7 other vertices.So the vertex you selected can have at most 7 edges or it can be origin of at most 7 edges.So we conclude that the answer is n-1.

6 0
3 years ago
Write a c program that reads marks of ten students calculate percentage and deviations percentage of each student using array
Yanka [14]

Answer:

a

Explanation:

3 0
2 years ago
Other questions:
  • Regulatory control limits the activities of an organization in compliance with the organization's policies. True False
    14·2 answers
  • How many total channels are available in the United States for wireless LAN use in the unlicensed 2.4ghz ism band ?
    6·1 answer
  • Componets of computer
    5·1 answer
  • Methods that require you to use an object to call them are called ____ methods.1. accessor
    7·1 answer
  • THIS IS PYTHON QUESTION
    11·1 answer
  • What word describes a violation of copyright laws? What rights do copyright holders have over their work of art
    5·2 answers
  • For BitTorrent, which of the following is true:
    6·1 answer
  • Please help!!!
    9·2 answers
  • In PowerPoint _____ management is extremely important and you must keep track of what links, files, and programs are placed in w
    14·1 answer
  • A company is completing research and development for software which it is planning to produce in approximately 2 years time. Whi
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!