1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
10

Which of the following attack is a threat to confidentiality?

Computers and Technology
1 answer:
velikii [3]3 years ago
3 0

Answer:

The correct answer is letter "B": masquerading.

Explanation:

The attack referred to as masquerading simply consists of impersonating the identity of an authorized user of an information system. The impersonation could take place electronically -<em>the user has a login and password that does not belong to him to access a server</em>- or personally -<em>employees accessing restricted areas of a company.</em>

You might be interested in
Help me asap ill give brainliest
kobusy [5.1K]

Answer:

Give me brainliest thanks

6 0
3 years ago
Identify the selector in the following CSS code:
SashulF [63]

Answer:

The right answer is: Option A. h3

Explanation:

The purpose of using selectors in CSS is to find the elements in the HTML page to which the formatting will be applied.

Different type of selectors are used in CSS.

In the given code, h3 is the selector.

All the <h3> elements on the page will be of orange color and will have font size 12.

Hence,

The right answer is: Option A. h3

6 0
3 years ago
Zach follows the instructions that show him how to create a custom Web site in his school's learning management system. These st
NNADVOKAT [17]

Answer:

The answer is "Procedure"

Explanation:

In the given statement certain information is missing, that is choices, which can be described as follows:

a. procedure

b. software

c. data

d. hardware

e. memory

The procedure is a way, that accomplishes any task in the following steps, if there is a long process so, we divide this process into parts or modules to accomplish the task, and  certain alternative was wrong, that can be described as  follows:

  • Software is a program, that is accomplished in the procedure.
  • data, It describes all procedures.
  • hardware, It is a device, in which we work.
  • memory, It stores all the data in a procedure.    
3 0
3 years ago
Which is usually the smallest computer?
WITCHER [35]
I would have to say it would be a PDA, because they generally arent much bigger than a cell phone. at least mine is pretty small anyway. there are certain brands that make larger ones almost the size of a tablet, but in general terms, PDAs are usually pretty small. hope this helps.
7 0
3 years ago
Which of these field types allows multiple, non-exclusive options?
AlexFokin [52]

Question:

Which of these field types allows multiple, non-exclusive options?

A. multi-part

B. checkbox

C. text

D. radio button

E. button

Answer:

The correct option is B) Checkboxes

Explanation:

Field types is a terminology often associated with Database Management.

A field type is often found in a data collection apparatus such a form. It's inherent quality or nature will determine the kind of data that it can collect.

Some field types allow for exclusive options. That is, in some data field types, it's impossible to select more than one option.

For example, a Button field type can only collect one type of value.

A Checkbox on the other can be configured to allow for multiple selections which may or may not be exclusive.

When working with Microsoft Access, for instance, you are required to select the name of the <em>field </em>and define the type of <em>field data.</em>

<em />

Cheers!

6 0
3 years ago
Other questions:
  • Which statements describe the advantages of using XML?
    12·2 answers
  • Pointsyour company environment includes windows server versions 2003, 2008, and 2012. desktops range from windows xp and vista.
    13·1 answer
  • Which of the following situations would not require knowledge of networking?
    6·1 answer
  • What type of file can most software applications read?
    5·2 answers
  • highlight the possible risks and problems that should be address during the implementation of information system process
    5·1 answer
  • Which of the following symbols is a part of all spreadsheet functions?
    7·2 answers
  • Sabiendo que z1 = 10, z2 = 20, z3 =10 , z4 = 20, n1 = 1200 rpm.
    6·1 answer
  • When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This adjustm
    13·1 answer
  • Internal exception java.net.socketexception connection reset 1.18
    8·2 answers
  • When trying to upload assignment on canvas wont let me click choose file.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!