1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldi70 [24.7K]
3 years ago
14

Which of the following describes the phishing method of information security crime?

Computers and Technology
2 answers:
SVETLANKA909090 [29]3 years ago
5 0
The answer is C pretending to be someone else when asking for information
Marianna [84]3 years ago
3 0
<span>C. pretending to be someone else when asking for information</span>
You might be interested in
A computer system has 9,850 processes and 172 of them were suspended while 276 of them were terminated. Explain why some of the
Mrrafil [7]

Answer:

Check below for answers and explanations.

Explanation:

The major reasons why computer processes are suspended or terminated are:

1. When there is insufficient memory for successful completion of the process

2. When there's an unauthorized access of any of the computer resources by the process.

It is possible that some processes are terminated why some are suspended because, when the system runs out of memory, the running processes are put on hold until the system is able to create free memory space for the completion of the process. In this case the process is suspended. But if the system cannot provide enough space for the process, the process is terminated.

In the example provided in this exercise, some of the processes were suspended because the system wants to create free memory space for their completion while others are terminated either because the available space is not sufficient for their completion or they want to access an unauthorized resources on the system.

4 0
3 years ago
What is a true job in the information age?​
Gelneren [198K]

Answer:

apple

you get a lot of information about the technology you paid for.

if this was not helpful comment and I’ll fix it!

3 0
3 years ago
"If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or hard
Jobisdone [24]

Answer:

It is  just true in most cases

Explanation:

This statement is just true in most cases because in some cases having a physical access to the computer or hard drive this does not guarantee access to the information contained in the hard drive or computer because the data/information in the hard drive or computer might as well be encrypted and would require a password in order to de-crypt the information.

Having a physical access is one step closer in some cases but not the only step required .

4 0
3 years ago
In a computer spreadsheet, tool used to construct formulas is called *
zubka84 [21]

Formula bar is the tool used to contrust formula

3 0
3 years ago
In ipv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belong
deff fn [24]

Answer:

Flow label

Explanation:

A Flow label in IPv6 is a value given to a sequential flow of packets. To better understand what a flow label is, we need to know what a flow is first. A flow is a series of packets sent from a combination of a source address to a destination address. The routers configured to deal with IPv6 addresses handle these flows. Therefore, a flow label makes delivery of packets that belong to other similar sequential packets from source to destination or multiple destinations a priority.

5 0
3 years ago
Other questions:
  • Create a class called Clock to represent a Clock. It should have three private instance variables: An int for the hours, an int
    15·1 answer
  • Find a 95% confidence interval for the mean failure pressure for this type of roof panel.The article "Wind-Uplift Capacity of Re
    7·1 answer
  • Similarites between hardware and software
    9·1 answer
  • A company has critical systems that are hosted on an end-of-life OS. To maintain operations and mitigate potential vulnerabiliti
    14·1 answer
  • The blank provides access to the internet May also be internal ??
    14·1 answer
  • Which type of cables are used for high-capacity trunk lines that provide main routes for telephone, cable, and internet communic
    15·1 answer
  • I live in Alabama and I’m ab to leave to go on a 3 week trip to France and I’m wondering how I can get LTE for my IPhone 6s Plus
    15·2 answers
  • Help!!
    15·1 answer
  • Which of the following is a type of input device?
    5·1 answer
  • In which wireless configuration type do nodes communicate directly with each other, rather than with an access point?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!