1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldi70 [24.7K]
3 years ago
14

Which of the following describes the phishing method of information security crime?

Computers and Technology
2 answers:
SVETLANKA909090 [29]3 years ago
5 0
The answer is C pretending to be someone else when asking for information
Marianna [84]3 years ago
3 0
<span>C. pretending to be someone else when asking for information</span>
You might be interested in
Write a short reflection piece (it may consist of three bulleted items, with one explanatory sentence) on three things you learn
nydimaria [60]

Answers

  • OS(The Operating System) sends <em>interrupts to the processor</em> to stop whatever is being processing at that moment and computer architecture send <em>data bus</em>. This bus sends<u> data between the processor,the memory and the input/output unit.</u>
  • The operating system is a low-level software that supports a <em>computer’s basic functions</em>, such as <u>scheduling tasks and controlling peripherals</u> while the computer architecture has the <em>address bus bar</em>. This bus carries <u>signals related to addresses between the processor and the memory. </u>
  • The interface between <em>a computer’s hardware and its software</em> is its Architecture while An operating system (OS) is<u> system software that manages computer hardware and software resources and provides common services for computer programs.</u>

Explanation:

In short explanation,the Computer Architecture specifically <em>deals with whatever that's going on in the hardware part of the computer system </em>while the Operating System is the computer program <em>which has been program to execute at some instances depending on the programming instructions embedded in it</em>. An example is the MS Office.

5 0
3 years ago
What is it called when you define a variable for the first time
Nimfa-mama [501]

Answer:

That is called declaring a variable

Explanation:

6 0
2 years ago
Read 2 more answers
Social media sites like stuffdot are often classified based on two factors; self-disclosure and ________
Artist 52 [7]

Answer:

The answer to this question is "Media Richness".

Explanation:

Media Richness is a theory, that says Media has the power to convey the information that is needed in communication. This depends on whether uncertain times which type of data will be used, which is explained by the Mass Communication.  

  • Media Richness is the amount in which two social members make audio, visual and private interaction.
  • It provides face to face communication that was released in 1987 which ranks this as the richest channel for mediated communication.
8 0
3 years ago
The university student registration system is unable to cope with the high volume of telephone calls received at registration ti
Y_Kistochka [10]

The university student registration system is unable to cope with the high volume of telephone calls received at registration time. Among others, busy signals and long distance charges are inherent problems of the telephone registration system.

An online student registration system needs to be developed. In addition, students on campus, off campus, in-state, out of state, and out of country can easily and inexpensively take advantage of many of the services provided by the Office of the Registrar, which today require users to be on campus during business hours.

What is System investigation

System Investigation is the process of finding out what the system is being built to do and if the system is feasible. I

t is the process of finding out what the system is being built to do and if the system is feasible. This will help gain an understanding of the technical resources of the organization and their applicability to the needs of the system.

System Analysis and Design - Overview:

Systems Analysis:

It is a procedure for gathering and analyzing data, determining the issues, and breaking down a system into its constituent parts.

System analysis is done to investigate a system or its components in order to pinpoint its goals. It is a technique for solving problems that makes the system better and makes sure that all of its parts function effectively to serve their intended purposes.

Analysis lays out the system's proper course of action.

Systems Design:

Planning a new business system or replacing an existing system involves defining its modules or components to meet the necessary requirements. Prior to making any plans, it is essential to have a thorough understanding of the current setup and decide how to make the most effective use of computers.

To know more about System investigation, visit: brainly.com/question/14682150

#SPJ9

4 0
1 year ago
Joanna accidentally leaned on her keyboard and repeatedly typed the letter z. How can she fix this mistake?
Brut [27]

Answer:

just press delete

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek res
    15·2 answers
  • Which network topology requires terminators at the ends of the backbone cable?
    6·1 answer
  • Formatting. Given input that represents a floating point number, that is, made up of digits and at least one decimal point, conv
    15·1 answer
  • How to write a self-analysis essay
    5·1 answer
  • I need help answering these questions!
    11·1 answer
  • Help me match these answers
    5·1 answer
  • Write a C++ program that determines if an integer is a multiple of 7. The program should prompt the user to enter and integer, d
    13·1 answer
  • Trong ửod muốn trình bày dạng cột càn thực hiện lệnh nào
    13·1 answer
  • In a black box model are the customers told that they should be expecting to be haxked?
    13·1 answer
  • Why is it now difficult for computer technology to maintain the pace of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!