1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlladinOne [14]
3 years ago
15

When people seek information to support their point of view and discount data that do not

Computers and Technology
1 answer:
Julli [10]3 years ago
3 0

Answer:

The correct answer to the following question will be "Confirmation".

Explanation:

It is still the method of receiving and reviewing relevant private individual contact in response to a statement for clarification on a specific product concerning claims in financial reporting.

  • A confirmation or clarification means something might be accurate. It is evidence of it or definitive confirmation of doing or about something.
  • As people try evidence to endorse their opinion and dismiss facts that do not confirm.
You might be interested in
San Diego broker Cal Abrams has avoided the technological trend of the past 20 years. Finally, he's jumped online and realized w
AnnZ [28]

Answer:

Cal Abrams must do online advertising and learn digital marketing.

Explanation:

First, Cal has to learn digital marketing that is another name of marketing and advertising online on the internet. He must learn digital marketing courses that are easily available on the internet and some of them are free to learn. However, some of them required a subscription to learn. Learning digital marketing and advertising is so easy. After learning the basics of digital marketing, he must learn the skills of using social media effectively for reaching millions of potential customers.

However, the following are different tools that can be used effectively for online advertising and marketing to reach millions of customers just by running one little advertisement.

  • (Please see the attachment).

4 0
3 years ago
. List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
Flura [38]

In cyber security, an exploit is a way attackers take advantage of certain vulnerabilities and gain malicious access to systems. There are very many types of exploits that exist in the cyber security world. However, I will mention those ones most commonly used.

DoS attacks – The denial of service attacks is very common. Hackers will gain access to servers and send so many packet requests at the same time. The servers become overwhelmed due to too much memory allocation and the huge amount of traffic ends up crashing the servers.

Unauthorized access – When an attacker has an illegal access to host machines

<u>Application Exploitation</u>

Code injection – This exploit can be used to maliciously inject invalid code into an application program or software and as a result change how the program behaves.

Cross-site scripting – Enable hackers inject malicious scripts on a website of a client. Once they have gained access, they will escalate their privileges and have more access to the site.

Clickjacking – A type of attack that tricks unknown victims into clicking links of a web page they believe are legitimate and end up revealing confidential information of themselves.

6 0
3 years ago
Mainframe computers are multi-programming, high-performance computers, and multi-user, which means it can handle the workload of
Vilka [71]

Answer:

a. True

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user. Computers can be classified on the basis of their size and capacity as follows;

I. Supercomputers.

II. Mainframe computers.

III. Mini computers.

IV. Micro computers.

Mainframe computers were developed and introduced in the early 1950s.

Mainframe computers are specifically designed to be used for performing multi-programming because they are high-performance computers with the ability to handle multiple users. As a result, it simply means that mainframe computers can be used to effectively and efficiently perform the work of over one hundred (100) users at a time on the computer. Some examples of mainframe computers include the following; IBM Es000 series, CDC 6600 and ICL39 Series.

Furthermore, mainframe computers are mostly or commonly used by large companies, business firms or governmental institutions for performing various complex tasks such as census, financial transactions, e-commerce, data sequencing, enterprise resource planning, etc.

8 0
2 years ago
Read 2 more answers
Which if the following is an effect of intellectual property theft?
Leno4ka [110]
Record companies lose money because people download songs for free.
8 0
2 years ago
Read 2 more answers
Which of these is not a type of socket?/computer wise
d1i1m1o1n [39]

Many sockets have existed throughout history but only three are relevant today. These are LGA, PGA and BGA.

8 0
3 years ago
Other questions:
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    13·1 answer
  • Look up and list the number of a local taxi or car service in your community. Include the company name and telephone number.
    13·1 answer
  • The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?
    6·1 answer
  • What can you do to manually exclude an individual from a recipient list?
    6·1 answer
  • Please Help!! How to code this in Python?
    11·1 answer
  • Dennis would like to include a video in a presentation. The source of the video is on the internet, but he would like to ensure
    10·2 answers
  • A person's oral communication skills can give either a positive or negative first impression.
    12·1 answer
  • What is the main purpose of a web crawling program
    15·1 answer
  • Life without internet points
    7·2 answers
  • Q.3.1 Explain why devices on a network need addresses. (5)​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!