Answer:
The correct answer is 1. Social engineering
Explanation:
In computer security, social engineering refers to a technique where someone with a malicious intent tricks or manipulates people else to give up confidential information or perform an action that goes against their best interest.
In our case, this can be seen as a very clear case of social engineering. This is because the situation is extremely suspicious: it's extremely rare, for a software company to call a specific customers to alert them of bugs and offer assistance in order to "fix" said bug. The "tech" expert could mislead an unsuspecting user into revealing some confidential information or installing backdoor software disguised as part of the bug fixing process. This situation is not unlike pop-up ads that appear on some websites, alerting the user that a virus or a security flaw has been detected, and prompting the user to click a dodgy link that actually leads to a malicious website or downloads some equally malicious software.
Answer:
Thorndike's law of effect
Explanation:
Thorndike's law of effect states that if the reponse to an action is pleasurable the person tries to keep doing the same action to receive pleasure.
If a person gets displeasure from an action's response then the person will stop doing that action.
For example, if a child gets candy from their parent after getting good grades, the child will try obtain good grades in the next test in order to recieve the plesurable response of receiving candy.
Answer: extrusive igneous rocks.
Explanation:
Answer:
firsthand: coming from experience from a work background or personal experience.
Example: "I have no firsthand experience working with this"
secondhand: been given from a previous owner, by force/gift.
example: "I inhaled secondhand smoke from someone next to me that was smoking."
Source: A source is like a blog when researching information
example: I had to cite my source in MLA format