1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
4 years ago
15

Gaining control of somebody's computer without their knowledge and using it to carry out illicit activities is known as a. hacki

ng. b. hijacking. c. sniffing. d. phreaking.
Computers and Technology
1 answer:
IrinaK [193]4 years ago
7 0
Possibly “sniffing” ?
You might be interested in
David is working in a database that organizes student exam grade information. He needs to find all students who have scored 100
kobusy [5.1K]

Answer:

David can apply filter to the data in order to show only records that meet the criteria.

Explanation:

  • Filter is a very helpful option that displays the records that you want to view, hiding rest of the unwanted records.
  • Sometimes you want to extract and view only the records that match a specific criteria instead of viewing all the records.
  • For example in the CUSTOMERS table which contains names, addresses, countries of customers. There are several customers from different countries but you only want to view the customers from Spain. So you can use filter feature to view all the customers from country Spain.
  • In MS Access you can apply filters using Sort & Filter group in the Home tab by selecting the desired column. In SQL, WHERE clause can be used along with SELECT to for filtering and extracting certain records. SELECT will select the records from the table and WHERE clause will specify the criteria to select the certain records.
7 0
4 years ago
Ethical design refers to...
Travka [436]

Answer:

C. A set of principles dictating that technology should do no harm and seek to improve the human condition

Explanation:

Anything "ethical" refers to being "right" or "just", for example, calling someone a racial slur would not be ethical, but learning a little bit about their culture to understand them better would be ethical

8 0
3 years ago
What is the recommended procedure for disconnecting an external hard drive to avoid losing data??
SpyIntel [72]
Go to files than click on USB file then do eject device before taking it out
6 0
3 years ago
Read 2 more answers
A network technician needs to set up two public facing web servers and watns to ensure that if they are compromised the intruder
Taya2010 [7]

Answer:

D. Place them in the demilitarized zone.

Explanation:

Demilitarized zone(DMZ) is a logical or physical sub network that contains and gives exposure to an organization's external-facing services to an not trust worthy network, basically a larger network like Internet. It's purpose is to add an extra layer of security in an organization's LAN(local area network).So we conclude that DMZ is best way so that intruder cannot access the intranet.

4 0
3 years ago
Late at night, some traffic signals change patterns and become _____.
Dimas [21]

Answer:

combined in color.

Explanation:

It's because the modern traffic signals are controlled by the computers, and they are programmed to display different signals for different times of day, night, days of week and holidays etc.

6 0
3 years ago
Read 2 more answers
Other questions:
  • The local emergency manager has the responsibility for coordinating emergency management programs and activities. A local emerge
    7·1 answer
  • Which statement best describes when Variable Substitution (expansion) can occur?
    6·2 answers
  • Chapter 21 discusses four aspects of the speaking situation you should take into account when planning the graphics you'll use i
    15·1 answer
  • The dramatic increase in the number of people having access to the Internet has been made possible, in part, because of the rela
    8·1 answer
  • Explain why it is important that software products are developed and delivered quickly. Why is it sometimes sensible to deliver
    14·1 answer
  • Implement a metho d to nd the k-th largest element in an array of size N using a minimum priority queue (MinPQ). Assume that the
    8·1 answer
  • Which of the following is the BEST example of the principle of least privilege? Correct Answer: Wanda has been given access to t
    13·1 answer
  • What is networking??????????????????????
    8·1 answer
  • What tag would you enter to link the text “White House" to the URL<br> http://www.whitehouse.gov?*
    15·1 answer
  • Assume that two students are trying to register for a course in which there is only one open seat. What component of a database
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!