1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
3 years ago
11

A hacker changing the ip addresses used in conjunction with a particular company’s web site to re-route them to the hacker’s ser

vers is called dns ____________________.
Computers and Technology
1 answer:
dybincka [34]3 years ago
7 0
Hi,


Answer => Poisoning


Good Lessons
You might be interested in
There is a feature that allows you to lock the document, to avoid others making changes. True or False
Burka [1]

Answer:

yes there is

Explanation:

6 0
3 years ago
Despite the rise of messaging apps and other forms of social media, these efforts are focused on consumer efforts, with corporat
miss Akunina [59]

Answer:

False

Explanation:

In our current market, we can find some messaging apps and social media designed for corporation organization setting. One example of messaging apps widely used in corporate world is Slack. The Slack enable user to set up different communication channel with their colleagues and flexibly set their working status.

FB also releases a corporate version of social media which is Workplace. The main attracting point is the contents are ad-free and you can expect to see company update or department news from the nesfeed.

4 0
3 years ago
From your fist impression, write down what first comes to mind as to what is good and bad about the way the device works.
nalin [4]

Answer:

xczczxczx

Explanation:

6 0
3 years ago
The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:
GuDViN [60]

Answer:

C. Post-incident activity.

Explanation:

An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.

An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.

7 0
3 years ago
Describe it the impact of computer in office?​
krok68 [10]

Answer:

Computers in the office environment significantly enhance productivity. According to the Reference for Business Web site, computers in the office increase productivity not only in areas such as word processing, data management and information access, but also in information creation, collation and ultimately storage. The amount of time most office workers spend at the computer has, however, given rise to a number of repetitive strain health problems on eyes, wrists and hands

hope it helps (^^)

# Cary on learning

7 0
2 years ago
Other questions:
  • Behaving in an acceptable manner in a workplace environment is referred to as workplace etiquette.
    12·2 answers
  • which tag does not display the text in the browser window and makes the sources code mode readable ?​
    6·1 answer
  • What are the 5 general terms of the fair use rule
    9·1 answer
  • Your motherboard supports dual channeling and you currently have two slots used in channel a on the board; each module holds 1 g
    15·1 answer
  • Variables used for output are associated with what controls on a form?​
    5·1 answer
  • What would you recommend for data segregation if using cloud software
    12·2 answers
  • How can you put a logo on html without breaching the copyright, design and patents act
    12·1 answer
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • - What are the different types of clients?
    12·1 answer
  • Coding 5 - Classes The Item class is defined for you. See the bottom of the file to see how we will run the code. Define a class
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!