1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina86 [1]
3 years ago
13

Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known

as:
a. mass marketing
b. social engineering
c. telephone solicitation
d. hacking
Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
3 0
<span>Social engineering is when a person convinces someone to reveal personal information and security system. Those people who use social engineering can trick people through telephone interactions, face-to-face interactions, and email or web interactions. In telephone interaction, they act like a technician but attempts to gather information from the victim. The person who uses face-to-face interactions is when the victim is interrogated to get information. And in email or web interactions, these social social engineering technique will send survey forms that asks personal information such as bank account.</span>
You might be interested in
What are TWO examples of soft skills?
Elanso [62]
Computer programming and throubleshooting
3 0
3 years ago
Write a statement that outputs variable numObjects. End with a newline.
dalvyx [7]

Answer:

The code is witten in Java and given in the explanation section.

Using a Scanner object we receive a the user's input and with the System.out.println we output the variable

Explanation:

import java.util.Scanner;

public class VariableOutput{

   public static void main (String [] args){

       Scanner input = new Scanner(System.in);

       System.out.println("Enter an Integer 15 or 40");

       int numObjects = input.nextInt();

       System.out.println("You entered the number "+numObjects);

   }

}

7 0
3 years ago
1. image-editing software
Snezhnost [94]
  • PDF:-Portable Document Format
  • Database software:-software that organizes a collection of information
  • image-editing software :-software used to enhance photographs
  • presentation software :-software used to create a slide show
  • CAD:-software used to create technical drawings.

Done

8 0
2 years ago
Write a WHILE loop that lets the user enter a number.
balandron [24]

Answer:

while True:

   number = int(input("Enter a number: "))

   product = number * 10

   if product > 100:

       break

print(str(product))

Explanation:

Create a while loop that iterates until a specific condition is created inside

Ask the user for the input

Multiply the input and put the result in product

Check if the product is greater than 100. If it is, stop the loop using break keyword

When the loop is done, print the product

7 0
3 years ago
Which of the following is not a basic role of a webmaster
Natalija [7]
Out of the following, the only one that I see is not the basic role of a webmaster is replying to customers questions about the web site! Usually they have a specific job for that; like customer service etc. Hopefully that helps.
5 0
4 years ago
Other questions:
  • In three to five sentences, describe how good e-mail work habits increase workplace efficiency and productivity.
    12·1 answer
  • Put these steps for managing your study time in chronological order. 1 set aside the same time each day 2 Identify the best time
    14·1 answer
  • What are the data types used in C programming with examples
    5·1 answer
  • You are tasked with accumulating survey data on a web page and are responsible for it being free from dirty data once you close
    11·1 answer
  • Is it safe to tape down cords such as internet cables to the floor?
    14·1 answer
  • Next, Leah wants to add a content slide that allows her to insert a table.
    8·2 answers
  • How many points do I need to be able to message people
    9·2 answers
  • Qr code is more developed than barcode​
    11·1 answer
  • A _____ is a computer that is deliberately set up to be easily hacked into.
    10·1 answer
  • A printer is considered to be in the category of
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!