1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina86 [1]
3 years ago
13

Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known

as:
a. mass marketing
b. social engineering
c. telephone solicitation
d. hacking
Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
3 0
<span>Social engineering is when a person convinces someone to reveal personal information and security system. Those people who use social engineering can trick people through telephone interactions, face-to-face interactions, and email or web interactions. In telephone interaction, they act like a technician but attempts to gather information from the victim. The person who uses face-to-face interactions is when the victim is interrogated to get information. And in email or web interactions, these social social engineering technique will send survey forms that asks personal information such as bank account.</span>
You might be interested in
When a typist changes from a conventional typewriter to a word processor, his typing schema will have to _____ to incorporate th
Elis [28]
<span>The schema will have to accommodate to make the person more easily able to perform the new task. Accommodation allows the new information to be made a part of a schema without changing the overall concepts in the schema. The schema itself stays unchanged for the most part, but the new information is more of a "tweak" to the schema than a full-on update.</span>
8 0
3 years ago
To create a formula, click the cell where you want to add the formula and press the _____ key.
Ipatiy [6.2K]
C........is the answer
4 0
3 years ago
Read 2 more answers
Levi wants to run 5 commands sequentially, but does not want to create a shell script. He knows that each command is going to ta
sergeinik [125]

Answer:

um

Explanation:

what subject is this again?

3 0
2 years ago
¿Por que windows es el sistema operativo más utilizado?
Hatshy [7]

Answer:

Explanation:

Hay muchas razones, para empezar Windows ha estado desde el año 1995. Tuvo muchas actualizaciones y Microsoft (la compañia que lo creo) los sigue actualizando y agregando nuevas funciones. Ademas de eso, Windows es compatible con casi todos los programas que salen. Esto le ayuda a que el usario pueda usar todos los programas que quiera y aumenta la popularidad del sistema operativo. Microsoft tambien trae pre-instalado Windows en todas sus computadoras personales que vende.

3 0
2 years ago
What term is used to describe an individual's money and personal property? budget income assets finances
Ilya [14]

Answer:

Pretty sure it's assests.

Explanation:

Income - Intake of money.

Budget - How much money you can spend.

Finances - Things you need to pay ort fund.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What OS has a large market share but is limited because it can be installed only on one particular brand?
    8·2 answers
  • Write a program that lets the user play the game of Rock, Paper, Scissors against the computer. The program should work as follo
    5·1 answer
  • Field names should NOT start with a(n) -<br> hyphen (-)<br> Oa<br> asterisk (*)<br> space()
    8·1 answer
  • Which of the following is the core of an operating system that maintains the computer’s clock, starts applications, and assigns
    5·1 answer
  • who will follow me on tiktok and like all my videos? if you do ill give branlist and give u a shoutout and you can enter my big
    15·1 answer
  • Having data in a column formatted differently based on value is known as
    7·1 answer
  • Hi I need help with an assignment. We're learning about encryption and decryption in code.org. i need help with three of the tex
    14·1 answer
  • Which steps are correct for creating a document from a user-defined template?
    15·1 answer
  • Consider this binary search tree:______.
    12·1 answer
  • When proofreading, you should do all of the following except _____.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!