1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
miss Akunina [59]
3 years ago
7

________ involves the use of the internet to steal important information.

Computers and Technology
1 answer:
Ivenika [448]3 years ago
5 0
Phishing involves the use of the Internet to steal important information.
Shoulder surfing refers to people spying on other people while they are using an ATM. Skimming a credit card refers to thieves using a device in ATMs to steal information from cards. Dumpster diving refers to picking trash from dumpsters.
You might be interested in
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
ACCOUNTING
ivann1987 [24]

last question is D

Hope this helps

7 0
4 years ago
Read 2 more answers
Which situations are most likey to use Telehealth
Scilla [17]

Answer:

Emergency situations that make it difficult to go to a clinic will likely require Telehealth. Examples include cases of

1. heart attack

2. breathing difficulties

3. health challenges that begin in the night

4. onset of child labor

5. a pandemic situation where hospitals are filled up

6. sickness among aged people in rural communities with no clinic, etc.

Explanation:

Summarily, the World Health Organization (WHO) defines Telehealth as the 'incorporation of Information Communication Technology in the delivery of health care services in situations where patients and health care providers are separated by distance'. Emergency health situations that make it difficult to quickly access medical help can benefit from Telehealth.

In the cases of a pandemic such as the one experienced in 2020, where hospitals were filled to the brim, telehealth proved to be a useful form of health care delivery.

4 0
3 years ago
What are smart mobile devices?
Mashutka [201]
Do you mean like a phone

IPhones
Samsung
Moto z
Lge sorry if this isn't what you asked
7 0
3 years ago
Read 2 more answers
A company is executing a strategy to encrypt and sign all proprietary data in transit. The company recently deployed PKI service
Nadusha1986 [10]

Answer:

S/MIME

TLS

SFTP

Explanation:

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol that is generally accepted for sending encrypted messages or sign them after encrypting.

TLS is also considered a cryptographic protocol that is known for providing safe and secure communication security over networks and are in most cases used for internet communications.

SFTP also known as SSH or Secure File Transfer Protocol is a network protocol that allows for the transfer, access, and management of files over reliable and secure data stream.

Hence, a company executing a strategy to encrypt and sign all proprietary data transit can use these 3 protocols.

4 0
3 years ago
Other questions:
  • For the question below, refer to the following recursive factorial method.
    8·1 answer
  • If a question on a job application does not apply to you, simply write
    8·2 answers
  • IPv6 enables hosts to generate their own IPv6 addresses without the need for a DHCPv6 server. This is referred to as stateless a
    7·1 answer
  • During the system investigation stage, __________ studies are done to determine if the hardware, software, and communications co
    9·1 answer
  • Any one have a snnaap chhhaatt if so i need help with something n there
    15·2 answers
  • A tornado destroyed many
    6·2 answers
  • Which measurement symbol is this?<br>PLS HELP<br>​
    14·1 answer
  • What element of art does this photograph show? A. shape B. space C. form D. tone E. line
    14·1 answer
  • How to download film​
    14·2 answers
  • MOA115 Medical Records and Insurance
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!