1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
3 years ago
9

Joel has left his computer unattended while answering a phone call . A TV repairer in his house tries to surf through the applic

ations on his computer to find out Joel’s personal data .
Which privacy-related risk threatens him ?

Here, Joel is a victim
Of _________ .
Computers and Technology
1 answer:
Triss [41]3 years ago
5 0
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
You might be interested in
Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
inysia [295]
<span>b. Application software 

Applications are type of software that are installed in a specific operating system of a computer that deviates from those system software installed together with the system itself. These third-party applications are necessary for other functions such as entertainment, business, leisure and other needs addressing of which the system software can't provide.

Examples:
Microsoft Office Word, Excel, Powerpoint</span>
8 0
3 years ago
What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
vaieri [72.5K]

The  type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.

<h3>What is replay attacks in security?</h3>

A replay attack is known to be a kind of security attack that is known to be done if  or when a cybercriminal is said to spy on a secure network communication.

Note that by this, they tend to intercepts the message  and then they can fraudulently delays or as well as resends it to misdirect the receiver into carrying out the thing that  the hacker wants.

Hence, The  type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.

learn more about  digital data from

brainly.com/question/28346439

#SPJ1

8 0
2 years ago
List three different sets of keywords that could be used to search for information on how to
ohaa [14]

Answer:

Set 1: "Trumpet", "Maintenance", "Instructions"

Set 2: "How to", "Trumpet", "Care", "Instrument"

Set 3: "Proper", "Clean", "Service", "Trumpet"

Explanation:

Actual search engines allow very advanced searches, using multiple words related with your objective will improve the results obtained. Also you can refine your search by using specific operators to include or exclude words, websites, file types or dates.

For example in Google search, using + and - will force the results to include and exclude respectively the  following word. Typing several words between " (double quotes) will search specifically for that sentence, the same words and in the same order. Using filetype: will restrict results of a specific file extension, like jpg, or pdf.

There are many other operators available, you can find more information about this by looking for "advanced search operators" of your favourite search engine.

7 0
3 years ago
NumA = 3 <br>numB = 2<br>Result = numA ** numB
Paul [167]

Answer:

The result of the following code will be 9

Explanation:

There are several operators used in Python to do mathematical calculations.

** operator is used for exponents.

i.e.

a ** b mathematically means a^b

Here in the given code

3 is assigned to numA and 2 is assigned to numB

Result will be equal to 3^2

Hence,

The result of the following code will be 9

3 0
3 years ago
What is the process viewing files in chrome web browser cache?
Andreyy89

Step 1. Click the address bar at the top of your Google Chrome window, type "About: cache" into the box and press "Enter." A page will appear with a list of cached files and their addresses.

Step 2. Press the "Ctrl" and "F" keys on your keyboard at the same time to open the find bar.

Step 3. Type part of the name or address of a cached file into the find box and press "Enter" to find it. Continue pressing "Enter" to page through any matching results.

Step 4. Select the full address of the cached file on the page with your mouse and press "Ctrl" and "C" at the same time to copy the address.

Step 5. Click the address bar, press "Ctrl" and "V" at the same time to paste the address and press "Enter" to load the file. Chrome loads the file from the cache.

Step 6. Right-click the image, page or script and select "Save As" to save the cached file to your computer.

6 0
3 years ago
Other questions:
  • You can use the_______key if your cursor is at the end of the word. Use the______key if you place the cursor on the left side of
    11·1 answer
  • Which set of steps will organize the data to only show foods with more than 100 calories and rank their sugar content from great
    8·1 answer
  • You're trying to improve an ad's perceived quality so it performs better during an ad auction. What change would have the least-
    15·1 answer
  • The Telecommunications Act of 1996 was a mixed bag for cable customers. Although cable companies argued that it would bring more
    8·1 answer
  • What malware looks like a useful or desired executable program but is, in reality, a program that is supposed to cause harm to y
    11·1 answer
  • Lol fortnite really going UwU and anime
    12·2 answers
  • Group of programs are software <br>​
    11·1 answer
  • QUESTION 10
    11·1 answer
  • The different languages that follow specific RULES. These languages use commands
    9·1 answer
  • A search expression entered in one search engine will yield the same results when entered in a different search engine.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!