1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
3 years ago
9

Joel has left his computer unattended while answering a phone call . A TV repairer in his house tries to surf through the applic

ations on his computer to find out Joel’s personal data .
Which privacy-related risk threatens him ?

Here, Joel is a victim
Of _________ .
Computers and Technology
1 answer:
Triss [41]3 years ago
5 0
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
You might be interested in
HOWARD!!!!!! THE PHONE IS RINGING!!!!!!!!!
777dan777 [17]

Answer:

i am confused

Explanation:

7 0
3 years ago
Read 2 more answers
How does ur computer know that its cursor moved
Anton [14]
The sensor of a mouse connected to the computer or the touch pad being touched and swiped around on
8 0
3 years ago
Read 2 more answers
legacy application that has hard-coded static IP addresses and is running on an EC2 instance, what is the best failover solution
AlladinOne [14]

Answer:

Elastic IP address

Explanation:

Elastic IP addresses are static, persistent public IP addresses which can be associated and disassociated with the instance, as required.

This will provide the best failover solution that will keep same IP address on a new instance.

6 0
4 years ago
5. Create a vector called to20 that goes from 1 to 20 (use the range notation). Now create a variable called end that goes from
Lady_Fox [76]

Answer:

creating vector:

code:  

to20 <-c(1:20) #creating to20 vector

end <-c(40:50) #creating end vector

to50 <-c(to20,21:30,end) # creating to50 vector

print(to50) # printing to50 vector

Explanation:

8 0
3 years ago
¿cual es la diferencia entre pagina web y pagina dreawmweaver?​
SSSSS [86.1K]

Answer:!!!

Explanation:¿Qué son exactamente?

Dreamweaver es lo que le llaman un “programa editor de texto” que permite realizar diseños web usando los lenguajes y códigos comunes de programación como son HTML, PHP, MySQL, CSS y Javascript.

WordPress es un gestor de contenidos CMS especialmente pensado desde un punto de vista e idea de BLOG.

¿Qué ventajas tienen?

Dreamweaver es totalmente personalizable en cuanto a estética, estructura y contenido, es decir, se puede hacer cualquier sitio web con esta herramienta.

WordPress su característica principal es que toda persona familiarizada con un blog y los procesadores de texto puede realizar cambios de la información (imágenes, textos, vídeos o cualquier contenido) sin depender de terceras personas como diseñadores o programadores.

¿Qué inconvenientes hay?

Dreamweaver aunque se pueden diseñar todo tipo de páginas, es imprescindible tener conocimientos avanzados de este programa y HTML para realizar cualquier pequeño cambio, aunque sólo sea en el texto. Desde hace unos años, es preferible no trabajar con tablas y DW se basa principalmente en ellas. Hoy día, especialmente con la popularización de internet en móviles, los sitios deben ser “responsive”, para ello el montaje nunca debe ser con tablas, sino webs flexibles y adaptables a cualquier dispositivo.

WordPress tiene más limitaciones de diseño, pero se pueden usar plantillas o temas.

En síntesis

Si las páginas web que necesitas no precisan de cambios frecuentes pero sí quieres un diseño muy personalizado, tu mejor opción es Dreamweaver (HTML + CSS). Por el contrario, si tu sitio web requiere de actualizaciones constantes de contenido, lo adecuado es optar por prepararlo en WordPress, de manera que será siempre dinámico y fácilmente gestionable.

5 0
3 years ago
Other questions:
  • What type of attack intercepts communication between parties to steal or manipulate the data?
    13·1 answer
  • How does kinetic energy affect the stopping distance of a small vehicle compared to a large vehicle?
    14·2 answers
  • You are the administrator of a Windows network. When creating a new user account, you specify a security clearance level of top
    8·1 answer
  • What does the minimum password age setting control?
    15·1 answer
  • Which of the following is the best example of an installation issue?
    6·2 answers
  • Xxx<br>uuuuuu<br>uuuu<br>jjnmn<br>jjh
    12·1 answer
  • Write an enhanced for loop that multiplies all elements in an int[] array named factors, accumulating the result in a variable n
    11·1 answer
  • Ima go to sleep but I ask a favor can u guys go on eBay Amazon and find the cheapest pre bilt that is actually good
    14·2 answers
  • Write the syntax of FOR......NEXT loop​
    13·1 answer
  • In what real-life situations might you want to use the modulus operation in a program?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!