1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stolb23 [73]
3 years ago
14

Whoever answers first gets lots of points

Computers and Technology
2 answers:
zimovet [89]3 years ago
8 0
Firssstttttt ayyyyyyeeeeeeeeeeeee
madreJ [45]3 years ago
5 0
I'm not first but hahaha
You might be interested in
You have invested millions of dollars for protecting your corporate network. You have the best IDS, firewall with strict rules a
Anna35 [415]

Answer:

Social Engineering

Explanation:

Even if you invest in the best possible security infrastructure for your corporate network, you will still be vulnerable to attacks which exploit human shortcomings. An example is where an attacker manipulates a company employee to get the system access password in return for a favour. Now he can use the password to bypass all security infrastructure and gain access to critical data and code.

4 0
3 years ago
Q1: Which of the following is an input peripheral device?
faltersainse [42]

Answer:

Mouse

Explanation:

Input devices allow users to input something in the computer. For example keyboard allows users to type on the computer, or mouse allows users to click.

On the other hand output devices allow computers to output data. For example speakers allow us to hear the outputs of a computer.

3 0
3 years ago
Read 2 more answers
Rita used information from a blog that someone else wrote. What should she do?
Shkiper50 [21]

Answer:

rita should either ask the original author for permission to use her blog, but the best answer woyuld be that she should site her sources.

Explanation:

7 0
2 years ago
Write an application that prompts a user for a month, day, and year. Display a message that specifies whether the entered date i
gizmo_the_mogwai [7]

Answer:

Following is given the code with all necessary description given as comments in it. I hope it will help you!

Explanation:

4 0
3 years ago
1. Which raster image file type supports millions of colors and transparency?
Alona [7]

Answer:

PNG-24

Explanation:

6 0
3 years ago
Other questions:
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator t
    14·1 answer
  • Which of these are examples of a Single Sign-On (SSO) service?
    5·1 answer
  • Which of the following is a group of email names and addresses used for mass distribution of a message?
    5·1 answer
  • Downloading files is safe for most types of files except Select one: a. documents. b. pictures. c. executable files. d. music fi
    7·1 answer
  • ______ are used to store all the data in a database.
    7·1 answer
  • Please help thank you !!!
    7·2 answers
  • Do like TikTok??????
    14·2 answers
  • Http://www.alegrium.com/sgi/2/eibder
    5·1 answer
  • Give one (1) advantage and one(1) disadvantage of using and integrated software package over a custom written one.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!