1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Agata [3.3K]
3 years ago
15

What is the term used when a password is obtained through tricking a user into giving it to another party?

Computers and Technology
1 answer:
Shtirlitz [24]3 years ago
8 0
It would be Social Engineering 
You might be interested in
Do the pros of interpersonal communication via social media outweigh the cons? Explain.
JulijaS [17]
Well in my opinion is that yes they do. The ability to be able to communicate with others so far way really helps society advance towards the future. And i cant stress of how the benefits of being able to share ideas with well anyone is so wonderful.

I hope this helps.
6 0
3 years ago
Read 2 more answers
Can anyone help? Please.
Shtirlitz [24]
I can’t see it... can you type it out please?
3 0
3 years ago
Read 2 more answers
The slide layout has placeholders for text, charts, and tables. true or false.
Ksju [112]
The answer to this is true
3 0
3 years ago
Read 2 more answers
Put the following events from computer history in the order they happened:
kykrilka [37]
Show us a picture so we can answer
7 0
3 years ago
Decribe the advantages of using emails compared with physical faxing ?
fredd [130]

Answer:

email is SO much faster

Explanation:

6 0
3 years ago
Other questions:
  • Jail and prison officials may generally limit inmate rights when the limitations serve
    13·2 answers
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • Once a graph has been created, you would need to start over to make any changes to it?
    5·1 answer
  • A ddr4 dimm with a pc rating of pc4-17000 is running at what speed?
    15·1 answer
  • In general, digital to analog modulation equipment is less expensive than the equipment for encoding digital data into a digital
    8·1 answer
  • Select all that apply.
    10·1 answer
  • What is an Algorithm? (might not be in the chapter text). Give an example.
    13·1 answer
  • A(n) __________ prevents outsiders from accessing corporate information the user does not want others to see.
    9·1 answer
  • Identify the characteristics of logic problems. Select all that apply.
    11·2 answers
  • Describe a cellular network, its principle<br> components and how it works.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!