1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
3 years ago
13

You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen ha

s a banner ad for Dallas Cowboy hats and shirts. This banner ad is most likely the result of :_________a. tracking softwareb. a coincidencec. the Internet crime of theft of private informationd. encryption software
Computers and Technology
1 answer:
masha68 [24]3 years ago
4 0

Answer:

The correct answer is A. You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen has a banner ad for Dallas Cowboy hats and shirts. This banner ad is most likely the result of tracking software.

Explanation:

Tracking software are programs installed by various websites that have the function of collecting search data from the internet user, in order to redirect advertising on topics that said user is interested in, as they have previously searched for them. These programs, for example, are used to offer products that have been previously investigated by the user, such as airline tickets or clothing offers, among many other things.

You might be interested in
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
A huge variety of networking hardware and software appeared. One challenge was to enable these different networks to communicate
madam [21]

Answer:

Internet Protocol (IP)

Explanation:

The Internet Protocol (IP) is a protocol, or set of rules, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.

6 0
3 years ago
Create an Automobile class for a dealership. Include fields for an ID number, make, model, color, year, vin number, miles per ga
aliya0001 [1]

Answer:

public class TestAutomobiles {

   public static void main(String args[]) {

     Automobile obj = new Automobile(1, "Wolkswagen", "Golf", 2007, "GR1GR", 20, 120, "Grey");

  System.out.println("Initial Speed: " + obj.getSpeed());

  System.out.println("Current Speed with acceleration 100: " + obj.accelerate(100));

  System.out.println("Current Speed after using brake : " + obj.brake());

   }

}

class Automobile {

    private int idNumber, year, milesPerGallon, speed = 0;

    private String model, vinNumber, make, color;

   

    public void setIdNumber(int idNumber){

       if (idNumber >= 0 && idNumber <= 9999)

           this.idNumber = idNumber;

       else this.idNumber = 0;

    }

    public void setModel(String model){

        this.model = model;

    }

    public void setYear(int year){

       if (year >= 2000 && year <= 2017)

           this.idNumber = idNumber;

       else this.year = 0;

    }

    public void setVinNumber(String vinNumber){

        this.vinNumber = vinNumber;

    }

    public void setMilesPerGalon(int milesPerGallon){

       if (milesPerGallon >= 10 && year <= 60)

           this.milesPerGallon = milesPerGallon;

       else this.milesPerGallon = 0;

    }

    public void setSpeed(int speed){

        this.speed = speed;

    }

    public void setMake(String make){

        this.make = make;

    }

    public void setColor(String color){

        this.color = color;

    }

    public int getIdNumber(){return idNumber;}

    public String getModel(){return model;}

    public int getYear(){return year;}

    public String getVinNumber(){return vinNumber;}

    public int getMilesPerGallon(){return milesPerGallon;}

    public int getSpeed(){return speed;}

    public String getMake(){return make;}

    public String getColor(){return color;}

   

   public int accelerate() {

       setSpeed(speed + 5);

       return speed;

   }

   public int brake() {

       setSpeed(speed - 5);

       return speed;

   }

   public int accelerate(int s) {

       setSpeed(speed + s);

       return speed;

   }

   public int brake(int s) {

       setSpeed(speed - s);

       return speed;

   }

   

    public Automobile(int idNumber, String make, String model, int year, String vinNumber, int milesPerGallon, int speed, String color){

       setIdNumber(idNumber);

       setModel(model);

       setYear(year);

       setVinNumber(vinNumber);

       setMilesPerGalon(milesPerGallon);

       setSpeed(speed);

       setMake(make);

       setColor(color);

    }

}

Explanation:

Required <em>variables</em> are declared as private members.

Their <em>setters</em> and <em>getter</em> are created.

Two <em>accelearate</em> and two <em>break</em> methods are created.

One <em>constructor</em> taking all variables as parameter is created.

In the main, I tested a few functions to check if they work properly.

4 0
3 years ago
Which of the following statements comparing debit cards to credit cards is TRUE?
liq [111]
<span>The question has a few multiple choices one can choose from;

</span><span>A. Debit cards allow you to draw funds directly from your checking account. 
B. Debit cards typically offer greater fraud protection than credit cards.
C. Debit cards never require a signature to finalize a purchase like credit cards.
D. Debit cards charge higher interest rates on purchases than credit cards</span><span>

The Answer is (A) Debit cards allow you to draw funds directly from your checking account.

Checks were replaced by Debit cards as a way of paying for goods or drawing funds from your checking account. Since your debit card comes with your checking account, its simplicity will work nearly everywhere a credit card works. Adding a credit card to your checking account is just adding a layer of complications to your finances.
The fact that a debit card draws on money you already have, those who spend a lot would do well with debit cards and avoid the temptation of credit.</span>
3 0
3 years ago
Read 2 more answers
Hahaahhaahahuahaahahhahqha
anastassius [24]

Answer:

Bird baths, open containers, gutters, drainage systems

4 0
3 years ago
Other questions:
  • Frank is a writer. He needs to work for long hours and type for long periods on the computer. What injury can Frank develop?
    15·2 answers
  • What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning? mail b
    6·1 answer
  • you are concerned with security at your company and want to implement a technology that requires no configuring on the users sid
    15·1 answer
  • What is the output of the following program? #include using namespace std; class TestClass { public: TestClass(int x) { cout &lt
    5·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • If we can lock a file, we can solve the race condition problem by locking a file during the check-and-use window, because no oth
    14·1 answer
  • refers to a problem-solving approach that requires defining the scope of a system, dividing it into its components, and then ide
    12·1 answer
  • Picture related to cyber safety
    10·2 answers
  • Which is the highest level of the hierarchy of needs model?
    14·1 answer
  • Interest on loan paid to sangam stores Rs5000(journal entry)​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!