1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
3 years ago
7

Pharming involves redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web brow

ser. pretending to be a legitimate business's representative in order to garner information about a security system. setting up fake Web sites to ask users for confidential information. using e-mails for threats or harassment.
Computers and Technology
1 answer:
Anna35 [415]3 years ago
8 0

Answer:

Pharming involves:

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.          

Explanation:

  • When a hacker steals your confidential and private information by installing a malicious code on your computer which misdirects you to fake and fraudulent websites, this is called pharming.
  • Hacker installs virus on your computer which manipulates the host files on your computer.
  • The hacker uses DNS cache poisoning to attack DNS services on your computer which makes many users to enter fraudulent site, unknowingly, as they type the URL of the real website.
  • These fraudulent website developed by hacker can install virus on your computer and steal confidential information from your computer.
  • Pharming is done by hackers in order to steal sensitive data from a person's computer.
You might be interested in
What are three limitations of computer?​
Lady bird [3.3K]

Answer:

Explanation:

Three limittaions of computer are:

It requires reqular power supply to operate .

It needs instructions to perform a task.

It cannot memorize and recall.

8 0
3 years ago
LAB: Count characters - methods
tangare [24]

Answer:

i hope understand you

mark me brainlist

Explanation:

using namespace std;

#include <iostream>

 

#include <string.h>

#include <stdlib.h>

#include <stdio.h>

 

#define BLANK_CHAR (' ')

 

 

int CountCharacters(char userChar, char * userString)

{

 

int countReturn=0;

 

int n = strlen(userString);

 

for (int iLoop=0; iLoop<n; iLoop++)

{

       if (userString[iLoop]==userChar)

       {

        countReturn++;

 }

}

return(countReturn);

}

 

/******************************************

    Removes white spaces from passed string; returns pointer

     to the string that is stripped of the whitespace chars;

   

  Returns NULL pointer is empty string is passed;  

     Side Effects:

 CALLER MUST FREE THE OUTPUT BUFFER that is returned

 

 **********************************************************/

char * RemoveSpaces(char * userString)

{

 

 char * outbuff = NULL;

 

 if (userString!=NULL)

 {

   int n = strlen(userString);

    outbuff = (char *) malloc(n);

 

   if (outbuff != NULL)

   {

          memset(outbuff,0,n);

          int iIndex=0;

          //copies non-blank chars to outbuff

         for (int iLoop=0; iLoop<n; iLoop++)

         {

           if (userString[iLoop]!=BLANK_CHAR)

          {

           outbuff[iIndex]=userString[iLoop];

           iIndex++;

   }

   

   } //for

         

   }

   

   }

 return(outbuff);

 

}

 

 

int main()

{

 

 char inbuff[255];

 cout << " PLEASE INPUT THE STRING OF WHICH YOU WOULD LIKE TO STRIP WHITESPACE CHARS :>";

 gets(inbuff);

 

 char * outbuff = RemoveSpaces(inbuff);

 if (outbuff !=NULL)

 {

    cout << ">" << outbuff << "<" << endl;

    free(outbuff);

    }

     

   memset(inbuff,0,255);  

   cout << " PLEASE INPUT THE STRING IN WHICH YOU WOULD LIKE TO SEARCH CHAR :>";

gets(inbuff);

 

  char chChar;

 cout << "PLEASE INPUT THE CHARCTER YOU SEEK :>";

 cin >> chChar;

 

 int iCount = CountCharacters(chChar,inbuff);

 cout << " char " << chChar << " appears " << iCount << " time(s) in >" << inbuff << "<" << endl;

 

}

4 0
3 years ago
Which of the following is NOT a feature of unclustered index
Lorico [155]

Answer:

C. Unclustered index has the same ordering of data records as that of the data entries in the database

Explanation:

Indexes are used to split up queries in an SQL server or database management system DBMS.

There are two types of indexes namely clustered indexed and unclustered indexes.

Clustered indexes define the order in which data is stored in a table while unclustered index does not sort the order in a table.

In an unclustered index, the data table and the index are stored in different places, they are easy to maintain and update since they do not follow a particular order and there can be several indexes in a data file since the data table is stored differently from the index file.

So, all the other options except C are features of unclustered indexes since  unclustered index does not have the same ordering of data records as that of the data entries in the database.

So, C is the answer.

3 0
3 years ago
ACCOUNTING
ivann1987 [24]

last question is D

Hope this helps

7 0
4 years ago
Read 2 more answers
Kolom terakhir pada lembar kerja Excel 2019 adalah​
elixir [45]

Answer:

Tahan CTRL dan tekan tombol panah kanan (tombol kursor) pada keyboard. Anda dibawa ke kolom paling kanan. Dalam versi Excel modern, ini adalah kolom XFD, yaitu 16.384 kolom. Di versi Excel yang lebih lama (2003 dan sebelumnya) kolom terakhir adalah IV yaitu 256 kolom.

in english

Hold down CTRL and press the right arrow key (cursor key) on the keyboard. You are taken to the right-most column. In the modern versions of Excel this is column XFD, which is 16,384 columns. In older versions of Excel (2003 and prior) the last column was IV which is 256 columns.

3 0
3 years ago
Other questions:
  • In 2-5 paragraphs, describe the points that Kendra needs to consider when choosing a telecommunications technology to meet her n
    6·1 answer
  • What should you keep in mind when installing hard drives?
    5·1 answer
  • Which of the following is true of how the Internet has responded to the increasing number of devices now using the network? a) T
    12·2 answers
  • Linux is
    8·1 answer
  • Suppose a developer gets class XYZ files and documentation from a subcontractor. This class does not implement the Comparable in
    9·1 answer
  • Directions: Using the decoder key and the code chart on the second page, find out the name that has been coded. After coding the
    15·1 answer
  • Is there a policy on Bainly about using notes from previous class sessions with definitions gained from googling them at the tim
    10·1 answer
  • Match the protocols to their use. HTTP POP3 SMTP FTP You check email in your inbox. arrowRight You send an email to a friend. ar
    14·1 answer
  • True or false: Concurrent validation is more time consuming to measure than predictive validation because it involves a wait per
    13·1 answer
  • Submit a report outlining the steps you will take to obtain digital evidence. In your report you must include the legal requirem
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!