1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shepuryov [24]
3 years ago
10

As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki

ng advantage of the trusting human nature of some victims and the naivety of others.
A. DoS
B. social engineering
C. DRM
D. scamming
Computers and Technology
1 answer:
solong [7]3 years ago
4 0

Answer:

Option(B) i.e., social engineering  is the correct option to the question.

Explanation:

The following option is correct because social engineering is the type of attack in which the criminals tricks the computer users to disclose the confidential data or information. Criminals or hackers use this trick because by this they can easily take advantage of your confidential information or corporate secrets.

You might be interested in
Help please?
Paraphin [41]
Hmmmm. I believe it would be scroll bars. I'm not in technology class but that's my best guess
7 0
4 years ago
What steps will change an existing macro? Use the drop-down menu to complete the steps.
Aneli [31]

Answer:

1. View

2. View macros

3. Edit

Explanation: completed on edge

6 0
3 years ago
Read 2 more answers
Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
topjm [15]
Text box
hope this helped
3 0
2 years ago
Which of the following application delivery methods requires Internet access?
morpeh [17]

Answer:Cloud hosted

Explanation:

3 0
3 years ago
Which term describes a protocol to manage a network able to configure out a network monitor activity and control devices
cricket20 [7]

Answer:

im not sure but my brother told me it's Simple Network Management Protocol

7 0
3 years ago
Other questions:
  • What type of device is the printer?
    13·2 answers
  • Vpns can be classified based on the kinds of ____ they connect
    6·1 answer
  • A short circuit locator should be periodically run along the cords used in a shop to check for shorts and open circuits. A.)True
    12·2 answers
  • . In an if/else statement, the if part executes its statement or block if the expression
    15·1 answer
  • A new company will have 40 workstations in one building sharing a single network. All users must be able to share files and prin
    9·1 answer
  • Making sure that your business has something special and distinct to offer is known as?
    12·1 answer
  • What is the final value for X ?<br><br> x= 1<br><br> x=13<br><br> x= x+3<br><br> x=0
    9·1 answer
  • Which of the following pieces of evidence was NOT used to support the Theory of Continental Drift?
    10·1 answer
  • Write a recursive method called, doMyMath, which takes as input any positive integer and calculates the factorial (use comments
    13·1 answer
  • Here, Do this for 100 points its simple just know how to use flowchart
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!