1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shepuryov [24]
3 years ago
10

As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki

ng advantage of the trusting human nature of some victims and the naivety of others.
A. DoS
B. social engineering
C. DRM
D. scamming
Computers and Technology
1 answer:
solong [7]3 years ago
4 0

Answer:

Option(B) i.e., social engineering  is the correct option to the question.

Explanation:

The following option is correct because social engineering is the type of attack in which the criminals tricks the computer users to disclose the confidential data or information. Criminals or hackers use this trick because by this they can easily take advantage of your confidential information or corporate secrets.

You might be interested in
What are the three primary components of an inbox?
Ymorist [56]

Answer:

C

Explanation:

edg2021

3 0
3 years ago
An interstate route with even numbers travels north/south. True or false?
lisov135 [29]

Answer:

I believe the answer is False

7 0
3 years ago
Read 2 more answers
Jane wants to add a chart to her presentation so she’ll click the Insert tab and in the Images group, she’ll click the Chart but
kap26 [50]

(A. Stevie only) because You need to go the illustrations tab in order to click on the chart button.

Jane clicked on images tab so she was wrong.

Mark as brainlest plz :)

3 0
3 years ago
Listening to the audience refers to what in the context of slide presentations
Anit [1.1K]

Answer: D

Explanation: This concept refers to listening for various cues, such as confusion, interest, or boredom.

8 0
3 years ago
Read 2 more answers
Why does it still say I am ambitious whenever I have the 5 brainliest and almost 700 points?
Galina-37 [17]
Check below your score it should say something out of 5 you need to get more to get 5/5
8 0
3 years ago
Read 2 more answers
Other questions:
  • A ____ is approximately a billion bytes.
    9·1 answer
  • A tool you might use to manipulate an image, such as a photograph, into a seamless repeating texture would be:
    7·2 answers
  • For connection to place on any network you must have a set of standards?<br> O True<br> O False
    8·1 answer
  • Given a variable s associated with a str, write an expression whose value is a str that is identical except that all the letters
    15·1 answer
  • ?__________ is the term that describes devices that automate many industrial tasks by receiving digital commands and converting
    5·1 answer
  • What is the name of the FOLDER in which the file named "script" is contained?
    13·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    7·2 answers
  • suspect that several users are attempting to install unauthorized software. Upon researching, you discover that the attempts wer
    12·1 answer
  • Convert Octal 623, to Decimal number ​
    10·1 answer
  • You can put ______ on your phone.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!