1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shepuryov [24]
3 years ago
10

As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki

ng advantage of the trusting human nature of some victims and the naivety of others.
A. DoS
B. social engineering
C. DRM
D. scamming
Computers and Technology
1 answer:
solong [7]3 years ago
4 0

Answer:

Option(B) i.e., social engineering  is the correct option to the question.

Explanation:

The following option is correct because social engineering is the type of attack in which the criminals tricks the computer users to disclose the confidential data or information. Criminals or hackers use this trick because by this they can easily take advantage of your confidential information or corporate secrets.

You might be interested in
Assume you are using the text's array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements and
ASHA 777 [7]

The indices of the internal array elements that hold the remaining elements is c) 2 to 4

<h3>Calculations and Parameters:</h3>

For us to create a capacity of 10 for the queue, we would enqueue:

We would create a queue of capacity 10:

<h3>Queue q(10);</h3>

We add elements/enqueue 5 elements to the queue :

  • q.queueEnqueue(10);
  • q.queueEnqueue(5);
  • q.queueEnqueue(8);
  • q.queueEnqueue(9);
  • q.queueEnqueue(2);

Printing this would give:

q. queueDisplay()

10, 5, 8, 9, 2

Next, we would remove elements/dequeue 2 elements from the queue :

q. queuedequeue();

q. queuedequeue();

Printing it would be:

q. queueDisplay()

8 ,9, 2

Observing this, the deletion/dequeue starts from the front/first index.

The remaining indices of the internal array elements are: 2, 3, 4 or 2 to 4

Read more about arrays and enqueue here:

brainly.com/question/24188935

#SPJ1

3 0
2 years ago
How was the addition of an improvement over early web design?
Vinil7 [7]

Answer:

Early web designs were text oriented.

Explanation:

So the beginning is text and now as the technology has drastically grown the web design also incorporated multimedia like text, audio, video, graphics and animation.

As the improvement started the number visitors, creativity in the content creation, competitiveness and all the other aspect made website creation and design a mandatory factor for any business to grow. How the web design is, it decides the number of visitors and the way the user interacts.

3 0
3 years ago
A network administrator attempted to access the company website and received a "page not found" error. The next day the administ
Iteru [2.4K]

Answer:

a DoS attack occurred

Explanation:

According to my research on information technology and cybersecurity, I can say that based on the information provided within the question he can conclude that a DoS attack occurred. This (denial-of-service) attack is when an individual sends a large amount of network authentication requests with an invalid return address and overloads a server until it crashes. Which is why the company website says "page not found". All of these requests are usually from a single computer, which is also why they all originated from the same IP in this situation.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
How does a computer work? Explain with the help of an example.​
noname [10]

Answer:

It takes information or data from one end, store it to process, and finally, after completing the processing, it output the result on the other hand.

6 0
2 years ago
How do ACLs work on a router?
serg [7]

Answer:

An ACL is a list of permit or deny rules detailing what can or can't enter or leave the interface of a router. Every packet that attempts to enter or leave a router must be tested against each rule in the ACL until a match is found. If no match is found, then it will be denied.

Explanation:

PLEASE MARK ME AS BRAINLIEST

6 0
3 years ago
Other questions:
  • Which is not an example of a boolean operator?
    6·2 answers
  • Pros and cons of Processor Throttling or Scaling?
    13·1 answer
  • 1) If a client requests timestamping every two minutes, how would it look? a) [00:02:00] b) [00:06:00] c) (00:04:00)
    15·2 answers
  • Which key is used in word processors to create indentations?
    13·2 answers
  • Write a class called (d) Teacher that has just a main method. The main method should construct a GradeBook for a class with two
    7·1 answer
  • Assume that the following method header is for a method in class A.
    15·1 answer
  • A piece of glass has a thin film of gasoline floating on it. A beam of light is shining perpendicular on the film. If the wavele
    15·1 answer
  • TP1. लेखा अभिलेखको अर्थ उल्लेख गर्नुहोस् । (State the mea
    15·1 answer
  • Which command tells the for loop what to count by?
    9·2 answers
  • You can easily merge files even if each file contains a different record layout. Group of answer choices True False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!