1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shepuryov [24]
3 years ago
10

As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki

ng advantage of the trusting human nature of some victims and the naivety of others.
A. DoS
B. social engineering
C. DRM
D. scamming
Computers and Technology
1 answer:
solong [7]3 years ago
4 0

Answer:

Option(B) i.e., social engineering  is the correct option to the question.

Explanation:

The following option is correct because social engineering is the type of attack in which the criminals tricks the computer users to disclose the confidential data or information. Criminals or hackers use this trick because by this they can easily take advantage of your confidential information or corporate secrets.

You might be interested in
What is the difference between posting and transfer in ICT please I need the answer before TMR​
Radda [10]

Answer: b

Explanation: trust

7 0
2 years ago
The following is a sequence of undo-log records written by two transactions T and U: < START T>; ; < START U>; ; ; ;
tatiyna

Answer:

Giving that: The following is a sequence of undo-log records written by 2 transactions T and U:

< START T >;

< T,A,10 >;

< START U >;

< U, B, 20 >;

< T, C, 30 >;

< U, D, 40 >;

< Commit U >;

< T, E, 50 >;

< Commit T >;

1. < START U >

      Recovery action in this case will be undo(-1) and undo(0). All restored to its original Value

     log records < T, A, 10 >,  < T, abort >; as written out

2. < T, E, 50 >

      Recovery action in this case will be undo(8) and redo(0). A and C is restored to its original value, B and D are set to 20 and 40

      log records <T, C, 30 >,  < T, A, 10 >,  < T, abort >  are written out

3. < Commit T >

      Recovery action in this case will be redo(7) and redo(4). A and C are set to 10 and 30, B and D are set to 20 and 40

7 0
3 years ago
Explain what mistake Miranda made in the following scenario. Situation: Miranda suspects that there may be a problem with the ha
Dennis_Churaev [7]

Answer: Answer below.

Explanation:

I'm not fully sure myself, so don't agree with me fully.

I believe what she may have done wrong is tell the technician about a "program." A program doesn't have to do anything with physical hardware.

5 0
3 years ago
Read 2 more answers
What are the main components of a desktop PC and briefly describe their purposes.​
Norma-Jean [14]

Answer:

8 Standard Computer Components and What They Do

Explanation:

Motherboard. The motherboard is an important computer component because it’s what everything else connects to!

Power Supply. True to its name, the power supply powers all other components of the machine.

Central Processing Unit (CPU)

Random-access Memory (RAM)

Hard Disk Drive / Solid State Drive.

Video Card.

Optical Drives.

6 0
2 years ago
Alice and Bob are unknown to each other. Alice wants to send an encrypted message to Bob. So it chooses a KDC which is known to
kakasveta [241]

3. ¿Qué mensaje recupera Bob después del descifrado? Mostrar como caracteres hexadecimales.

Respuesta: la clave con el mensaje :

5 0
2 years ago
Other questions:
  • Over time, attackers have had to increase their skills to be able to attack systems or create viruses. True False
    8·1 answer
  • Chris needs to modify the default bullets that are used in a nonnumbered list in word. Which method should he use?
    9·2 answers
  • ___________ connects different types of computers in LAN?
    5·2 answers
  • An electronic spreadsheet is a type of<br> archive.<br> database.<br> document.<br> periodical.
    15·2 answers
  • The latest form of personal communication that most resembles a public journal is a _____.
    15·2 answers
  • When storing used oil, it needs to be kept in ___________ containers.
    12·1 answer
  • Which of the following is the BEST reason to use cash for making purchases? everfi
    15·1 answer
  • What might a designer need to consider when choosing an appropriate energy source for products and power systems
    15·1 answer
  • The sequence of instructions performed to execute one program instruction
    12·1 answer
  • Question 7 Consider the following code:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!