1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igor_vitrenko [27]
3 years ago
7

(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ en

gineering.
Computers and Technology
1 answer:
EastWind [94]3 years ago
5 0

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

You might be interested in
If you have machines doing jobs, fewer staff are needed, therefore costs are
elena55 [62]
If you have machines doing jobs, fewer staff is needed, therefore the costs are LESS.

Hope I helped!
4 0
3 years ago
Read 2 more answers
When you pass an argument to a method, the argument's data type must be ____________ with the receiving parameter's data type?
Sedbober [7]
Any time you pass an argument to a method, the data type arguments must be assignment compatible with data type receiving parameter.
<span />
6 0
3 years ago
The following are part of characteristics of a software requirement specification.
marusya05 [52]

Answer:

should there be 'except' in the question?

6 0
3 years ago
What is an example of an assumption and dependency that an automated stocking application project would include in an SRS?
Natasha2012 [34]

Explanation:

software must be used by well trained staff.

6 0
1 year ago
Queries are questions true or false?
makkiz [27]
True

…………………………………………………..
5 0
2 years ago
Other questions:
  • What is a function library?
    11·1 answer
  • Which of the following describes an acceptable print resolution?
    7·1 answer
  • 1.using synonyms can help make ur writing more________
    11·1 answer
  • You are out on the water. you do not understand what another boater intends to do. what sound signal should you make?
    14·1 answer
  • What quantities are measured by the following sensors:
    9·1 answer
  • What is the definition of digital literacy?
    7·2 answers
  • Which of the following does not represent the function of a Variable? Variables store data in memory; this data has limited use
    8·1 answer
  • Write a logical expression using only and, or and not that is equivalent to the Exclusive NOR (XNOR) gate on 2 inputs, called in
    15·1 answer
  • 1. What year was the Entertainment Software Rating Board created?
    15·1 answer
  • Which item is developed last in the cyclical design process
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!