1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
14

How would you explain these three security risks (phishing, keylogging, malware) to a family member? What would you say to help

them understand the dangers?
Computers and Technology
1 answer:
kompoz [17]3 years ago
5 0

Answer:

1. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

2. Keyloggers are built for the act of keystroke logging — creating records of everything you type on a computer or mobile keyboard. These are used to quietly monitor your computer activity while you use your devices as normal.

3. Malware is intrusive software that is designed to damage and destroy computers and computer systems.

Explanation:

All of these can be used to steal data & passwords

You might be interested in
Ruth designs games for mobile operating systems such as iOS and Windows. The demand for games on mobile devices is high. Ruth’s
VMariaS [17]

Answer:

Viper Slash can be classified as a Question mark product

Explanation:

BCG matrix is a method developed by the Boston Consulting Group to analyze the strategic position and potential of businesses or products.

Business portfolios are evaluated using

  1. Relative market share
  2. Market growth rate

The result of the analysis is divided into four quadrants

  1. Dogs
  2. Cash cows
  3. stars and
  4. question marks

  1. Dogs: This comprises of business portfolios that operate in a slow-growing market. Investing in businesses in this quadrant is not advised due to their poor cash returns.
  2. Cash cows: These include business portfolios that provide high cash returns and should be milked.
  3. Stars: These are business portfolios that are operating in a fast-growing market and possess very high prospects of becoming cash cows.
  4. Question marks: are business portfolios that are underdogs in fast growing markets, they consume much cash but still, incurred losses. They don't gain many market shares despite high investments and have great tendencies to become dogs.

Ruth's Viper Slash falls into the Question marks category as the games section is a fast-growing market and struggle to gain market shares.

6 0
3 years ago
The type of human hair wig that is the most costly is:
RSB [31]

Answer: india

Explanation:

5 0
4 years ago
What is the answer ??​
Anna11 [10]

Answer:

option 1 is correct go with 1s .

3 0
3 years ago
Which data type stores a single letter?
Irina-Kira [14]

Answer:

c

Explanation:

4 0
3 years ago
Consider the code fragment below (with nested loops). int sum = 0;for (int i = 1; i < 5; i++) for (int j = 1; j <= i; j++)
sammy [17]

Answer:

Option d is the correct answer for the above question.

Explanation:

  • The first loop of the program has a second loop and then the statement. In this scenario, the second loop executes for the value of the first loop and the statement executes for the value of the second loop.
  • The first loop executes 4 times, Then the second loop or inner loop executes n times for the n iteration of the first loop, for example, 1 time for the first iteration of the first loop, 2 times for the second iteration of the first loop and so on.
  • Then the inner loop executes (1+2+3+4) iteration which gives the result 10 iterations.
  • The sum initial value is 0 and the "sum++", increase the value of the sum by 1.
  • So the value of the sum becomes 10 after completing 10 iterations of the inner for loop.
  • Hence the 10 will be the output. So the Option d is the correct answer while the other is not.
3 0
3 years ago
Other questions:
  • What is used in computers to communicate with wireless keyboards, mice, and printers?
    8·1 answer
  • Why are computers assigned IP addresses
    15·1 answer
  • What is the primary difference between the windows server 2012 r2 server manager and previous versions (before windows server 20
    11·1 answer
  • Why is it important to put the most specific case first? What types of errors does it help avoid?
    11·1 answer
  • LaShawn would like to post photos in a social media app, but the program needs to be modified in order to display a greater vari
    12·2 answers
  • May someone help me with the this question pls , The governor of a state wants to inform the people about a change in the tax po
    9·1 answer
  • A force from water that brings water to your house​
    6·1 answer
  • A search engine finds bugs and system failures in your computer.<br><br> True or False?
    7·2 answers
  • How does a fully integrated Data and Analytics Platform enable organizations to convert data into consumable information and ins
    15·1 answer
  • which command entered without arguments is used to display a list of processes running in the urrent shell
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!