1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
14

How would you explain these three security risks (phishing, keylogging, malware) to a family member? What would you say to help

them understand the dangers?
Computers and Technology
1 answer:
kompoz [17]3 years ago
5 0

Answer:

1. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

2. Keyloggers are built for the act of keystroke logging — creating records of everything you type on a computer or mobile keyboard. These are used to quietly monitor your computer activity while you use your devices as normal.

3. Malware is intrusive software that is designed to damage and destroy computers and computer systems.

Explanation:

All of these can be used to steal data & passwords

You might be interested in
Your app needs to store the following information. For each type of information, decide whether you would use an array or a vari
Virty [35]

Answer:

Array: (a) All the messages a user has sent.

Variable: (b) The highest score a use has reached on the app. (c) A username and password to unlock the app.

Explanation:

An array generally has more than one value whereas a variable can only contain a single value at any particular point in time. In addition, a variable has a limit whereas an array does not have any maximum limit. Therefore, it can be concluded that option (a) will be stored as an array while options (b) and (c) will be stored as variables.

3 0
3 years ago
Please explain what Level 5 Automation is and give 2 examples of the technology.
arsen [322]

Level 5 ( Full Driving Automation ) Level 5 cars won't even have steering wheels or acceleration / braking pedals . They will be free from geofencing , able to go anywhere and do anything that an experienced human driver can do .

Pls follow me and Mark as brainlest!!! :-)

8 0
3 years ago
PLS HELP SOON AS POSSIBLE WILL GIVE BRAINLIEST!!!
Evgesh-ka [11]

The best reason that the title of an article published on a website might not help to determine if the information is reliable is that titles attract readers; they do not guarantee accuracy

  • The title of an article tells the reader what the work or article is all about. It summarizes the whole work into a single text. Website in bid to attract more people to their page most times uses attractive titles or commonly search words but this does not show that the work is accurate.

  • People often make or select a title that grabs attention and one that makes people want to read further

Conclusively we can say that The title of an article published on website is meant to attract readers as they do not guarantee accuracy

Learn more from

brainly.com/question/11427677

5 0
2 years ago
4. is the disappearance of the individual a bad thing?
makkiz [27]

Answer:

The program completed in a third of the time with six computers versus one computer.

Explanation:

7 0
2 years ago
You can access various sites on the www by using hyperlinks or by
svetlana [45]
Typing in the site address?

Hope this helped!
5 0
3 years ago
Other questions:
  • Which of the following is not an operating system
    11·2 answers
  • When you ask the database more complex questions using comparison operators, you are conducting a _____. sort questionnaire quer
    7·1 answer
  • ____ devices are high-performance storage systems that are connected individually to a network to provide storage for the comput
    5·1 answer
  • In a car crash, wearing a seat belt __________________.
    5·2 answers
  • 50 POINTS & A FOLLOW!
    11·2 answers
  • 13. Place where names, addresses and email information<br> is stored
    6·1 answer
  • Compared with a star topology, a hierarchical topology: a. is more effective at handling heavy but short bursts of traffic. b. a
    13·1 answer
  • What is good work ethic?​
    11·1 answer
  • What are two potential benefits of using calendar-synchronization tools like calendly
    8·1 answer
  • which process consists of one application program following a logical access path (lap) and then a dbms following a physical acc
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!