1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
14

How would you explain these three security risks (phishing, keylogging, malware) to a family member? What would you say to help

them understand the dangers?
Computers and Technology
1 answer:
kompoz [17]3 years ago
5 0

Answer:

1. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

2. Keyloggers are built for the act of keystroke logging — creating records of everything you type on a computer or mobile keyboard. These are used to quietly monitor your computer activity while you use your devices as normal.

3. Malware is intrusive software that is designed to damage and destroy computers and computer systems.

Explanation:

All of these can be used to steal data & passwords

You might be interested in
How is hardware different from sofware?
ExtremeBDS [4]

Answer:

Computer hardware is any physical device used in or with your machine, whereas software is a collection of code installed onto your computer's hard drive. For example, the computer monitor you are using to read this text and the mouse you are using to navigate this web page are computer hardware.

All software utilizes at least one hardware device to operate. For example, a video game, which is software, uses the computer processor (CPU), memory (RAM), hard drive, and video card to run. Word processing software uses the computer processor, memory, and hard drive to create and save documents.

6 0
3 years ago
Which 4 elements are commonly contained in a master page?
Arturiano [62]

Answer:

if this is in aspnet then

Step 1: Open new project in visual studio.

Step 2: Add new file in to our project.

Step 3: Design the master page, using HTML.

Step 4: Add web form in to our project.

Explanation:

7 0
3 years ago
A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not
Ghella [55]

Answer:

B. NIDS

Explanation:

From the question we are informed about A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. The BEST device to meet these requirements is NIDS. Network intrusion detection system known as "NIDS" can be regarded as a system that can attempt in detection of hacking activities as well as denial of attack on computer network. It can monitor network traffic and can as well detect malicious activities through identification of suspicious patterns in any incoming packet.

3 0
3 years ago
What is the purpose of the Chart feature in Word?
Burka [1]

Answer:

i think its the second one

Explanation:

7 0
3 years ago
Read 2 more answers
E-mails that are mailed directly to a consumer without their knowledge or permission are called
gizmo_the_mogwai [7]
E-mails that are mailed directly to a consumer without knowledge or permission are called spam
6 0
3 years ago
Read 2 more answers
Other questions:
  • Write a function: function solution(N); that, given a positive integer N, prints the consecutive numbers from 1 to N, each on a
    14·1 answer
  • If you like to spend time outdoors working with plants and animals, you have a(n) _____. a. bodily/kinesthetic learning style b.
    6·2 answers
  • Write a main function to do the following: A. Declare an array of 20 strings. B. Create an input file for the file "poem.dat". C
    12·1 answer
  • Which type of peripheral is a keyboard?
    11·2 answers
  • Print the two strings in alphabetical order. assume the strings are lowercase. end with newline. sample output: capes rabbits
    5·2 answers
  • Consider a three sequentially stepped process named as Process A, Process B and Process C. Input comes into Process A. Output fo
    13·1 answer
  • Use BlueJ to write a program that reads a sequence of data for several car objects from an input file. It stores the data in an
    5·1 answer
  • Students who utilize the "read, underline and eliminate" strategy are more likely to get better test grades. Why do you think th
    12·2 answers
  • Which is an advantage of a computer network?
    7·2 answers
  • Use the drop-down menus
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!