1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
2 years ago
10

What are specific and relevant terms that will help you locate information using an internet search engine?

Computers and Technology
1 answer:
Liono4ka [1.6K]2 years ago
3 0
I would say A:keywords

Hope this helps

I’m sorry if this is wrong

Have a great day/night
You might be interested in
Zack sees an online contest. He could win $10,000 instantly! On the sign-up form he enters his name and email address. He is als
lana66690 [7]

Answer:

Do not please! Online hackers and identity thieves can use such informations or clues to figure out Zack's passwords.

Explanation:

In this scenario, Zack sees an online contest stating that he could win $10,000 instantly! On the sign-up form he enters his name and email address. He is also asked to enter his nickname, the name of any pets, and his mom's maiden name.

Hence, it is advisable, that Zack shouldn't do it because online hackers and identity thieves can use such informations or clues to figure out Zack's passwords.

Basically, this type of cyber attack is simply known as baiting in social engineering.

Social engineering can be defined as a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering are quid pro quo, phishing, baiting, tailgating etc.

8 0
3 years ago
What is data security
NARA [144]
Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, tokenization, and key management practices that protect data across all applications and platforms.
5 0
3 years ago
PLEASE HELP <br> Which of the following best describes the existence of undecidable problems?
Tju [1.3M]

Answer:

D.

Explanation:

Its the exact definition of an undecidable problem. Plus I have my notebook open next to me and that's what it says, trust bro.

7 0
2 years ago
Y'+2y = 5-e^(-4x), y(0)=-11
Anastaziya [24]

Answer:

  see attached

Explanation:

A differential equation solver says the exact solution is ...

  y = 5/2 -14e^(-2x) +1/2e^(-4x)

The y-values computed by Euler's method will be ...

  y = ∆x·y' = 0.1(5 - e^(-4x) -2y)

The attached table performs these computations and compares the result. The "difference" is the approximate value minus the exact value. (When the step size is decreased by a factor of 10, the difference over the same interval is decreased by about that same factor.)

4 0
2 years ago
Maria works for MegaCorp, a large privately owned company specializing in sales of ball bearings. MegaCorp introduces filtering
ololo11 [35]

Answer:

No, because it would be generally free for private-sector employees by using filtering software to restrict access to some websites.

Explanation:

Maria working for the following Corporation, a major private-owned company that specializes throughout ball bearings production. That corporation establishes filtering software to restrict access to some of these sites linked to non-work, and also some sites with poπnographic images.

So, Maria could not challenge that policy lawfully, as private-sector employees are usually free to always use filtering software to restrict access to some of these Websites

3 0
3 years ago
Other questions:
  • 1. Create a detail report that will display all SCR courses in alphabetical order, with the course name and the instructor name
    6·1 answer
  • Read the following paragraph:
    9·2 answers
  • Micheal has increased the contrast of the given picture. Which feature or menu option of a word processing program did he use? A
    15·1 answer
  • Which guideline should you use when downloading software from the Internet?
    15·1 answer
  • ____ includes any attempt to intentionally conduct dishonest activities online.
    5·1 answer
  • A rocket always rotates about its___?
    9·2 answers
  • Can maybe someone play with me on Over-watch on the Xbox?
    8·1 answer
  • Drag each tile to the correct box.
    8·1 answer
  • 1. Write an if statement that assigns 20 to the variable y, and assigns 40 to the variable z
    10·1 answer
  • 1. Create an optimized function "print s(n,s)" that prints the given argument s (representing a string) k times. k represents th
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!