1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brut [27]
3 years ago
12

What method do phishing and spoofing scammers use

Computers and Technology
1 answer:
Leya [2.2K]3 years ago
8 0

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.

You might be interested in
Which transmission media is faster? Fibre Optic or Radio-waves? I want full explanation!
Bad White [126]

Answer:

Due to the direct line of sight,the data rate of radio links is higher than that of fiber optic connections. A radio link has a lower latency (less delay).In contrast ,fiber optic connections may achieve higher bandwidths

4 0
4 years ago
Dom is a software developer who likes to tweak his computer's OS to make it work the way he wants it to. The OS he is most likel
Lorico [155]

im guessing linux because of "tweaks and things" but im not sure.

4 0
3 years ago
In this chapter, you subnetted a Class C private network into six subnets. In this project, you work with a Class B private netw
defon

Answer:

1. 10 bits

2. 1022 Hosts / Subnet

Explanation:

Given Network ID is 172.20.0.0

Class B network contains :

Network ID = 16 bits

Host ID = 16 bits

For subnetting always host id bits are used.

Number of subnets required = 50. Subnets are always in power of two. Nearest power of two to 50 is 26 = 64.

So, to create subnet we require 6 bits from host id and 64 subnets can be created with those 6 bits.

1)

Number of host bits needed for new subnets for network information = 6 bits.

Therefore, New network information contains :

Network ID of subnet = 16 + 6 = 22 bits

Host ID = 16- 6 = 10 bits.

2)

Subnets required = 50

Subnets created with 6 bits = 64.

Number of subnets unused for future expansion = 64 - 50 = 14 subnets.

Host ID part contains 10 bits. Therefore, Total number of Hosts /Subnet = 210 = 1024 Hosts.

Number of usable hosts per subnet = 1024 -2 = 1022 Hosts / Subnet.

7 0
3 years ago
Briefly explain the benefits and consequences of technology. //PLEASE ANSWER//
Wittaler [7]

Answer:

advantages and disadvantages of technology

Explanation:

Advantages of technology

First, the evolution of technology is beneficial to humans for several reasons. At the medical level, technology can help treat more sick people and consequently save many lives and combat very harmful viruses and bacteria.

The invention of the computer was a very important point. Communication is thus enhanced, and companies can communicate more easily with foreign countries. Research is also simplified.

For companies, progress in implementing strategic technology trends is helping them save time and therefore, money. Exchanges are faster especially with the internet. Sales and purchases are now facilitated and possible worldwide. This allows businesses to buy raw materials with discounts or at reduced prices. Similarly, global tourism has grown.

>See also: Technology is revolutionising the property industry

Technology has also increased the productivity of almost every industry in the world. Thanks to technology, we can even pay with bitcoins instead of using banks. The digital coin has been such a game changing factor, that many realised that this is the right time to open a bitcoin demo account.

When observed more closely, new things are discovered every day. Let’s take for instance when radio waves were discovered, radio broadcasts followed suit almost immediately. The same applies to the television and electricity. If no one had discovered that electricity could be generated, then the entertainment industry wouldn’t be at it’s current stage of development.

Technology improves daily lives; allowing to move physical storage units to virtual storage banks and more. Scientists of the time are also able to send astronauts to the moon thanks to technology.

>See also: How digital technology is transforming internal communication

In the modern industrial world, machines carry out most of the agricultural and industrial work and as a result, workers produce much more goods than a century ago and work less. They have more time to exercise and work in safer environments.

Disadvantages and risks of technology

On the other hand, the evolution of modern technology has disadvantages, for example, dependence on new technology. Man no longer needs to think. Even if the calculator is a good invention, man no longer makes mental calculation and no longer works his memory. The decline of human capital implies an increase in unemployment. In some areas, devices can replace the human mind.

The use of technology certainly needs rule and new laws. For example internet use is an individual freedom. However, the invention of the atomic bomb cannot be an individual freedom. In fact, regulations are difficult to implement when these technologies are introduced – such as regulation surrounding the impending arrival of autonomous vehicles.

Finally, as most technological discoveries aim to reduce human effort, it would imply that more work is done by machines. This equates to less work for people: the human is becoming ever so obsolete by the day, as processes become automated and jobs are made redundant.

3 0
3 years ago
What type of cable is used to connect a workstation serial port to a cisco router console port?
butalik [34]

a <span>Ethernet-<span>Cable is a how to put it together</span></span>

<span><span /></span>

6 0
4 years ago
Other questions:
  • You will use the _____
    15·2 answers
  • Which sentence in the passage conveys the message that drones can be used in the study of history?
    11·2 answers
  • Build a state diagram for the “book” based upon the following information of the library.
    6·1 answer
  • Intuitively, which of the following would happen to e⃗ net if d became very large?
    6·1 answer
  • Answer ASAP and I'll give brainliest.
    10·2 answers
  • Briefly explain what are JavaScript librairies​
    12·1 answer
  • Which of the following is not a characteristic of a good value log entry
    15·1 answer
  • You started writing a paper yesterday. You worked on it again today. After a few hours, you realized that you have introduced so
    15·2 answers
  • Convert FA23DE base 16 to octal<br>​
    6·2 answers
  • Enthusiasm codehs 7.6.4 Write a function called add_enthusiasm that takes a string and returns that string in all uppercase with
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!