1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
3 years ago
6

What is an occupation?​

Computers and Technology
1 answer:
LiRa [457]3 years ago
4 0

Answer:

a job or profession.

You might be interested in
List the six external peripheral parts of a computer system
liq [111]
41. Here are the External Peripherals of a Computer systems: Output devices - devices that communicate the results of the data processing to the user -> Printer -> Monitor Input devices - device that communicate the results of the data processing to the computer system -> Keyboard -> Mouse Storage devices - device are those device that stores data. -> Flashdrive -> external hard drive This devices that were mentioned are found on the external part of the computer system that’s why it is called external peripherals.
7 0
4 years ago
You are designing a web application that stores static assets in an amazon simple storage service (s3) bucket. you expect this b
levacccp [35]
The answer is adding a random prefix to the key names. One way to introduce randomness to key names is to add hash string as prefix to the key name. for example, you can compute an MD5 hash of the character sequence that you plan to assign as the key name. from the hash, pick a specific number of characters and add then as the prefix to the key name. The casualness of the prefix more consistently distributes key names through multiple index partitions.
3 0
3 years ago
The class attribute
Elodia [21]

the answer is d plz let me know if i got it right

6 0
3 years ago
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
Thepotemich [5.8K]

Answer:

Option (A) is the right answer.

Explanation:

The following terms can be described as :

Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.

Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.

Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.

Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.  

According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.

3 0
3 years ago
Insurance can help you:
Blababa [14]
No it can not .............
3 0
4 years ago
Other questions:
  • The source ip address is 164.109.28.3 subnet mask of 255.255.128.0 network address is
    7·1 answer
  • How do you jumpstart a car in the middle of nowhere??? Explain using 2 paragraphs.
    14·2 answers
  • Mechanisms of evolution
    7·1 answer
  • What is an allocation unit?
    10·1 answer
  • WHICH COMPUTER COMPONENT CONTAINS ALL THE CIRCUITRY NECESSARY FOR THE OTHER COMPONENTS OR DEVICES TO COMMUNICATE WITH ONE ANOTHE
    12·1 answer
  • 1. Empty tags do not have ___________.
    14·1 answer
  • 4.2 lesson practice helps plzs
    9·1 answer
  • Data bars are a form of ________.
    8·2 answers
  • The best presentations try to include as much text as possible on each slide true or false ​
    13·1 answer
  • Different the policies and protocols in the industry
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!