1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa [10]
2 years ago
7

Help

Computers and Technology
1 answer:
maria [59]2 years ago
5 0
JohSmit would be the answer because it has first 3-4 letters with correct caps and all
You might be interested in
2. Add a _______ to manually force text from one page to the next page. A. footer B. page break C. blank page D. header
Morgarella [4.7K]
The answer is: b) page break. 
5 0
3 years ago
Read 2 more answers
What when can you expect technology to be effective?
loris [4]

Answer:

we dont have to expect , the technology are effective , as each day the technology are being advance and developed day by day. each day the technology are being more and more effective. they are effective now and they will be effective in future too

3 0
2 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
What is an XML-based open standard for exchanging authentication and authorization information and is commonly used for web appl
nalin [4]

Answer:

SAML.

Explanation:

SAML seems to be an accessible standardized XML-based for some of the sharing of validation and verification details and has been generally implemented for the web apps and it seems to be a design that would be SSO. Verification data is shared via XML documentation which are securely signed. So, the following answer is correct according to the given scenario.

4 0
2 years ago
Pre-made, copyright-free illustrations are called __________. apps clip art graphic design stock photos
IceJOKER [234]

Answer: clip art

Explanation:

  • The clip arts are graphic images that are pre-made illustrations for the purpose of creating any medium (designs or art).
  • It has no restrictions to use them, it can be used by anyone, hence its copyright-free.
  • It comes in both electronic and printed form.
  • But mostly they are designed and distributed and used by a person in an electronic form.

Hence, the complete statement is "Pre-made, copyright-free illustrations are called <u>clip art</u>".

7 0
2 years ago
Other questions:
  • What does "FDDI" stand for in Technology?
    5·2 answers
  • Movies may depict larger-than-life situations, such as calamities, superheroes, and spaceships. A helps show such extraordinary
    11·1 answer
  • Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
    6·1 answer
  • Which of these programmers creates the core game engine?
    5·2 answers
  • Identify the benefit of modeling to communicate a solution.
    10·1 answer
  • Suppose cell C5 contains the formula =B$6+C1.
    6·1 answer
  • Which item is essential to know before sketching a navigation menu flowchart?
    7·2 answers
  • You are writing a program to help compare two sports teams. A sample member of the list scores is [2. 5] where your team scored
    5·2 answers
  • Pls help quick... will mark brainliest...
    15·1 answer
  • What method is used in the following line of code to associate clicking the left button with the event handler "clickSingle"?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!