1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PtichkaEL [24]
3 years ago
6

The ____ character is allowable in a folder name. Select one: a. < b. : c. / d. -

Computers and Technology
1 answer:
MissTica3 years ago
5 0

Answer:

d. - is allowed in a folder name.

You might be interested in
What can be defined as in information technology environment?
natka813 [3]
Here is your answer

7 0
3 years ago
Read 2 more answers
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
Thepotemich [5.8K]

Answer:

Option (A) is the right answer.

Explanation:

The following terms can be described as :

Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.

Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.

Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.

Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.  

According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.

3 0
3 years ago
You decide to store data in the user's browser in order to reduce the amount of data that must be downloaded. What is this proce
Lemur [1.5K]

Answer:

client-side storage

Explanation:

The process of doing this is known as client-side storage. Like the name suggests this saves data that is sent to the user's computer on that computer either as cookies or cached data. This data is then used every time that the user decides to enter the same website or access the same program from the browser. Doing this allows these websites and programs to load much faster the more times that the user decides to enter them.

5 0
3 years ago
Having some prior knowledge about your topic is helpful when conducting internet research. please select the best answer from th
larisa86 [58]
The answer is true. I just took the quiz
0 0
4 years ago
Read 2 more answers
What is authenticity​
jeka94

Answer:

the quality of being authentic

Explanation:

7 0
3 years ago
Other questions:
  • Why is it best to run antivirus scans when the computer isn't being utilized?
    7·1 answer
  • Which of the following is NOT a consideration designers must make when using colors?
    15·1 answer
  • How USB FLASH Drives Store Data? Explain, Maximum 5 linesa
    10·1 answer
  • What justification can you give for normalizing a database if the database will be updated only by the people who can be trusted
    11·1 answer
  • What effect does screen resolution have on how graphics are displayed?
    7·1 answer
  • What is done to conserve energy while electricity is being transported?
    9·1 answer
  • ___ allow users to select controls by keyboard shortcuts. (Points : 3) Alternative keys
    13·1 answer
  • Libby’s keyboard is not working properly, but she wants to select options and commands from the screen itself. Which peripheral
    14·1 answer
  • Computing devices translate digital to analog information in order to process the information
    12·1 answer
  • Pls help me computer science discoveries
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!