1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Studentka2010 [4]
3 years ago
8

Which app is best for quizzes? Please answer, I really need this​

Computers and Technology
2 answers:
snow_lady [41]3 years ago
4 0

Answer:

Quizzez App or web page Alcan be very useful

never [62]3 years ago
4 0

Answer:

Ka hoot

Soc rative

Quiz let

Explanation:

these are the ones I use

You might be interested in
Please help! I don’t know the answer to it :( it’s Fashion marketing
Oxana [17]

Answer:

I believe the answer should be C)

Sorry if it’s wrong,but hope it helps

8 0
3 years ago
Name the type of software which provides the user interface. [1 mark
Inessa [10]

Explanation:

user interface, also sometimes called a human-computer interface, comprises both hardware and software components. It handles the interaction between the user and the system.

There are different ways of interacting with computer systems which have evolved over the years. There are five main types of user interface:

command line (cli)

graphical user interface (GUI)

menu driven (mdi)

form based (fbi)

natural language (nli)

7 0
3 years ago
What are the most recent attacks on computer security that you face this month? Use the Internet to search for the latest attack
grigory [225]

Answer:

Now a days every thing can be done on the internet easily but this internet has various drawbacks with that as the most of our personal information we share on internet these days so if anyone attacks on your server then he/she can easily access all the private information including financial details and this attack is known as cyber attack. there are various ways to attack on the internet some of them are-

1.Malware- it is shortly known as the malicious software, malware can be described as worms, viruses, trojans these all are variety of malware which provide root access to the attacker by which they can control the system remotely.

2.phising- This is a technique by which the criminals craft emails to fool a target into taking some harmful action. The recipient might be tricked in downloading malware that disguised as an important document for instance or argued toclick on that link that takes them to a fake website where they can get the password which are necessary for any transaction.

3.Ransomware- This is like a malware which is stored in the computer and easily encrypt all the necessary files of the victim's computer and after that they demand some ransom to decrypt it.

4.SQL injection- This is the process by which the SQL command gets injected by the attacker into the victim's system so that the attacker can easily gather all the necessary information which they want to take control on the system.

These attacks are very dangerous for the system because the attacker can get all the necessary information about the user and can easily harm him/her by getting their personal information.

There are various steps to prevent these attacks which are-

I.secure your hardware- The user has to prevent their hardware from lost or steal. protect all devices with a complicated password, share that password with the device user only.

II.Encrypt and backup data- You have to prevent your data by making the backup of the necessary files so that if any of your information gets lost then you can retrieve it from your backup.

III. create a security focused workplace- Employees are the most common ways of breaching of the data as many don't recognise the external threats the internal one breaches the security and it cause the loss of the information.

some latest viruses are-

1.cyborg ransomware-This virus is present in the floppy disk which is used by the user and can cause the count of time the system reboot. it's new variant is present in windows 10.

2.Gobrut-This is also one of the latest viruses it is capable enough to detect weak passwords and can cause loss of information.

3.jokeroo-This virus works as the ransomware their author spread it in the computer system which will encrypt the files and for decrypting it they demand ransom for that.

4.Trojan Glupteba- Once this virus enters the system the user cannot know that the system is infected and it will slowly communicates with the IP of the system which results in loss of the confidential information.

Most vulnerable platforms are-

1.Social engineering- The social networking sites has most of your personal information of the user which can be used by the attacker to get the necessary information.

2.cloud computing services- More companies use to store their most of the information on the cloud which is used by the attacker to get the confidential passwords which can cause loss of the essential information.

Explanation:

6 0
3 years ago
PL Technologies suffered considerable data loss when its database was infected by a virus. George, an operations personnel, atte
Luba_88 [7]

Answer:

Recovery is the correct answer to the given question.

Explanation:

Recovery is used when the data is lost from the database in any issue Database Recovery is giving the data to returning in its consistent state of the database.

When George sees that the  PL Technologies is suffered from considerable data loss due to it is infected by a virus then George retrieving the information and the data by using the recovery process  

6 0
3 years ago
What technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative t
son4ous [18]

Answer:

The answer is "Broadband Over Power Line".

Explanation:

The technology that offers and alternative to DSL and high-speed cable is broadband connection which is a term used for high speed internet access using coaxial or fiber optic cables to reach higher speeds than the other technologies. The technology described in the question is "Broadband Over Power Line" which as the name suggests, makes providing broadband internet connection possible using the power lines in the area.

I hope this answer helps.

5 0
3 years ago
Other questions:
  • Choose the two main capabilities involved in visual literacy
    13·1 answer
  • A class named clock has two instance variables : hours (type int ) and isticking (type boolean ). write a constructor that takes
    12·1 answer
  • The ________ occurs when the user presses the enter key without typing a value for an input operation.
    5·1 answer
  • What is the purpose of an arraignment?
    9·2 answers
  • Which of the following controls will provide an area in the form for the user to enter a name? a. button b. label c. text box d.
    8·1 answer
  • Text that is heavier or darker than other text in the document is considered _____.
    9·2 answers
  • 5. Which of the following views is used to run a PowerPoint presentation?
    11·2 answers
  • What is meant by the phrase "backing up your data"?
    15·1 answer
  • ................. are used to summarize data (option) (a) report (b) action ​
    12·2 answers
  • What is a file path?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!