1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anika [276]
3 years ago
15

Subscribe to Markiplier

Computers and Technology
2 answers:
3241004551 [841]3 years ago
7 0
Been subscribed for a long long time
Finger [1]3 years ago
6 0

Answer: I already did

Explanation:

You might be interested in
Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______
lord [1]

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

3 0
3 years ago
Emily wishes to work in print media. What career would she choose for this purpose?
lord [1]
Architect (A) is the answer
3 0
3 years ago
Read 2 more answers
A user contacted you to report that an unwanted Windows application is launched each time her computer is booted. How can you pe
nikklg [1K]

Answer:

Uninstall the application.

Explanation:

When a program or a computer application constantly launches by itself each time your system is booted, the best and most effective solution is to uninstall the application.

Uninstalling an application entails removing the application entirely from your device.

3 0
4 years ago
Kevin is working on a memory chip that can be written on and erased electronically. What type of chip is
kherson [118]

Answer:

EEPROM (Electrically Erasable programmable ROM)

Explanation:

ROM is the memory chip that is used to store the data permanently. To store and erase data on the ROM multiple time with the help of electronically is called EEPROM. In this ROM we can write and erase data multiple times.

The most common example of this type of memory is Flash Memory. It is non volatile memory. If we need to write or erase data on this chip, we just plug into USB port of computer. Then delete the data that is needed no more.

5 0
3 years ago
Instructions
marta [7]

Answer:

Explanation:

5 0
3 years ago
Other questions:
  • Why is a cable modem classified as a digital model?
    12·1 answer
  • By default, what is the largest data payload that packets on an ethernet network can accept?
    11·1 answer
  • A virus or worm can have a payload that installs a(n) __________ door or trap-door component in a system, which allows the attac
    14·2 answers
  • How do you clean and maintain a mouse, keyboard, optical drive, computer display, and printers?
    7·2 answers
  • Which of the following patterns should be used for the delimiter to read one character at a time using a Scanner object's next m
    7·1 answer
  • Calculate the average of a set of grades and count
    9·1 answer
  • The purpose of a report is to
    13·1 answer
  • Nonverbal communication includes _____.
    9·2 answers
  • Helen is working on her colleague’s photos. She came across this particular photo and was confused about which effect the photog
    15·2 answers
  • Which of the following is not a valid Java identifier? a. Factorial, b. anExtremelyLongldentifierlfYouAskMe, c. 2ndLevel, d. Iev
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!