1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivan
3 years ago
5

Select the correct answer from each drop-down menu.

Computers and Technology
2 answers:
Cloud [144]3 years ago
6 0

Answer:

1:

Editor-in-Chief

2:

Tel: 2472367

ANEK [815]3 years ago
4 0

Answer:

Editor-in chef, and Tel: 2472367

Explanation:

You might be interested in
Tag groups can be nested up to ____ levels deep, with up to _______ tag subgroups under a single parent.
zepelin [54]
Is it a multiple choices problem
3 0
3 years ago
An online service provider provides its users with hosted computers, an operating system, and a database management system (DBMS
RoseWind [281]

Answer:

The correct option is B: platform as a service (PaaS)

Explanation:

Platform as a service (PaaS) is regarded as a computing model in the cloud and ensures delivery of both software and hardware tools via a third-party provider. Tools delivered are mostly those that are needed for the development of application and are mostly delivers via the internet to its users. Software and hardware tools are usually hosted in the infrastructure of the PaaS provider host and thus this removes the burden on developers of having to install a physical software or hardware in the development or running of a new application.

7 0
3 years ago
When using the red / yellow I green method to present status of a project, green can mean which of the following?
Temka [501]

Answer:

D. All of these

Explanation:

I hope this helps you! Have a great day!

bren~

3 0
2 years ago
Read 2 more answers
Earthquakes with magnitudes between 1.0 and 2.9 on the Richter scale are
NeX [460]
They're not dangerous. However, they do cause mild tremors.
3 0
3 years ago
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
Other questions:
  • An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
    5·1 answer
  • How does heat affect quantum computers ?
    10·1 answer
  • The conscious process of planning and controlling how you spend your time is called?
    15·1 answer
  • Given the macro definition and global declarations shown in the image below, provide answers to the following questions:
    5·1 answer
  • What are the three types of event logs generated by windows 2003 and vista systems?
    12·1 answer
  • Which term describes the order of arrangement of files and folders on a computer?
    10·1 answer
  • Problem statement: Using loop, write a program that will ask the user to enter a character for left or right. Then, the user wil
    13·1 answer
  • In your own words describe the benefits of creating functions in your code
    12·1 answer
  • Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is
    14·1 answer
  • What was your first pokemon game<br><br><br> if you have not played one just comment don't answer
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!