1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
3 years ago
7

T N O ? You can insert only the row only to True or false

Computers and Technology
2 answers:
nata0808 [166]3 years ago
7 0

Answer:

false

Explanation:

Hitman42 [59]3 years ago
6 0

false

Explanation:

good luck bro

have a great day

You might be interested in
What is the film format that many filmmakers feel is superior to any other format?
Kobotan [32]

Answer:

digital

Explanation:

7 0
3 years ago
How do you code a website?
slega [8]

Answer:

Learn the basics of HTML.

Understand HTML document structure.

Get to know CSS selectors.

Put a CSS stylesheet together.

Get Bootstrap.

Pick a design.

Customize your website with HTML and CSS.

Add content and images.

Explanation:

5 0
3 years ago
Five uses of the start button
Damm [24]

Starting something

Possibly turning it off

Making something work

Fixing the Start Button

Beginning something

5 0
3 years ago
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
Thepotemich [5.8K]

Answer:

Option (A) is the right answer.

Explanation:

The following terms can be described as :

Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.

Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.

Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.

Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.  

According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.

3 0
3 years ago
To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the tec
puteri [66]

In order to assist an end user, a help desk technician can use the network protocol with a default TCP/IP port number of <u>3389</u>.

<h3>What is the TCP/IP protocol suite?</h3>

The TCP/IP protocol suite is an abbreviation for Transmission Control Protocol and Internet Protocol and it's a standard framework for the transmission (prepare and forward) of information on digital computers over the Internet.

In the Transmission Control Protocol and Internet Protocol (TCP/IP) suite, a help desk technician can use the network protocol with a default TCP/IP port number of <u>3389</u> to assist an end user by opening a graphical user interface to connect with the end user's Windows computer.

Read more on TCP here: brainly.com/question/17387945

#SPJ1

7 0
2 years ago
Other questions:
  • Which of the following is a disadvantage of using a personality assessment to determine who is well suited for a work position?
    7·2 answers
  • _____ is published by the U.S. Bureau of Labor Statistics. It provides up-to-date career outlook information. It is no longer av
    15·2 answers
  • what is the goal of technology A. to understand how the natural world functions B. to study the natural world C. to improve the
    9·1 answer
  • Where is your network strongest? Where is it weakest? How have you developed your network thus far? How has that influenced who
    5·1 answer
  • How do you get free Wifi on your phone without paying
    6·1 answer
  • Using ________ data mining, the user usually begins by telling the data mining software to look and test for specific patterns a
    15·1 answer
  • Sue needs to add a header and a footer to a presentation. Which process should she use to do this?
    10·2 answers
  • According to the SANS Institute, a __________ is typically a document that outlines specific requirements or rules that must be
    13·1 answer
  • Which disc store compacity for full lenght movie? dvd or cd
    14·1 answer
  • All of the following are technical solutions to protecting user privacy except: Group of answer choices Data use policies Anonym
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!