1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MatroZZZ [7]
2 years ago
13

I WILL MARK IT BRAINLIEST FOR SURE ☺️❤️

Computers and Technology
1 answer:
Katyanochek1 [597]2 years ago
5 0

Answer:

Virtually all foods are derived from living cells from animals and plant origin and in some cases from some microorganisms by biotechnology.

Explanation:

I actualy dont know how to explain you this ahmm go to your teacher and hit her/he with your module.

You might be interested in
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
A (blank) is a special row in an Excel table that provides a selection of
Colt1911 [192]

A Data series is a special row in an Excel table that provides a selection of  aggregate functions useful for working with numerical data.

Data series

<u>Explanation:</u>

As MS-excel worksheet is used to huge or series of calculation. Through MS-excel people use for calculation and do series of analysis and do graph output.

Even in software development reports are generated and export to MS-excel and further analysis, calculation are made.

MS-excel is wonderful tools is used in computer technology. in MS-excel has many inbuilt function where can be used with single cell or range of cells.

In MS-excel aggregate function such as sum, count, max or min is inbuilt function readily available to user it.

3 0
3 years ago
A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific
Vera_Pavlovna [14]

Answer:

User application

Explanation:

A user application is a program that is created by using a standard software that is adjusted to the user's needs that can't be fulfilled by an existing system. According to this, the answer is that a user application utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.

7 0
3 years ago
Help me plase will give brainliest
egoroff_w [7]

Export the data into a spreadsheet

5 0
3 years ago
Read 2 more answers
Which are examples of primary sources? Check all that apply.
Marrrta [24]

Answer:

A, D, E

Explanation:

Diaries, photographs, and speeches are all forms of primary sources, whereas biographies and newspaper articles are written by a secondary source.

5 0
3 years ago
Read 2 more answers
Other questions:
  • What operating system uses Fastboot?
    10·2 answers
  • Introduction to graphic design please help! Define the four terms: design ,art,decoration , and visual literacy. Describe how th
    12·1 answer
  • What is the purpose of network permissions?
    11·2 answers
  • Write a program that reads a file containing text. Read each line and send it to the output file, preceded by line numbers. If t
    8·1 answer
  • If your teacher is out of the office, what is the best way to reach them, or get help?
    10·1 answer
  • Help with this pleaseeeeeee​
    7·1 answer
  • What is a computer system model and explain?
    10·1 answer
  • We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
    13·1 answer
  • Does technology always follow the science,yes or no explain why to choice
    13·1 answer
  • Majken is turning 18 years old soon and wants to calculate how many seconds she will have been alive.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!