1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serious [3.7K]
3 years ago
8

As you are discussing marketing with a client, you try to explain how individuals find sites. Which tool will you explain as the

one best used in marketing?
Options:

categories

tags

posts

menus
Computers and Technology
1 answer:
tigry1 [53]3 years ago
8 0

Answer:

Menus

Explanation:

This is because menus can, and usually do, link to other websites.

You might be interested in
You want to connect an external hard drive for backups. Which is the fastest connection used by current external hard drives
Fynjy0 [20]

Answer:

thunderbold proly

Explanation:

5 0
3 years ago
Match the example with the type of collection.
labwork [276]

Answer:

1.c

2.list

3.tuple

Explanation:

5 0
3 years ago
What is not an advantage of a computer network?
Nutka1998 [239]

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

4 0
3 years ago
What does DHCP stand for?
Lisa [10]
Domain host control protocol is the answer
4 0
4 years ago
Read 2 more answers
given the numerical value 1010101.11, which of the following number systems is most likely represented.
nasty-shy [4]

Answer:

u have to give me more points

Explanation:

sorry

7 0
3 years ago
Other questions:
  • What does it mean for a school to be “accredited”?
    5·1 answer
  • Identify characteristics of top-down programming design. Choose all that apply.
    13·1 answer
  • Which feature of a blog marks a unique link to each post through which it can be recalled anytime?
    8·2 answers
  • Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to t
    11·1 answer
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • The unique constraint differs from the primary key constraint in what way?â
    15·1 answer
  • You and a few friends are having a meal at a pizza restaurant, and the server has just given you the bill. Write a function that
    14·1 answer
  • Given storeMonthlySales NUM STOREST[NUM MONTHST[NUM DEPTS] is a three-dimensional array of floating point values. Write a C++ fu
    5·1 answer
  • Pls help with this (20 points again)
    8·1 answer
  • WHICH PROGRAMMING LANGUAGES ARE THE BEST FOR PROGRAMMING?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!