1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreyy89
2 years ago
9

Please help me what is an example of a growing trend on social media

Computers and Technology
1 answer:
Marizza181 [45]2 years ago
8 0

Answer:

B

Explanation:

You might be interested in
Which of the following hacker attacks against wireless networks are virtually undetectable?
Ede4ka [16]

Answer: A. passive attacks

Explanation:

Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.

A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.

Methods of carrying out passive attacks.

•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.

•Dumpster driving: Attackers or intruders search for information from discarded computers and

other gadgets, those information can help to attack a network.

7 0
3 years ago
Which of the following statements are true about file naming conventions? Check all of the boxes that apply.
Korolek [52]

Answer:

last one check it and the second one

Explanation:

8 0
3 years ago
Read 2 more answers
If you think a query is misspelled, which of the following should you do?
MrMuchimi

Answer:

Check the explanation

Explanation:

When there are situations of obviously misspelled queries, you will have to base the Needs Met rating on the user intent

The reason is that, even when query is misspelled it won’t mean that it is less important. Therefore, the queries should be assigned degree of rating based on the respective priority.

8 0
3 years ago
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use
Alekssandra [29.7K]

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

5 0
3 years ago
Identify two entities and 2 of their attributes from the given scenario.
polet [3.4K]

Bookstore and BookSearch are the two entities for the given scenario.

Explanation:

  • For the given Book.com virtual store, there can be two entities like Bookstore and BookSearch.
  • Bookstore can have all the details of the books in the virtual store. hence the attributes can be
  • Bookstore attributes: bookname, Authorname, Publisher, Publishedyear, Agegroup, category.
  • BookSearch entity can be used to search the books in the virtual store.
  • Booksearch attributes: bookname, category, bookid, authorname.
8 0
3 years ago
Other questions:
  • _____ is two or more connected computers.
    8·1 answer
  • The condition, ____, entered in the criteria row of a long text field in a query window would retrieve all records where the lon
    8·1 answer
  • Select the focus questions that emphasizes what is more important: (Select all that apply) a.What needs to be relegated to the b
    8·1 answer
  • #Write a function called string_finder. string_finder should #take two parameters: a target string and a search string. #The fun
    14·1 answer
  • According to social penetration theory, the __________ dimension concerns the number of topics disclosed whereas the __________
    6·1 answer
  • Heres a meme<br><br>free pints as well, because why not.​
    10·2 answers
  • Write a method for the Invitation class that accepts a parameter and uses it to update the address for the event.
    9·1 answer
  • ________ was one of the first uses of the Internet
    15·2 answers
  • (1) Prompt the user to input an integer between 32 and 126, a float, a character, and a string, storing each into separate varia
    13·1 answer
  • _is the joining of two or more electrical conductors by mechanically twisting the conductors together or by using a special spli
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!