1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STALIN [3.7K]
3 years ago
12

Do you know someone who has been scammed? What happened? Describe how they felt and what they did to solve the problem.

Computers and Technology
1 answer:
quester [9]3 years ago
7 0

a man named Billy bob jones picked up a phone call that said he bought something for 1,000,000 dollars and the man in an Indian accent asked if he wanted a refund and of course, Billy bob jones was old and not very smart so he said yes and gave the so-called kind man his credit card. Oh, how not very smart he was.

immediately after he started getting bombarded with emails from his bank telling him that purchases were being made and poor old Billy bob jones

just sat there in stress and everything the bank was saying made no sense but he knew someone and his name was

Kitboga who would help him

and he hackered the sad Indian scammer and took his location and then before destroying the Indian call center he ratio + L boozed them one last time

Explanation:

You might be interested in
You are looking for a backup that copies only the files that have changes since the last full backup. Which of the following wil
adelina 88 [10]

Answer: d. incremental backup

Explanation:

In incremental backup it copies only the files that have changed since the last full backup. It does not backup all the files just like the full backup. it however backup those copies into the  system which has changed since the last backup.

In doing  so it just increases the efficiency and performance of the backup procedure. This process is basically preferred when the amount of file to be backup is huge and there is not enough time to do a full backup.

Increment backup also use less disk space.

Cloud backup uses most increment backup for its application.

6 0
4 years ago
Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit
Sindrei [870]

Option B

Synchronous replication modes of replication requires a very low latency network connection and ensures data remains in synch with zero data loss in the event of a failure at the source site

<u>Explanation:</u>

Synchronous replication, information is replicated to a subsequent remote place at the identical period as fresh information is implying generated or renewed in the original datacenter.  Actually, both master and target roots endure effectively synchronized, which is vital for triumphant crash restoration.

In the circumstances of synchronous replication, this indicates that the write is deemed ended barely when both local and isolated warehouses approve its fulfillment. Therefore, nullity data failure is assured, but the overall execution is regulated down.

5 0
3 years ago
Write a function in Erlang called func that takes a list of tuples and returns a new list consisting of tuples from the original
vovikov84 [41]

Answer:

Please find the complete question in the attached file.

Explanation:

Following are the code to the given question:

-module(helloworld)//use a module

-export([start/0])

start() ->//start module

func([Head Taill) ->//defining a method func that takes a parameter

{

first, second} = Head,//holding head value

if //defining if block

first > second -> func(Tail)//method func that takes a parameter

true ->

[first, second}|func(Tail)]//method func that takes a parameter

end

6 0
3 years ago
Match each item with a statement below. a.Authentication b.Brute force attack c.Dictionary attack d.Password e.Shoulder surfing
Lana71 [14]

The steps that ensure that the individual is who he or she claims to be

a. Authentication  

Authentication is a process that provides proof that the user is genuine and not an imposter. It is a way to prove that you are allowed to access a system. Usernames and Passwords have been the default method of authentication. These days though, passwords are not the only authentication mechanism.

A password attack in which every possible combination of letters, numbers, and characters is used to match passwords in a stolen password file

b. Brute force attack  

An automated brute force attack involves repetitive successive attempts of password guesses by using a trial and error approach and hoping to guess the encryption correctly. It is an old attack method, but is still in effect and popular with hackers. It can take minutes to crack or an eternity. Using automated brute force attacks tools and programs, and attacker is able to enter parameters such as password length, character set, pattern, language, and skips for the type of password to be generated

A password attack that compares common dictionary words against those in a stolen password file.

c. Dictionary attack  

A dictionary attack is another common offline password attack that begins with the attacker creating encrypted versions of common dictionary words and then compares these words against those in a stolen password file. This is sometimes very successful because users create passwords that are simple English dictionary words. A variation of such an attack is the hybrid attack.

A secret combination of letters, numbers, and/or symbols that serves to authenticate a user by what he or she knows.

d. Password  

Nowadays, when accessing almost any computer device, systems, or a website, we are typically required to provide information that identifies and proves that we are actually that person. This is done by the use of passwords. Despite passwords being the primary means of authentication, they are no longer considered to be a strong defense against attackers.

Viewing information that is entered by another person

e. Shoulder surfing  

An example of shoulder surfing is observing someone entering a code from a keypad while standing from a short distance. Another good example is a hotel room’s cipher lock. Cipher locks are vulnerable to shoulder surfing. Someone passing by from behind is able to see the buttons being pushed and can easily gain access when you leave.

Grouping individuals and organizations into clusters based on an affiliation  

f. Social networking and not social engineering

The definition above is for social networking and not social engineering. Social networking sites are responsible for facilitating individuals with common interests and beliefs and operates and functions as an online community of users. Anyone on social media is able to read information posted by others. Thus, social networking carries with it cyber risks like personal data being used maliciously.

Redirecting a user to a fictitious website based on a misspelling of the URL  

g. Typo squatting

Also known as URL hijacking, Typosquatting is a questionable type of cybersquatting that targets internet users who type a web address incorrectly. It is the extreme version and similar to phishing. When users make such errors, they may be lead to another alternative site owned by a hacker.

Phishing attack in which the attacker calls the victim on the telephone

h. Vishing  

Instead of using emails or other forms of communication to contact the potential victim, a simple phone call can be used. Known as voice phishing, an attacker calls an unsuspecting victim and pretends to be someone working with the victim’s bank. The attacker lies to the user that his or her credit card has experienced fraudulent activity, instructs the victim to call a specific number and hangs up. Upon calling back, the victim is instructed by automated instructions telling them to enter credit card numbers and other essential details.

A phishing attack that targets wealthy individuals  

i. Whaling

Whaling is a type of spear phishing where instead of targeting the small fish, it targets the “bigger fish” or the wealthy individuals who have larger sums of money in a bank account. By putting every effort on this group, the attacker can invest more time in the attack and achieve major success.

6 0
3 years ago
Select the correct answer.
aleksandrvk [35]

Answer:

B.  color and painting tools

Explanation:

5 0
2 years ago
Other questions:
  • Which statement correctly explains why televisions became less bulky?
    6·1 answer
  • Design a database to keep data about college students, their academic advisors, the clubs they belong to, the moderators of the
    12·2 answers
  • When protecting a worksheet all cells are locked by default.?
    10·1 answer
  • What technology would it take to make a balloon that doesn't pop?
    6·1 answer
  • Match the installation type to its description.
    9·1 answer
  • to _________________________ is a mouse operation in which you move the mouse until the pointer on the desktop is positioned on
    7·1 answer
  • Why might the government censor what its citizens see on the internet?
    13·2 answers
  • Remember partially filled arrays where the number of elements stored in the array can be less than its capacity (the maximum num
    14·1 answer
  • Help a brotha out..................
    10·1 answer
  • Globalization is based on <br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!