Answers

Answer 1

Answer:

Phishing is a type of online scam where an attacker sends a fraudulent email purporting to be from reputable companies, designed to deceive a person into revealing sensitive and personal information (card numbers, passwords etc).

Hope this helps.


Related Questions

Javascript is an object-based programming language that involves working with the properties and methods associated with objects.
a) True
b) False

Answers

Answer:

True

Explanation:

You can set variables and make method functions.

Classes that depend on field names from parent classes are said to be ____ because they are prone to errors.Group of answer choicesrobustinnovativefragileconstructive

Answers

Classes that depend on field names from parent classes are generally said to be fragile because they are very prone to coding errors.

What is a class?

A class can be defined as a user-defined blueprint (prototype) or template that is typically used by software programmers to create objects and define the data types, categories, and methods that should be associated with these objects.

In object-oriented programming (OOP) language, a class that is written or created to implement an interface would most likely implement all of that interface's method declarations without any coding error.

In Computer programming, we can infer and logically conclude that classes that are highly dependent on field names from parent classes are generally said to be fragile because they are very prone to coding errors.

Read more on class here: brainly.com/question/20264183

#SPJ1

A framework for studying memory that uses the computer as a model of human cognitive processes defines the?

Answers

A framework for studying memory that uses the computer as a model of human cognitive processes defines the information processing theory

What is information processing theory?

The information processing theory explains how human bras also works like a computer by converting various thought, observation to meaningful information.

The human brain is said to works in a sequential way. It receives input such as picture and processes the information to give a result.

Therefore, A framework for studying memory that uses the computer as a model of human cognitive processes defines the information processing theory

Learn more on information processing  below

https://brainly.com/question/11610994

#SPJ1

The formula for steady-state consumption per worker (c*) as a function of output per worker and investment per worker is:_________

Answers

Answer:

C= f(k) - dk*

The formula for steady-state consumption per worker (c*) as a function of output per worker and investment per worker is: c= f(k) - dk*. When an economy begins above the Golden Rule, reaching the Golden Rule: produces higher consumption at all times in the future.

Which of the cached information retrieved will be the same as what is stored in the original server where the data is maintained

Answers

The answer is Yes, A browser cache is known to be a type of client-side cache, and it implies that it is also a type of site caching.

What is cache on a browser?

The browser cache is known to be a kind of 'cache' tool that is often used by a person's internet browser so that one can fasten up the page loading act.

Hence, The answer is Yes, A browser cache is known to be a type of client-side cache, and it implies that it is also a type of site caching.

Learn more about browser cache from

https://brainly.com/question/14598358

#SPJ1

Write a while loop that adds 5 to userNum while userNum is less than 20, displaying the result after each addition. Ex: For userNum

Answers

Using the computational knowledge in JAVA it is possible to write a code that Write a while loop that adds 5 to userNum while userNum

Writting the code in JAVA:

// declaring variable userNum

var userNum = 5;

// variable ans to store all answers and print them in single line

// (as expected in sample output)

var ans = "";

// while loop, while userNum is <= 20

// (to get output 25 on screen, we need to run loop till less-than-equal)

while(userNum <= 20) {

 userNum += 5;

 ans += userNum + " ";

}

// displaying final output on console

console.log(ans);

See more about JAVA at brainly.com/question/12975450

#SPJ1

You have downloaded a file from the internet. You generate a hash and check it against the original file's hash to ensure the file has not been changed. Which information security goal is this an example of

Answers

Answer:

integrity

Explanation:

Consider the following method. public boolean checkIndexes(double[][] data, int row, int col) { int numRows

Answers

The  variable declaration and initialization, that  appears in a method in the same class as checkIndexes is checkIndexes(table, 4, 5).

What is declaration of a variable?

Declaration of a variable is known to be a function or work that is seen in computer programming language.

This is known to be a form of a statement that is known to be often used to state or specify the variable in regards to its name and that of its data type.

Note that the Declaration is known to be one that informs the compiler about the presence of an entity in that  program and where one can find it.

Hence, The  variable declaration and initialization, that  appears in a method in the same class as checkIndexes is checkIndexes(table, 4, 5).

See full question below

Consider the following method.

public boolean checkIndexes(double[][] data, int row, int col)

{

int numRows = data.length;

if (row < numRows)

{

int numCols = data[0].length;

return col < numCols;

}

else

{

return false;

}

}

Consider the following variable declaration and initialization, which appears in a method in the same class as checkIndexes.

double[][] table = new double[5][6];

Which of the following method calls returns a value of true ?

A  checkIndexes(table, 4, 5)

B checkIndexes(table, 4, 6)

C checkIndexes(table, 5, 4)

D checkIndexes(table, 5, 6)

E checkIndexes(table, 6, 5)

Learn more about public boolean  from

https://brainly.com/question/14845280

#SPJ1

This question involves the creation and use of a spinner to generate random numbers in a game. a gamespinner object represents a spinner with a given number of sectors, all equal in size. the gamespinner class supports the following behaviors.

creating a new spinner with a specified number of sectors
spinning a spinner and reporting the result
reporting the length of the current run, the number of consecutive spins that are the same as the most recent spin

write the complete gamespinner class. your implementation must meet all specifications and conform to the example.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that  generate random numbers in a game

Writting the code in JAVA:

public class GameSpinner {

int spinner;

int num;

int current;

public GameSpinner(int spinner) {

super();

this.spinner = spinner;

this.current = 0;

this.num = 0;

}

public int spin() {

int curr = 1 + (int) (Math.random() * spinner);

if (this.current == 0 || this.num == 0) {

this.current = 1;

this.num = curr;

return curr;

}

if (this.num == curr) {

this.current = this.current + 1;

return curr;

} else {

this.num = curr;

this.current = 1;

return curr;

}

}

public int currentRun() {

return this.current;

}

}

GameSpinnerTest.java

public class GameSpinnerTest {

public static void main(String[] args) {

// TODO Auto-generated method stub

GameSpinner g = new GameSpinner(4);

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

}

}

Output

g.currentRun() : 0

g.spin() : 1

g.currentRun() : 1

g.spin() : 4

g.currentRun() : 1

g.spin() : 4

g.currentRun() : 2

g.spin() : 3

g.currentRun() : 1

g.spin() : 3

g.spin() : 2

g.spin() : 2

g.currentRun() : 2

See more about JAVA at brainly.com/question/12975450

#SPJ1

Use the drop-down menus to complete the steps to set up cascading deletes between two related tables

Answers

The words that can the complete the steps to set up cascading deletes between two related tables are:

Database Tools The Line Connecting the Tables Cascade Delete Related Records.

What does cascade delete related fields mean?

Cascade Delete is known to be a kind of a function that  makes any records in associated tables to be deleted when one is in the process or act of deleting the current record.

For example, if a person were to delete any record that is seen or found  in the Clients table, a person would also be in the process of deleting any records in regards to the  Projects table with that specific Client No.

Hence, The words that can the complete the steps to set up cascading deletes between two related tables are:

Database Tools The Line Connecting the Tables Cascade Delete Related Records.

See full question below

Use the drop-down menus to complete the steps to set up cascading deletes between two related tables.

1. Click the

tab

2. In the Relationships group, click Relationships

3. Double-click

4. In the Edit Relationship dialog box, add a check mark next to

5. Click OK

Done

Learn more about cascading from

https://brainly.com/question/28102666

#SPJ1

Answer: late answer but for the other ppl - Database Tools , The line connecting the tables , and Cascade Delete Related Records.

What is technology?5points​

Answers

Answer:

Technology refers to the application of the knowledge got from science in a practical way.

Explanation:

For example: 1. Science has made the world a global village hence one travels from one to another by either air plane, ship, car, motor, etc. within a short period of time. Also communication has been made easier due to science. One may communicate with people from different countries in the world through the use of computers, mobile phones, at the comfort of their homes without wasting much time.

Which are the three most used languages for data science?

Answers

Answer: python, JavaScript, scala

Explanation:

If we increase the sample rate of a device from 48khz to 96khz, what is the impact to the network?

Answers

If we increase the sample rate of a device  then A 96kHz subscription will need about  twice as much bandwidth as that of  48kHz subscription.

What is subscription?

The definition of a subscription is known to be a term that connote a form of an agreement that a person make in advance to get something for a given time period.

Hence, If we increase the sample rate of a device  then A 96kHz subscription will need about  twice as much bandwidth as that of  48kHz subscription.

Learn more about subscription from

https://brainly.com/question/15301858

#SPJ1

How do budget constraints, even for the largest game design companies, affect the development schedule for a game development team? If you were building the budget for a proposed game, where would you allocate the most money? Defend your decision, explaining why this stage of the design to the production process is supported with the largest percentage of budget funds. pls help

Answers

Budget constraints affect the development schedule for a game  as  its includes

Technical bugs or some forms of limitations. A game that has pre-existing Intellectual Property (IP). When there is Limited resources and others

What is  game development?

This is known to be the act of making games. Know that the feature listed above can affect:

The time for the release of the gameLegal issuesFinancial loss and others.

Hence, Budget constraints affect the development schedule for a game  as  its includes

Technical bugs or some forms of limitations. A game that has pre-existing Intellectual Property (IP). When there is Limited resources and others

Learn more about game development from

https://brainly.com/question/24564714

#SPJ1

What are examples of lightweight directory access protocol (ldap) directory server software?

Answers

Examples of lightweight directory access protocol (ldap) directory server software are:

Microsoft Active DirectoryOpenLDAP Red Hat Directory Servers

What is a lightweight directory access protocol (ldap)?

A lightweight directory access protocol is an open-source application that helps people to access directory services through an internet protocol platform.

Common examples are the Open LDAP and the Microsoft Active Directory mentioned above.

It facilitates the language that can be used for interaction over the network. The directory information obtained through this protocol is organized and easy to obtain.

Learn more about the LDAP here:

https://brainly.com/question/12972416

#SPJ1

True or false: Nessus is a useful tool when preventing attacks as it identifies vunlerabilities that a hacker may use to penetrate your network.

Answers

FALSE, Nessus does not actively prevent attacks, it is only a tool that checks your computers to find vulnerabilities that hackers could exploit.

What is Nessus?

Nessus is a proprietary vulnerability scanner developed by Tenable, Inc.

What is Nessus used for?

Nessus is a remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network.

Thus, Nessus does not actively prevent attacks, it is only a tool that checks your computers to find vulnerabilities that hackers could exploit.

As a system administrator you need to check these vulnerability indications and work on solutions to prevent the attack.

The correct answer is FALSE.

Learn more about Nessus here: https://brainly.com/question/5619326

#SPJ1

Mel is a research scientist at a health sciences center. His job requires him to analyze large amounts of data in short periods of time. Select the best computer for me?

Answers

In the case above, Mel needs a  desktop computer with a fast processor.

What is data for a computer?

Computer data is known to be a form of information processed or saved by a computer. This information is saved as text documents, images, audio clips, software programs and others.

Hence due to the volume of work and in In the case above, Mel needs a  desktop computer with a fast processor.

See options below

23

Mel is a research scientist at a health sciences center. His job requires him to analyze large amounts of data in short periods of time.

Select the best computer for Mel.

A handheld tablet computer

A desktop computer with two screens

A desktop computer with a fast processor

A portable laptop computer

Learn more about data  from

https://brainly.com/question/19243813

#SPJ1

If the conditional expression in a switch statement does not match any of the case values, the _________ statement executes g

Answers

Answer:

Default

Explanation:

in programming, default block executes when there are no matching

What screen adjustments are made to the digital dashboard when enhanced mode is selected on 2023 z?.

Answers

The screen adjustments that are made to the digital dashboard when enhanced mode is selected on 2023  is the 12.3-inch TFT meter display.

What is it about?

The 12.3-inch TFT meter display is known to be a form of all-new that is made along with three display modes to be able to match driver preference.

Note that “Normal” mode is one that gives a sporty feel with the center area made for navigation, audio and also a form of vehicle information.

Therefore, The screen adjustments that are made to the digital dashboard when enhanced mode is selected on 2023 is the 12.3-inch TFT meter display.

Learn more about dashboard from

https://brainly.com/question/1147194

#SPJ1

On the internet, the entity that looks up a domain name and retrieves information about it is the?

Answers

On the internet, the entity that looks up a domain name and retrieves information about it is the Domain Name System (DNS).

What is a Domain?

This refers to the subset of the internet with access to administrative privileges that contains a common suffix with an organization.

Hence, we can see the Domain Name System (DNS) is the primary entity that is used to retrieve the domain name and the relevant information about the domain and returns it to the user, and then translates IP addresses.

Read more about Domain Name System here:

https://brainly.com/question/19268299

#SPJ1

On a windows system, which task manager tab would you use to adjust the priority given to a specific program? details performance processes app history services

Answers

On a Windows operating system, the task manager tab which you would use to adjust the priority given to a specific program is: A. details.

What is a software program?

A software program can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task and proffer solutions to a particular problem.

What is an operating system?

An operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, so as to manage random access memory (RAM), software programs, computer hardware and all user processes.

On a Windows operating system, the details of the task manager tab should be used to adjust the priority given to a specific program.

Read more on software here: brainly.com/question/26324021

#SPJ1

You want to be super private with your email. You'd like to be able to download your email to a single device, then remove it from your email server. What email protocol can you use to do that?

Answers

Since the person want to be super private with your email, the email protocol can you use to do that is POP 3.

What is  POP3 about ?

POP3 is known to be a tool that gives one room to be able to download email to a single device, which a person want to use if they want to add privacy to their emails.

Therefore, Since the person want to be super private with your email, the email protocol can you use to do that is POP 3.

Learn more about email from

https://brainly.com/question/24688558

#SPJ1

Which statements are TRUE about web services protocols? (Select TWO responses) SOAP and REST are both web service communication protocols REST allows a greater variety of data formats, whereas SOAP only allows XML SOAP is a protocol that only works with XML and REST only works with JSON RESTful web services and SOAP web services are completely stateful

Answers

The true statements are TRUE about web services protocols are:

SOAP and REST are both web service communication protocols REST allows a greater variety of data formats, whereas SOAP only allows XML SOAP .

Are SOAP and REST both Web service communication protocols?

Yes, SOAP (Simple Object Access Protocol) and REST (Representational State Transfer) are both known to be a kind of web service communication protocols.

Note that REST gives room form a greater scope of data formats, but SOAP only allows XML and as such, The true statements are TRUE about web services protocols are:

SOAP and REST are both web service communication protocols REST allows a greater variety of data formats, whereas SOAP only allows XML SOAP .

Learn more about web services from

https://brainly.com/question/13261383

#SPJ1

Enterprise storage systems typically use fast Fibre Channel or ____ connections and are scalable so more hard drives can be added as needed up to the maximum system capacity.

Answers

Enterprise storage systems typically use fast Fibre Channel or iSCSI connections and are scalable.

What is iSCSI known for?

ISCSI is a word that connote Internet Small Computer System Interface, and it functions as or on top of the Transport Control Protocol (TCP) and it gives room for the SCSI command to be transmitted to the end-to-end over local-area networks (LANs), and others.

Note that Enterprise storage systems typically use fast Fibre Channel or iSCSI connections and are scalable.

Learn more about storage systems from

https://brainly.com/question/24179644

#SPJ1

To change the formatting of text from calibri to arial, which tool should you use?

Answers

Answer:

The Font Tool

Explanation:

Both Calibri and Arial are default fonts, thus changing from calibri to arial requires the font tool

why are pirated software considered a threat?​

Answers

Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

What are the disadvantages of using pirated software?

The Disadvantages of Pirated software is known to be the likelihood to be infected with a kind of serious computer viruses, that tends to damage the a person's computer system.

Hence, Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

Learn more about pirated software from

https://brainly.com/question/3615098

#SPJ1

Task 5: Create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer whose ID currently is stored in I_CUST_ID. Place these values in the variables I_CUSTOMER_NAME and I_CREDIT_LIMIT, respectively. When the procedure is called it should output the contents of I_CUSTOMER_NAME and I_CREDIT_LIMIT.

Answers

The SQL statement that would create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer is:

GET_CREDIT_LIMIT

SELECT CUST_ID 125

FROM FIRST_NAME, LAST_NAME, CREDIT_LIMIT

WHERE LAST_NAME ="Smith"

What is SQL?

This is an acronym that means Structured Query Language that is used in handling data in a database.

Hence, we can see that from the attached image, there is a table that contains the details of customers and their various data such as their first and last names, credit limits, address, etc, and the  GET_CREDIT_LIMIT procedure is shown above.

Read more about SQL here:

https://brainly.com/question/25694408

#SPJ1

You use a custom application that was developed in-house. On a periodic basis, the application writes or modifies several registry entries. You want to monitor these registry keys so that you can create a report that shows their corresponding settings over the next 5 days. What should you do

Answers

In the case above, the right thing that a person should do is to Configure a configuration data collector in the Performance Monitor.

What does a Performance Monitor do?

The Microsoft Windows is known to have a Performance Monitor and this is known to be a tool that  is one where the administrators often use to evaluate how programs functions on their computers influence the computer's performance.

Note that this tool is one that can be used in real time and therefore, In the case above, the right thing that a person should do is to Configure a configuration data collector in the Performance Monitor.

Learn more about custom application from

https://brainly.com/question/1393329

#SPJ1

What are the three advantages of using blockchain technology? multiple choice all of the answer choices are correct. digital trust internet of things integration immutability

Answers

The  three advantages of using blockchain technology are:

digital trust internet of thingsimmutability

What is blockchain technology?

A Blockchain is known to be a kind of a chain of blocks that is made up of information.

Note that the data that are said to be stored inside a block is one that is based on the type of blockchain. Blockchain  is seen as a kind of a shared, form of immutable ledger that quickens the process of putting down or recording transactions and helps in the tracking of assets in a business network.

Hence, The  three advantages of using blockchain technology are:

digital trust internet of thingsimmutability

Learn more about blockchain technology from

https://brainly.com/question/25700270

#SPJ1

________ is installed in special, read-only memory in devices like printers or communication devices.

Answers

A firmware is installed in special, read-only memory in devices like printers or communication devices.

What is firmware and give example?

Firmware is known to be a kind of software that makes or produce the basic machine instructions that gives room for the hardware to act and be able to communicate with other kinds of software that is said to be running on a device.

Note that Firmware makes low-level control in for a lot of device's hardware and its example is microcontroller which is said to be an aspect of the microprocessor that informs the microprocessor the right actions to take.

Hence A firmware is installed in special, read-only memory in devices like printers or communication devices is the right answer.

Learn more about firmware from

https://brainly.com/question/3522075

#SPJ1

Other Questions
Read the sentence and choose the correct adjective to best complete the sentence.Los maestros son muy ________. cuidadosa cuidadosas cuidadoso cuidadosos In 2009, the national center for statistics and analysis estimates alcohol was involved in _____ of fatal crashes. Music that relied on sounds made by any natural source that were recorded and then altered is called: Quick algebra 1 question for 50 points!Only answer if you know the answer, quick shout-out to Dinofish32, tysm for the help!Scenario 1: Cameron works at a local grocery store after school. He is paid $8 for each hour he works.Scenario 2: At a local bakery, one box of donuts costs $5. Two boxes of donuts cost $10.Consider the two scenarios given above. Can you write an equation to represent each situation? What would the graphs of these equations look like? Can you think of a situation that would result in a similar equation?Describe a scenario that would result in an equation similar to the equations for Scenarios 1 and 2. Post your scenario and the corresponding equation to the discussions area. Find the missing side. Round your answer to the nearest tenth. A person convicted of a third felony can be sentenced to life imprisonment based on? Several years before his death, something happened to St. Thomas which caused him to cease his writing and philosophical work. What was it Anthrax is characterized by all of the following except: a. cutaneous is the most common form b. respiratory anthrax has the least mortality rate c. causative is Bacillus anthracis d. diagnosed by cultured blood or smears from cutaneous lesions WILL GIVE BRAINLIEST1. Write an expression for each of the following:a. the sum of 6 and zb. the difference between 20 and xc. 8 less than the quotient of x divided by 6d. x increased by 5 divided by 4 Political action committees or pacs engage in activities such as According to maslow, homeless people would have difficulty finding a job unless they:_____. *WILL MARK BRAINLIEST* How do models of urban development explain the distribution of people, services, and economic activities in urban structures? Which civilization of the Indian Subcontinent existed at about the same time as the ancient Mesopotamian Civilization?Thank u! :) Explain the difference between using area and volume with 2-D and 3-D figures. When using sftp to share files, what is encrypted in addition to the authentification information?. What is the process in which homologues align gene by gene in preparation for crossing over? which term describes a relationship between the national government and the states in which the national government directs the states on policies they must follow Part C Describe how you could use your results from parts A and B to find the probability that the first slice of cake will contain the marble. The range of a list of integers is 20, and the median is 17. What is the smallest possible number of integers in the list? Using a schematic diagram, explain the steps of the laser technique.