Answer:
social engineering
Explanation:
The above scenario of USB use is an example of social engineering.
What is Social Engineering?This is known to be when a person gets phishing email via any method known as social engineering.
Conclusively, Social Engineering is a term that connote non-technical intrusion that depends on human linkage and it I one where a person is been tricked into breaking normal security means. It often makes use of USB drive for its purpose.
Learn more about social engineering from
https://brainly.com/question/26072214
PLEASE ANSWER ALL QUESTIONS CORRECTLY FOR 50 POINTS AND A BRAINLIEST!!!! IT ALSO INCLUDES ENGLISH, PLEASE KEEP IN MIND THIS IS ALSO IMPORTANT JUST AS THE OTHERS (NO SPAMMING OR LINKS)
Which stage of the problem-solving process involves identifying the inputs, process, and output for each solution? *
Definition of the problem
Develop the algorithm
Propose and evaluate possible solutions
Determine the most efficient solution.
Software used for professional print publications such as posters, books, and email newsletters is called a: *
Professional software
Word processing software
Desktop program
Desktop publishing software
Which of the following criteria does NOT determine the credibility of a source? *
How current the information is
The reputation the publisher
The article covers (speaks about) the topic being researched
The gender of the author
The process of finding a solution to a difficult or complex issue to make it easier is known as *
problem
problem-solving
input
A series of actions taken in order to solve a particular problem is known as the____________ *
process
problem
input
output
A finite set of unambiguous (no uncertainty, clear) instructions that can be performed in a prescribed sequence to achieve a certain goal is called a/an *
problem
output
algorithm
input
Which is the third step in the problem-solving process? *
Propose possible solutions
Test and evaluate the solution
Select the most effective solution
Defining the problem
A list of sources you used when writing a scholarly article on a specific subject is known as a: *
intellectual-property
credibility
bibliography
trademark
Which of the following are you able to create with the use of desktop publishing software? *
1 point
E-Book
Banner
All of the above
Newsletter
Which of the following is NOT a writing style format for academic purposes? *
Times New Roman
American Psychological Association
Modern Language Association
The right by an individual to protect his/her literary work such as poems, songs, and drawing is known as *
plagiarism
copyright
industrial property
trademark
Through the use of technology we can easily: *
SELECT ALL THAT APPLY. HINT: ONLY TWO OF THE 4 ARE CORRECT.
say more traditional jobs being available
agree that there are fewer emerging jobs
sell goods and services as we’ve never been able to
produce more jobs which will create growth and development in the country.
Answer: 1 Definition of the problem
2 Desktop publishing software
3 The gender of the author
4 problem-solving
5 input
6 algorithm
7 Select the most effective solution
8 credibility
9 All of the above
10 American Psychological Association
11 copyright
12 agree that there are fewer emerging jobs
sell goods and services as we’ve never been able to
Explanation:
why should information technology NOT be taught in school?
Explanation:
Technology should not be used to teach in school as it can lead to distractions. With kids wanting to explore other sights, cheating, and communicating with others. Also, it can be expensive to purchase the technology for everyone as it can be a major investment with hundreds or thousands going into it. Technology also requires a lot of training by having to adapt lessons compatible with the systems and making sure the software is secure.
What is the difference between electrical and electronic devices?
Answer:
A difference is that the electrical devices makes the electrical energy into the other forms of energies, such as heat, light, sound, gravitational, and nuclear. . . The electronic device controls the flow of electrons for performing the task.
Answer:
the different between electrical and electronics devices is the electricity and the power of inside of some devices which are considered most powerful electronics from, because the difference is the battery.
Explanation:
i hope it helps ;)
Which of the following are considerations in e-commerce and e-government Internet sites? Check all of the boxes that apply.
security
what time of day you are online
protection of sensitive information
from which location you are accessing the site
Answer:
protection of sensitive information
Explanation:
Answer:
a c baka baddies
Explanation:
which of the following combinations of keys is used as a short for saving a document on a computer
ctrl+s
is used to save
Hope this helped
-scav
can someone tell me what to do i’m kinda stuck and don’t know what he’s telling me to do pls ill give brainlist and points
Answer:
Well a debtor is basically someone owing someone money, basically someone in debt. He’s telling cup head boy to take care of the people who owe him or someone else their or his money. Thats basically it.
Which ribbon tab has the tool that lets you connect your text to a URL?
Home
Insert
Review
Animations
Answer: Insert
Explanation:
The Ribbon was introduced by Microsoft in 2017 and it's simply a user interface element that can be found below Quick Access Toolbar. The Ribbon consist of seven tabs which are:
• Home
• Insert
• Page layout
• References
• Mailing
• Review
• View.
The Ribbon tab that has the tool that lets you connect your text to a URL is the Insert tab.
In the Menu bar, the person should click on the Insert tab that us in the Links section. After that, click on the Hyperlink or the Link option, then in the Insert Hyperlink window, one can then type addr as of the web page that the person wants to connect the text to after which the leoen will then click OK.
Which tab automatically becomes available after inserting a text box? Drawing Tools Insert Text Box Tools Shape Tools
Answer:
insert text box
Explanation:
Explanation:
format tab
Explanation: when you draw a text box a new tab called the format tab appears. it contains tools to design and format and modify the text box.
Match the roles to the task they perform.
gather requirements
create software framework
identify errors in the software
develop program code for software
Role
software architects
business analysts
programmers
testers
Software Architects: “develop program code for software”
Business Analysts: “gather requirements”
Programmers: “create software framework”
Testers: “identify errors in the software”
Select the correct text in the passage.
Which sentences highlight the correct way of preparing baked potato?
George finds that there are no vegetables at home today except potatoes. He decides to prepare something simple with the potatoes. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour. Joe is at home with his friend Elvis. He shows Elvis how to prepare baked potatoes. He preheats oven at 150°F. He then puts potatoes in water. After cleaning the potatoes, he bakes the potatoes in oven at 150°F for 30 minutes.
Answer:
. He preheats oven to 350°F. He then cleans and scrubs the potatoes. He pierces potato skin with fork many times to create air routes. He finally bakes the potatoes in oven at 350°F for one hour.
Explanation:this is correct because got it right on the test.
Multitasking systems _____.
are easier to develop than single programming systems
execute each job faster
execute more jobs at the same time
are used only in large mainframe computers
Answer: Multitasking systems execute more jobs at the same time, hence the name multitasking systems.
Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:
Answer:
participle is singing
word it modifies is voice
The introduction of the 8-bit computer expanded the number of bytes available for encoding. This led to the development of
Answer: It's D: Unicode on Edge
Explanation:
In the late ’80s, developers from Xerox and Apple worked on the explicit goal of unifying the various encoding systems into one universal character set. The result is Unicode, a character encoding system that can represent text written in all of the world’s languages and scripts. Unicode assigns a unique code point, an integer value denoted in base 16, to each character in the world’s languages. Applications such as web browsers or word processors “read” the Unicode, and then render the correct character according to the application’s own programming for font, size, and style.
How might you develop a game where players need strong twitch skills in a way that still makes the game fun for players of all skill levels and abilities?
Answer:
here ya go
Explanation:
I would suggest either having a default difficult being easy, and if people want to be challenged they can increase it, or try to balance how much of the game requires strong twitch skills.
The students start the school year with the same number of crayons and markers in their supply boxes. They count the number of these supplies remaining at the end of the school year. Here is a bar chart showing the data the students collected. Predict the three colors of crayons and markers the class will use the most next year.
Answer:
Hello :P AAAAAAAAAAAAAAAAAAAAAAAAA
Match each of the following terms to its definition: I. web-based II. open source III. project management IV. personal information manager V. proprietary A. software used to keep track of appointments B. software that is hosted on a website C. software used to track tasks and coordinate resources D. software which must be purchased E. software code that is freely available
Answer:
A. Personal information manager.
B. Web-based.
C. Project management.
D. Proprietary.
E. Open source.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
Simply stated, it is a computer program or application that comprises of sets of code for performing specific tasks on the system.
Basically, softwares are categorized into the following categories;
A. Personal information manager: software used to keep track of appointments. It can be used to schedule and manage schedules easily.
B. Web-based: software that is hosted on a website. It works based on cloud computing services and as such requires the use of internet for use at all times.
C. Project management: software used to track tasks and coordinate resources.
D. Proprietary: software which must be purchased. It also known as a closed-source software and can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.
Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.
E. Open source: software code that is freely available. It is typically published as a free software that may be downloaded on various platforms by the end users.
Following is the matched solution for the given question.
I. Web-based - B. software that is hosted on a websiteII. Open source - E. software code that is freely availableIII. Project management - C. software used to track tasks and coordinate resourcesIV. Personal information manager - A. software used to keep track of appointmentsV. Proprietary - D. software which must be purchased.I. Web-based software refers to applications or programs that are accessed and used through a web browser. Instead of being installed on individual computers, the software is hosted on a server and accessed remotely over the internet.
II. Open source software refers to software whose source code is made available to the public. It can be freely used, modified, and distributed by anyone.
III. Project management software is designed to help teams and individuals manage projects efficiently. It assists in planning, organizing, and tracking tasks, resources, and timelines.
IV. Personal information manager (PIM) software is used to organize personal information such as appointments, contacts, notes, and tasks. It helps individuals manage their schedules, track important dates, and maintain personal productivity.
V. Proprietary software refers to software that is privately owned and controlled by a company or individual. It is typically distributed under licensing agreements, and users must purchase or obtain the necessary licenses to use the software.
Learn more about web-based software here:
brainly.com/question/4560046
#SPJ6
Hardware failure, power outages, and DOS attacks will affect:
data confidentiality.
data integrity.
data verification.
data availability.
Answer:
The answer should be data availability
Which of these devices features D-pads and analog sticks? ASAP PLEASE
A. smartphones
B. portable consoles
c. PDAS
D. feature phones
E. tablets
Answer:
b. portable consoles
Explanation:
hope that helps :)
Answer:
b - portable consoles
Explanation:
PLATO
Write a recursive method named editDistance that accepts string parameters s1 and s2 and returns the "edit distance" between the two strings as an integer. Edit distance (also called Levenshtein distance) is defined as the minimum number of "changes" required to get from s1 to s2 or vice versa. A "change" can be defined as a) inserting a character, b) deleting a character, or c) changing a character to a different character. Call Value Returned editDistance("driving", "diving") 1 editDistance("debate", "irate") 3 editDistance("football", "cookies") 6
Answer:
Explanation:
The following code takes in the two parameters s1 and s2 and returns the Levenshtein distance of the two strings passed.
def editDistance(s1, s2):
m = len(s1) + 1
n = len(s2) + 1
arr = {}
for x in range(m):
arr[x, 0] = x
for y in range(n):
arr[0, y] = y
for x in range(1, m):
for y in range(1, n):
proc = 0 if s1[x - 1] == s2[y - 1] else 1
arr[x, y] = min(arr[x, y - 1] + 1, arr[x - 1, y] + 1, arr[x - 1, y - 1] + proc)
return arr[x, y]
what is a flowchart and write it's work
Answer: A flowchart is a type of diagram that represents an algorithm, workflow or process. The flowchart shows the steps as boxes of various kinds, and their order by connecting the boxes with arrows. ... Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.
Explanation: brainliest plz!
Examine the weather map.
A weather map of the United notes. The following are shown on the map: major cities with high and low temperatures; high and low pressure systems; types of precipitation, fronts.
Which weather forecast would be accurate based on this weather map?
Rain is expected in Billings.
It will be cold in Atlanta.
Miami will have sunny weather.
Minneapolis will be stormy.
Answer:
A. Rain is expected in Billings.
Explanation:
Rain is expected in Billings would be accurate based on this weather map.
What is Weather map?
A weather map is a map of the world or a portion of it that uses symbols to depict the weather conditions at a given time, including temperature, pressure, wind speed and direction, humidity, clouds, visibility, and type and amount of precipitation.
The trained observers record the temperature, pressure, wind speed and direction, cloud cover, and precipitation amounts in observatories and meteorological stations. Using symbols, these observations are entered on a weather map. '
'
As a result, a weather map shows the weather factors for a region at a specific time that are denoted with recorded symbols. It makes the current weather conditions clear.
Therefore, Rain is expected in Billings would be accurate based on this weather map.
To learn more about weather map, refer to the link:
https://brainly.com/question/1674348
#SPJ3
A style sheet consists of CSS ______________________ that specify the layout and format properties to apply to an element. *
so the word your looking for is Properties so it would be
A style sheet consists of CSS Properties that specify the layout and format properties to apply to an element. *
scav
 Someone plzzz help !
Can you use 2 wireless keyboards and 2 wireless mouse on a dual monitor desktop without interfering with the other monitor ?
Answer:
Good luck
Explanation:
You might find a software but normally you'd need two different OS's but it might be possible if you go under mouse and keyboard settings but it's highly unlikely you'll find what you're looking for there
test unit 8 edhesive answers
A security hole is a(n): Group of answer choices packet-level firewall small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system
Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
Explanation:
A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.
Hardware refers to programs and protocols used on a computer system.
True
False
Answer:
False
Explanation:
Answer:
false
Explanation:
i JUST took the quiz
Which of these are characteristics of a Python data type? Check all that apply.
A Python data type is weakly typed.
A Python data type can have numeric values.
A Python data type can be shown by keys and values within brackets [ ].
A Python data type must be stated before it can be used in a program.
A Python data type can be a string, a list, or a tuple with items that can be repeated using the asterisk ( * ).
A Python data type can be a dictionary that can be updated, changed, or removed.
A Python data type cannot have connecting sets of characters separated by commas.
Answer:
A Python data type is weakly typed.A Python data type can have numeric values.A Python data type can be shown by keys and values within brackets [ ].A Python data type can be a string, a list, or a tuple with items that can be repeated using the asterisk ( * ). A Python data type can be a dictionary that can be updated, changed, or removed.Which pieces of information does the National Weather Service produce?
simple maps
newspaper maps
long-range forecasts
maps with isothermsHow are computers used in producing weather forecasts?
They compile data from multiple instruments.
They collect air temperature and air pressure data.
They eliminate the need for human meteorologists.
They transmit data on developing weather systems from space.
Answer:
1. maps with isotherms
2. They compile data from multiple instruments.
Explanation:
The pieces of information that the National Weather Service produces are "maps with isotherms". These pieces of information depict the range of temperature and pressure occurring on the surface of the earth. Thereby providing a weather forecast that predicts the future occurrence of climate changes, which is then used to protect and enhance the lives of Americans.
Computers " compile data from multiple instruments" in producing weather forecasts. Instruments such as anemometer, wind vane, pressure sensor, thermometer, hygrometer, and rain gauge. The computer then uses specific mathematical equations to predict the weather or climate change.
Use the drop-down menus to match each description with the part of a report where it is located.
named moons in the solar system:
page number printed at the bottom of page 1:
page number printed at the bottom of page 20:
group of data titled “Hawks” in a report on species of migrating birds:
report titled “Technology in the Workplace”:
calculation printed beneath a group of data:
date of a report printed at the top of pages 2–100:
Answer:
1) Detail
2) Report footer
3) Page footer
4) Group Header
5) Report header
6) Group footer
7) Page header
Explanation:
I just did the assignment
Suppose cell C5 contains the formula =B$6+C1.
Match each formula with its respective cell if you copied it.
=A$6+B4 =B$6+C6 =C$6+D2 =D$6+E1
Thank you, have a great week.
Answer:
=A$6+B4 will be in B8
=B$6+C6 will be in C10
=C$6+D2 will be in D6
=D$6+E1 will be in E5
Explanation:
$ sign is used to lock a certain column or row value, with the $ sign we can create an absolute reference which will remain unchanged as we copy our formula from one cell to another.
As formulars are copied, the references change respectively.
With =B$6+C1 in C5 ; As we move up or down of cell C5, only the row numbers will change that is formula in C6 becomes =B$6+C2.
As we move left and right, the column alphabet will also experience change like the rows did.
Only the absolute reference won't change no matter the direction.
Hence,
=A$6+B4 ; A and B means one move to the left of C5 and 4 signifies, 3 moves downward of C5 that gives B8
=B$6+C6 ; B and C means no horizontal change, 6 means 5 moves downward of C5 which gives C10
=C$6+D2 ; C and D means 1 move to the right and 2 means one move downward of C5 which gives D6
=D$6+E1 ; D and E means 2 moves to the right and 1 means no vertical change from C5 ; which gives E5