Sign In
Ask Question
Computers & Technology
Drake Hooper
Select the correct answer. Ryan received an email from a person claiming that he is an employee of the bank in which Ryan has a bank account. He asks Ryan for his account number and online banking password to verify certain details of Ryan's account. Ryan gives him the required details. A day later, when Ryan goes online to perform certain transactions, he sees that his account balance is zero. Which method did the hacker use to hack Ryan's account? A. social engineering B. DoS C. spoofing D. sniffing
Answer
Answers (2)
Computers & Technology
Alivia Morse
An open system consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system. A. Management systemB. Reputation systemC. Knowledge systemD. Open system
Answer
Answers (1)
Computers & Technology
Makaila Lambert
Write the statement that includes a friend function named before in the class dateType that takes as parameters two objects of type dateType and returns true if the date represented by the first object comes before the date represented by the second object; otherwise, the function returns false.
Answer
Answers (1)
Computers & Technology
Daniela
A network needs to be set up with 60 subnets. Given the IPv4 class C address 192.168.100.0, what subnet mask value should be used? How many useable hosts can be in each subnet?
Answer
Answers (1)
Computers & Technology
Phoenix Curtis
Which of the following refers to text or graphics in a document that is linked to
another document location, file, or web page?
Choose the answer:
•bookmark
•hyperlink
•hidden text
•formatting mark
Answer
Answers (1)
Computers & Technology
Morgan Gibbs
Your program must define and call the following function that returns the number of times the input character appears in the input string. int CountCharacters (char userChar, string userString)
Answer
Answers (1)
Computers & Technology
Nico Bush
What can you conclude when you use Six Sigma and get a Four Sigma rating. Which rating would be applicable?
Answer
Answers (1)
Computers & Technology
Slinky
A cross-platform application is one that runs in what way?
Answer
Answers (1)
Computers & Technology
Emery Downs
An Al system provides grape growers with recommendations regarding pest management and fertilization. To which field does the application
belong?
A
computer vision
B.
video game
speech recognition
D. natural language processing
E. expert system
Answer
Answers (1)
Computers & Technology
Marlene Small
True or false: offset printing has more expensive start up costs than than a digital printing system
Answer
Answers (1)
Computers & Technology
Angelica Sheppard
What is the purpose of an internet protocol address (ip address) ?
Answer
Answers (1)
Computers & Technology
Rylie Hodges
A system developer needs to provide machine-to-machine interface between an application and a database server in the production enviroment. This interface will exchange data once per day. Which of the following access controll account practices would BESt be used in this situation?
a. Establish a privileged interface group and apply read - write permission. to the members of that group.
b. Submit a request for account privilege escalation when the data needs to be transferred
c. Install the application and database on the same server and add the interface to the local administrator group.
d. Use a service account and prohibit users from accessing this account for development work
Answer
Answers (1)
Computers & Technology
Sammy Whitehead
An army sergeant works as a tryna surgeon. which two type career cluster is he mist likely part of
Answer
Answers (1)
Computers & Technology
Urijah Horn
In Design view, how many rows per line can be created? A. Two B. Three C. An unlimited number D. One
Answer
Answers (2)
Computers & Technology
Ball
Assume that name is a variable of type String that has been assigned a value. Write an expression whose value is the first character of the value of name.
Answer
Answers (1)
More
1
...
175
176
177
178
179
...
Home
»
Computers & Technology
» Page 177
Sign In
Sign Up
Forgot Password?