Match the terms with their definitions

Match The Terms With Their Definitions

Answers

Answer 1

Answer:

Malware goes with the third definition, single sign-on goes to the fourth definition, phishing goes to the second definition, and clickjacking goes to the first definition.

Hope this helps! :)

Answer 2
Malware = a term used for software designed to damage your computer or steal your personal information

Single sign-on = when you use a single credential to log into multiple websites

Phishing = when random links mislead you into giving your password or other vital information to an unscrupulous website or person

Clickjacking = when you unknowingly click a malicious link, thinking it to be a legitimate link
:)

Related Questions

hey plz help, and thanks

Answers

Answer:D im pretty sure

Explanation:im sorry if get it wrong So sorry ok just sorry

D maybe??? Sorry if it’s wrong

What is the first thing animators need to determine when beginning a project?



a Editing locations



b Length of the film or project



c Setting



d Characters

Answers

Answer:c

Explanation:

What are the two negative impacts of computer technology to the society?​

Answers

One negative is that people are getting very impatient. This is because people are getting used to things instantly coming up onto their screens. Another negative is that people are being manipulated more easily. Nowadays anyone can be an expert if they sound smart enough. Then they can spread their lies quickly to millions of people.

Website designers work on the code and programming of a website, not the style or layout of the site.

Answers

Answer:

False

Explanation:

Website designers design how the site looks not works

A student who might find digital learning challenging.

Answers

Digital learning exists mostly online, while traditional learning takes place in a classroom building.

Answer: it is "A"

|Likes meeting other students.|

heeeeelp
and thank you

Answers

Answer:

2375 calories

Explanation:

125% of 1900=2375 calories

Answer:

2375 calories

Explanation:

it's asking for 125% which is the same as 100% + 25%

100% is 1900

25% of 1900 is 475

1900 + 475 is 2375

Describe the history of computer in Nepal.​

Answers

Answer:

The first computer brought in Nepal was IBM 1401 which was brought by the government in lease for the population census of 1972 (2028 BS). Later in 1975 (2031 BS)YantrikSarinikaran Kendra (Electronic Data Processing Centre) was established which was later called as National Computer Centre ( NCC )

Answer:

The first computer brought in Nepal was IBM 1401 which was brought by the government in lease for the population census of 1972 (2028 BS). Later in 1975 (2031 BS)YantrikSarinikaran Kendra (Electronic Data Processing Centre) was established which was later called as National Computer Centre ( NCC )

Explanation:

if this answer is correct please make as brainlelist

how are web design & web development different from each other?

Answers

Answer:

Developers are people who build a website's core structure using coding languages, while designers are more visually creative and user-focused. Developers use their programming knowledge to breathe life into the designer’s creative vision.

You could think of developers as construction workers, and web designers as architects – both necessary, but different, skill sets.

I hope this helped :D

Explanation:

Choose the term that completes the sentence.
A bubble (sort/function/search) starts by comparing the first item in the list to the rest of the items.

If the first one is greater than a later item, the items are swapped.

Answers

Answer: BUBBLE SORT

I hope I've been helpful to you.

Answer:

Sort

Explanation:

I Answered this in Edge.nuity and it was correct

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network

Answers

Answer: vulnerability scanners

Explanation:

The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.

Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.

Kris is the project manager for a large software company. Which part of project management describes the overall project in detail?

1) Analysis report

2) Resources document

3) Scope

4) Scope creep

Answers

The answer is 2), good luck.

Answer:

Scope or 3)

hope this helps

always love to be marked brainliest

Can you please help me with the AP Computer Science Fill in the blank. What goes on number 5 8 and 18. I don’t understand this I need help programming.

Answers

Answer:

you can probably just delete them. what programming language is this?

You’ve been tossed into an insane asylum. What do you tell the people there to prove to them that you don’t belong inside?

Answers

Was this a question on an assignment or are you in an asylum right now

An asylum is for crazy people. I'm crazy. Crazy people don't realize they're crazy. If I realize I'm crazy, then I'm not crazy. Therefore, I do not belong here.

what class are you in?
can you help me in connection?

Answers

Answer:personal computer:)

Explanation:

Assume that x and y are boolean variables and have been properly initialized. !(x || y) || (x || y) The result of evaluating the expression above is best described as:

Answers

Answer:

The answer is "Always true "

Explanation:

Following are the program to this question:

#include <iostream>//header file

using namespace std;

int main()//main method

{

bool x=true;//defining bool variable x and assign value

bool y=false;//defining bool variable y and assign value

if(!(x || y) || (x || y))//use given condition with if block

{

   cout<<"True";//print true message

}

else//defining else block

{

   cout<<"false";//print false message

}

   return 0;

}

In the above code two bool variable is declared, that hold ture and false, and used in the given expression with the condition statement, that checks the given value. In the code the logical gate OR gate that always print the true value.

Grades are numbers or ________ that show how a student performed in a course.

Answers

It’s either letters or percentages

Submit a paragraph about how people earn income online.

Answers

Answer:

Selling services or products, generating traffic for ad revenue or investing in different types of products / companies.

Explanation:

is it just me or do people delete other peoples questions and it shows up in my inbox staying its mine

Answers

Answer:

yessss same bru.h

Explanation:

Answer:

ive had that happen before i dont know why it happens

WHY DOES THIS HAPPEN!?!??!?

Answers

Answer:

whats the qeustain?

Explanation:

How can you make the drawing tools contextual tab appear

Answers

Answer:

C. place the insertion point in any text in the text box.

Typically, the Ribbon contains the Draw tab. Here's how to add it, though, if you can't see it on yours. Customize the ribbon by selecting it with the right mouse click. Click OK after selecting the checkbox next to draw. Thus, option C is correct.

What make the drawing tools contextual tab appear?

If your Draw Tools are hidden, you can reveal them by bringing up the View menu, selecting Toolbars, and then selecting Drawing. Look at the Draw Tools' features for a bit.

When you click outside these objects, the tools in the contextual tabs are put away, giving you the options and resources you need to deal with them.

Clicking on the item causes the tab to reappear, and you can get them back. Your workspace remains uncluttered as a result.

Therefore, place the insertion point in any text in the text box.

Learn more contextual tab about  here:

https://brainly.com/question/14139335

#SPJ2

Write 5-7 sentences about your own personal observations in which you have been part of a "filter". You might have experienced this is in your Twitter feed, specific advertisements, or your search engine results. Be specific.

Answers

Answer:

Answered below.

Explanation:

I made a search for a product on an online grocery store. The search results came in and I bought the product. On subsequent visits to the grocery store website or on browsing other sites, I had special advertisements pop up. These advertisements were suggesting products to me similar to the one I bought on the grocery store. It was a targeted advertisement that had been sent based on my recent searches and purchases on the site. So I knew that was a filter.

HELP PLZZ Which statement is true? Select 3 options.


A. A function must have a return value.

B. A function can use variables as parameters.

C. The definition of a function must come before where the function is used.

D. The definition of a function can come before or after it is used.

E. A function can have more than one parameter.

Answers

Answer:

B. C. E.

hope this helps :D

Answer:

The definition of a function must come before where the function is used.

A function can have more than one parameter.

A function can use variables as parameters.

Explanation:

"Jan23" can be stored using which data type? O an alphanumeric string O a boolean operator o characters floating point numbers​

Answers

Answer:

Alphanumeric string

Explanation:

Answer:

a. an alphanumeric string

Explanation:

got it right on edge

What are specific and relevant terms that will help you locate information using an internet search engine?

A: Keywords

B: Search Words

C: Smart Words

D: Unusual Words

please help me!!​

Answers

I would say A:keywords

Hope this helps

I’m sorry if this is wrong

Have a great day/night

Answer:

keyword

Explanation:

i got it right

Why would it be useful to split up the coding for creating an app between multiple programmers? Select 2 options.

greater innovation

greater control over the code.

faster development.

greater consistency between sections of code.

Answers

Answer: c

Explanation:

Answer:

I'd be willing to wager it is A and D but not 100% sure.

Explanation:

I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I try to check it, it comes up with a Traceback error.

My code:

b = float(input("Enter Temperature: "))

Traceback (most recent call last):
File "./prog.py", line 7, in
EOFError: EOF when reading a line

Answers

Answer:

The error is because you wrapped the input in float. First record the input and then modify it.

Explanation:

b =  input("enter temp:")

b = float(b)

help plz (will give brainliest)

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This is the python program in the question that is:

def sum(n1,n2):

n=n1+n2

return n

The question is: write a function CALL that displays the return value on the screen.

So, the correct program is written below:

*********************************************************************  

def sum(n1,n2):# it is function that define sum

 n=n1+n2 # variable n that store the result of n1 and n2

 return n # return the result

print(sum(3,5))# call the sum function with parameter 3 and 5 , it will print 8

print(sum(4,101))

# call the sum function with parameter 4 and 101 it will print 105

********************************************************************************

you can also store the sum result into another variable, because this function return the sum. So, you can store that return value into another vairable and using the print function, to print the value of this variable such as:

*****************************************************************************

def sum(n1,n2):# it is function that define sum

n=n1+n2 # variable n that store the result of n1 and n2

return n # return the result

result= sum(6,9) # store the sum result into another variable i.e result

print(result)# print the result variable value

*****************************************************************************

Users of a _____ database have access through their personal computers linked to local or wide area networks

Answers

Answer:

Company

Explanation:

A company database is a database of a firm or organization that contains the information about the firm's employees, their products, services, and as well their client's and customers' details.

This is often kept on the main database server and arranged and organized by a database administrator.

Hence, Users of a COMPANY database have access through their personal computers linked to local or wide area networks

Which tab in MS Word would you select to insert a shape into a document? Question 6 options: Insert Review View File

Answers

Answer:

Insert

Explanation:

Under the insert tab, shapes will be an option to put in under the illustrations category.

Answer:

um insert?

Explanation:

im assuming its insert bc you said "to insert a shape into a document" so yh

i hope this helped?

What is the answer to 4.9 Code Practice: Question 2

Answers

Answer:

sum = 0

for i in range(20, 100, 10):

sum = sum + i

Print(sum)

Explanation:

The answer to 4.9 Code Practice: Question 2 is 200  of the total output.

What is the output?

An output record that a laptop sends. Computers best paintings with virtual information. Any entry that a laptop gets have to be digitised. Often records must be transformed and returned to an analogue layout whilst it is output, as an instance the sound from a laptop's speakers.

The answer to 4.9 Code Practice: Question 2 is 200 output of all the total outputs this is the answer.

Read more about the Code :

https://brainly.com/question/3653791

#SPJ2

Other Questions
simplifyyyyyyyyyyyyyyyyyy 9.6x10^85/3x10^63 in scientific notation The measure of an angle is 26. What is the measure of its complementary angle? Five minus one fourth Justin is teaching young children to play soccer. Each time they make a good move, he praises them.. In this scenario, Justin is training the children by _________. The children all scored well on the spelling. Read the following dream interpretation and answer the question that follows."I suspect that the patient's dream of being chased originates from his unresolved feelings of guilt during childhood."What perspective of dream interpretation is being offered?A. FreudianB. activation-synthesisC. JungianD. motivation HURRY IM TIMED ON THIS PLZ HURRY!!! Which sentence would most likely be found in a cause-and-effect text?O The US quarter is a popular coin that comes in many varieties.O By saving money over time, kids can afford big purchases.O Coin collecting is a popular hobby for people of all ages.O The Lincoln penny was the first example of a presidential coin. Miguel and three of his friends went to the movies. They originally had a total of $40. Each boy had the same amount of money and spent $7.50 on a ticket. How much money did each boy have left after buying his ticket?Write and solve an equation that represents the situation. given braninstwhen did Anderson return to raise the u.s. flag once again over fort sumter need this done quick pls If you start with 3 moles of sodium and 3 moles of chlorine to produce sodium chloride, what is the limiting reagent?(You will need to balancethe equation first.)Na + Cl2 -> NaCl A. They are equal B. Na C. Cl2 D. NaCl HELP!!! STATS!!! A random sample of 100 felony trials showed a sample mean waiting time between arrest and trial = 173 days with a population standard deviation of waiting times = 28 days. Find a 99% confidence interval for the population mean waiting time.Stats question, I'm really stck please help me! Maggie is participating in her school reading challenge. She reads 80 books in 6 months. If 40 of the books are fiction, then what percent of the books that she read are fiction? Kris's bike used up 4.5 gallons of gas to cover a distance of 297 miles.Jack travels 366 miles on a full tank capacity of 6 gallons.Ben's bike consumed 5.2 gallons of gas for a 265.2 miles long drive. Whose bike gave the best mileage In science why is it important to explain why the evidence supports your claim? 8. Lisa types 6 pages in 36 minutes. Frank types 5 pages in 30 minutes. Do they type at the same rate? Use a proportion to explain. When grey wolves were reintroduced back into Yellowstone Please help me thanks please