Answer:
It is used for the title of a page or post
you receive a text from your boss, who’s on vacation. it says she can’t connect to the network and urgently needs you to send a file using an enclosed link. what type of social engineering attack is being used here?
The type of social engineering attack that is being used here is phishing. It exploits human errors.
Phishing is a type of social engineering attack that requires human errors to obtain credentials and/or spread malicious malware.
This type of attack (phishing) represents the most common type of social engineering attack.
Phishing generally involves email attachment files or links that are infected with malicious malware.
Learn more about phishing here:
https://brainly.com/question/23021587
how to connect apple pencil 2 to ipad 8th generation?
Answer:
That pencil doesn't adjust to that ipad because those two aren't compatible
Explanation:
Please help please help
Answer:
Bonjour,
Vraiment superbe idée, mais (eh eh, désolé) pour la version en ligne cela ne marche pas avec Brunoy par exemple en gare d’arrivée (j’ai même l’impression que ce n’est que pour les grandes lignes, pas pour notre pôvre petit RED D) et avec un peu moins de surprise, seule l’année 2014 peut être choisie.
Je profite donc de ce billet pour économiser 0.34€/min si vous pouvez avoir l’information de la durée de rétention des objets trouvés…
Merci
Bien cordialement
Az
ExplanationBonjour,
Vraiment superbe idée, mais (eh eh, désolé) pour la version en ligne cela ne marche pas avec Brunoy par exemple en gare d’arrivée (j’ai même l’impression que ce n’est que pour les grandes lignes, pas pour notre pôvre petit RED D) et avec un peu moins de surprise, seule l’année 2014 peut être choisie.
Je profite donc de ce billet pour économiser 0.34€/min si vous pouvez avoir l’information de la durée de rétention des objets trouvés…
Merci
Bien cordialement
Az:
Very few games have any sort of narrative, not even a simple one that involves setting the mood through color, sound, environment, and game mechanics.
A.
True
B.
False
Answer:
B. False
Explanation:
Numerous amount of games have narrative, there is an entire genres built around narratives. Any RPG game has a narrative and even bog standard FPS games have some sort of backstory and effects setting a mood.
What is this on G00gel Documents , how do I fix it?
Answer:
Sorry but it donest show the picture
Explanation:
what is meant by formatting the presentation?
It's deciding how things look. If you are on powerpoint you would choose the text style and colors and organize your information how you would like. If you were giving a speech you would decide what order your information is in.
computer science
describe 3 differences between the checksum and check digit:
Answer:
A check digit, also known as a checksum character, is the number located on the far right side of a bar code. The purpose of a check digit is to verify that the information on the barcode has been entered correctly.
A check digit, even comprehended as a checksum character, stands for the number found on the far right side of a bar code. The intention of a check digit exists to confirm that the information on the barcode contains been documented accurately.
What are the differences between the checksum and check digit?A checksum in public can be any size, although generally, they exist some suitable number of bits for computation, such as 32. The more extensive the checksum, the wider the range of errors it can capture. For instance, the checksum utilized for credit card numbers will notice changed digits that exist after each other, but not reversed digits that exist split by a single digit.
All cryptographic hashes (like MD5, SHA, etc.) can be utilized as checksums, but not all checksums exist cryptographic. CRC-type checksums aren’t cryptographic, but they’re extremely quick to calculate, and so they exist generally utilized for things like hard drive checksums where you don’t require the cryptographic functionality, but you accomplish want to notice an extensive range of probable errors.
To learn more about checksum and check digit
https://brainly.com/question/14789699
#SPJ2
which function would you use to change the appearance of data in a cell from decimal to percentage
Answer: use the numbers behind the decimal for the percentage
Explanation:
Answer:format
Explanation: I took the test
Which of the following described a global network connecting billions of computers and other
devices?
A) WiFi
B
ISP
C
World Wide Web
D
Internet
2. It serves as the foundation of all crochet work. a. Chain stitch C. double treble b. Treble stitch d. slip stitch
Answer:
a. chain stitch
because the foundation of so many crochet patterns involved a chain of × stitches followed by working sc/dc into the chain
WHEN IS THE DESIGN PROCESS FINISHED IN ENGINEERING?
Answer:
I think answers is it never ends
Think about a career you would like to have 10 years from now.
What role does technology play into this career?
Why is technology beneficial?
Will mark brainliest
Answer: Scientist
Explanation: Scientists use technology to record data, as well as using technology to study different things, for example scientists use computers to track DNA.
How has A.I. evolved and helped humanity in recent times?
Answer:
AI has helped many people in these days.
Explanation:
With AI adoption on the rise, the technology is addressing a number of global challenges.
Artificial intelligence is being used to help crack down on illegal activities.
It is helping to tackle over fishing in our ocean.
And it is even being used to address the issue of gender imbalance.
how many 2/8 pound patties can she make from 7/8 of a pound of hamburger
Answer:
3/8
Explanation:
Because 2 can't go into 7, the next best thing is 6, so 2x3 is 6 with 1/8 left over~~~~~hope this helps :) pls brainlist
This is an image of the ...................... Topology. * If you get it right i will mark you brainlist
Answer:
Tree
Explanation:
What are the two main types of software
Answer:
System software and application software
Explanation:
The navigation items for a Lightning app are available on mobile: A. In a special mobile configuration in the navigation menu and in Favorites B. In the profile menu, when in the app C. In the navigation menu and the first four items of the navigation bar, when users are in the app D. In the App Launcher Check the Quiz to Earn 100 Points
Navigation items are used for moving from one part of the part to a destination using actions and also for passing information. The right option is C. In the navigation menu and the first four items of the navigation bar, when users are in the app
There are different methods/ways to implement the Navigation component in a mobile application, we have the following type of Navigation Implementation
Bottom NavigationDrawer Navigation(Slides from Left to right)Top NavigationLearn more about Navigation here:
https://brainly.com/question/8908486
6. Which devices of computer is known processing devices? las >
Answer:
CPU is known as processing devices..!
16. If a user can make modifications to database objects, what permission has that
user been assigned?
A. Update
B. Alter
C. Create
D. Select
B
Explanation:
The Alter command is used when we want to modify a database or object contain in database.
which computer language uses short words known as mnemonics for writing programs?
in addition to good design sense, what else do web designers need to be proficient in?
Web designers need to be proficient in Front-end coding languages in addition to good design sense.
Web designers build or redesign websites. They understand what it takes to make a website functional and easy to use, but also understand what is needed to make it aesthetically appealing to the user.
Web designers need to be proficient in Front-end coding languages in addition to good design sense.
Find out more on web design at: https://brainly.com/question/8391970
Describe the function of memory and
processing unit of Computer system
Answer:
Computer memory is a temporary storage area. It holds the data and instructions that the Central Processing Unit (CPU) needs. ... This allows the CPU direct access to the computer program. Memory is needed in all computers.
Explanation:
hope it help
10. What Microsoft program is frequently used to develop pictorial representations
of a database's logical relationships?
A. Visio
B. Access
C. Excel
D. Word
Answer:
A. Visio
It's a "powerful tool for diagramming needs". In other words, pictures.
A professional is someone who uses education and acquired skills to earn money in a career.
Question 10 options:
True
False
Sort the layout options for two types of masters in PowerPoint.
Answer:
The program photo is showing the correct answers and the correct place for the two that you missed.
Explanation:
Answer: ANSWER IS SHOWN CORRECTLY
Explanation:
I REALLY HOPE IT HELPS YOU!!!!!!!!!!!!!
THANK YOU & BE SAFE TOO!!!!!!!!!!!!!!!
Axel is conducting some online research, and he wants to narrow down his search to a specific date
range, and he only wants to find images. What should he use?
O quotations
O a Boolean search
O truncation of terms
O filters
Answer:
filters
Explanation:
you use filters to specify what you want to find
(01.02
High-level programming languages are used to write a wide variety of programs, like
operating systems, scientific modeling, and general applications.
True
False
Answer:
ture
Explanation:
hope it help u
What is the default folder for text file
documents or download
It depends where you install it to
Answer:
numbers are stored as characters
Explanation:
currently saved in if another folder
If you are in the Slide Master view, what are the steps to add headers and footers?
Answer:
THat is the correct order.
Explanation:
Shadow and highlight create depth (3D).
TRUE OR FALSE
Answer:
true because then it would be like not popping out