You watch a movie where a secret agent puts a small device on a telephone line so that they can
listen to conversations between two other people. This is an example of:
O snooping.
O social engineering.
O wiretapping
O data confidentiality.

Answers

Answer 1

Answer:

wiretapping

have a good day :)


Related Questions

Your configuration specifies to merge with the ref.

Answers

Explanation:

In my case, my local branch and remote branch had different capitalization.

To resolve this I deleted my local branch $ git branch -d branch-name, then checked out the remote branch again using $ git fetch and $ git checkout Branch-name.

Why, during the final stage of the multistage model for e-commerce, is comprehensive customer information captured in the supplier's database

Answers

The reason why, in the final stage of the model for e-commerce, to captured in the supplier's database is  because it hasten customer service after an order had been delivery.

What is e-commerce?

The word electronic commerce  is often known as e-commerce. It is a term that connote a type of business model that gives room for firms and people to buy and sell goods and services using the Internet.

Note that the reason why during the final stage of the multistage model for e-commerce, a comprehensive customer information captured in the supplier's database is important because it boast or make faster customer service when an order have been delivery.

Learn more about  e-commerce from

https://brainly.com/question/23369154

Write a statement that defines a Product structure variable named chips.

Answers

The statement that declares the variable using the  Product structure is: Product chips;

How to define the structure variable?

The product structure definition is given as:

Product {

.........

};

To declare a variable named chips, we use the following syntax:

Structure-name Variable-name;

The structure name is Product and the variable name is chips

Hence, the statement that declares the variable is: Product chips;

Read more about variables at:

https://brainly.com/question/15683939

Computer-aided design software is used by ________.

Answers

Answer:

by Architects?

Explanation:

not sure

While shopping for new computers for his photography studio, Mel paid close
attention to select computers with a lot of RAM, or internal memory, to run software
and data. What is he MOST LIKELY trying to do for his post-production editing
process?
A. make it more organized and constrictive

B. make it faster and more efficient

C. make it slower and less efficient

D. make it more complicated and arduous

Answers

Answer:

b make it faster and more efficient

_____is an early-stage software acceptance testing; performed to identify possible issues/bugs before showing the product to everyday users or the general public

Answers

I’d say alpha/beta testing

PLEASE HURRY ITS DUE TODAY AND DO NOT GIVE ME NO ANSWERS

1. What would be the best material to make a backpack?

A. wood

B. reinforced paper fibers

C. canvas

D. plastic

2. Is a design brief necessary in researching problems?

A. no

B. yes

3. How many types of research are used

A. one

B. two

C. Three

D. Four

E. Five

F. there is no set number

4. Research is a _________? Multiply choice

A. conclusion

B. process

C. variable

D. report

5. Which of the following is "not" a part of the research process?

A. list the problem

B. gather data

C. make a prototype

D. analyze the data

E. make a conclusion

Answers

Answer:

(c) canvas(b) yesN/A(c) variable(c) making a prototype i think

please correct me if im wrong

1. What is the difference between background sound and nat sound

Answers

Answer:

Well the background sound is the sound of course in the background and the nat sound is the curremt sound

Explanation:

Influencers are trusted above many other information sources because of their perceived ______ and ______.

Answers

Influencers are trusted above many other information sources because of their perceived  Authenticity  and Transparency.

Who is an influencer?

An influencer is known as a person that does the work of exerting their influence on a product or services.

Note that they help or act as guides or they inspire the actions of others and as such Influencers are trusted with lots of information sources because of their perceived  Authenticity  and Transparency.

See options below

Influencers are trusted above many other information sources because of their perceived ______ and ______.

a. Authenticity.

b. Transparency.

c. Expertise.

d. A & B.

e. A & C.

Learn more about Influencers from

https://brainly.com/question/26242633

Can we use a data type as a condition in C++?
For example, if a user enters a number in a string input user prompt, it executes a certain set of instructions(code). Because when I enter a number instead of a character in the terminal, it skips all cin inputs and keeps printing cout until the end of the code.

Answers

No you can’t use a data type as a condition but you can use function overloading or templates to attempt to bypass this.

When heading styles have been applied to a document, the user has the option to navigate through the document using which tab on the navigation pane?.

Answers

When heading styles have been applied the user can nagivigate documents using the Headings tab

What is mearnt by the term Navigation?

In Computing, navigation is use to mean routing or moving from one screen or one page on a website to another.

There are different types of navigation depending on the use case, they are:

Drawer NagivigationBottom NavigationTab Navigation etc.

Learn more about Navigation here:

https://brainly.com/question/2191665

#SPJ2

Which osi layer is responsible for setting up, maintaining, and ending ongoing information exchanges across a network

Answers

So the network is really important you get pairs about 100k a year to make you start network is to be nice

Your colleague is asking about a storage device that uses flash memory chips but doesn't use magnetic platters. What type of device is he asking about

Answers

Answer:

solid state drive or SSD

Explanation:

They use flash memory called NAND

original equipment manufacturer (OEM) software, that can typically be used to cut
and paste, crop, enlarge, and retouch your images?

A. third-party software
B. proprietary software
C. user-friendly software
D. external watermark software

Answers

Since it's OEM most likely Its B

What type of task can be defined to allow you fine-grained control over the management tasks a user can perform in an OU

Answers

The type of task can be defined to allow you fine-grained control over the management tasks a user can perform in an OU is custom.

What is custom priority in Outlook tasks?

Outlook is known to have a  New Tasks window that often shows a created-in Priority field that has  Low, Normal, and High setting.

This setting above is a custom one and it is one where a person can sort tasks by using its priority level instead of due date. This help to have  more perspective and one can reorganize their tasks when needed.

Learn more about task  from

https://brainly.com/question/12831236

Which two statements describe the design principle of unity??
a. Uses opposing elements to draw attention to a specific message.
b. Assigns relationships between elements based on their size.
c. Conveys a consistent message to users.
d. Is a point around which elements mirror each other.
e. Displays order in its layout, style, and structure. ​

Answers

I think it is D
Hope this help you?!

Answer:

C- Conveys a consistent message to users.E- Displays order in its layout, style, and structure.

Harry learned how to design and build computer games from his programming foundations class in college and wants to tackle creating his first
mobile app game. What essential tools does Harry need if he already has the skills?
A OA storyboard, computer hardware, music and sound effects, and programming code.
B
60
o A mobile tablet, game engine software, and programming code.
Co A computer hardware, game engine software, graphical art design application, and programming code.
Do Programming code, game engine software, and game design.

Answers

Coded information is needed to create a program like OS or other applications. Essential tools required by Harry are hardware, gaming software, graphical art designing tool, and programming codes.

What are programming codes?

Programming codes are the set of instructional data and rules in the programming language used to create operating systems and applications based on games, learning, entertainment, etc.

To create a gaming application one must have program codes or rules, computer hardware for storing and writing data, gaming engine software, and designing applications to develop the graphics of the game.

Therefore, Harry needs option C. hardware, software, graphical app, and programming codes.

Learn more about programming codes here:

https://brainly.com/question/14378523

#SPJ1

1. What is the difference between background sound and nat sound

Answers

Answer:

(nat) sound punctuates your piece between interview clips and helps to drive your narrative arc. Background sound can help to set the mood and give a sense of place to your viewer. If you record sound too loudly or too softly, the quality diminshes.

Explanation:

o access an array element, use the array name and the element's ________. a. data type b. subscript c. value d. name e. None of these

Answers

Depends, it could be name, but it depends on how you are accessing the array.

Personally, I’d say None of them, since you access an array element/item with an index (the number that the element can be referred with).

E.g. In Python…

arr = [“a”, “b”, “c”]
print(arr[0] == “a”) # Output: “True”

As an object moves up and to the right on the program area, what happens to the X and Y coordinates?

a
X and Y both get smaller

b
X and Y both get bigger

c
X gets smaller and Y gets bigger

d
X gets bigger and Y gets smaller

Answers

The answer should be B: X and Y both get bigger. Since when an object goes up, Y gets bigger, and when an object goes right, X gets bigger (becomes a bigger number down the line)

Every HTML will be marked as html document at the very beginning.


1. True


2. False

Answers

Answer:

True

Explanation:

HTML will be marked as HTML document

Ian needs to extract the day from the date 5/31/2017 entered in cell A1. Which formula can he use to do this

Answers

A cell is a box which can be seen in an Excel sheet. Ian needs to write the formula "=day(A1)".

What is Cell in an Excel?

A cell is a box which can be seen in an Excel sheet, this box is named A1, B2, etc. The name of a cell depends upon the column and the row in which it is present.

In case, if Ian needs to extract the day from the date from cell A1. He needs to write the formula:

=day(A1)

This will give the output as 31.

In case, if Ian needs to extract the weekday from the date in cell A1. He needs to write the formula,

=weekday(A1,1)

This will return a number between 1 to 7 which will represent Sunday to Saturday respectively.

Learn more about Excel:

https://brainly.com/question/3441128

#SPJ1

In a distributed IDS, the ____________________ module analyzes LAN traffic and reports the results to the central manager.

Answers

Answer:

LAN monitor agent

Explanation:

Question 1 of 10
What should you use to convert an algorithm to a format that a computer can
understand?
A. An if-then statement
B. An iteration
cha prototype
D. A programming language
SUBMIT

Answers

D. A programming language

Answer:

I believe that it's D.

Explanation:

distinguish between a computer drive and computer driver​

Answers

Answer:

The word Drive typically refers to a mechanical hard drive or solid-state hard drive used to store the OS, data and programs. A driver is software code that interfaces the various devices in the computer with the processing system.

Explanation:

..............................................................

What are the supercomputers and where are they used? ​

Answers

Answer:

Giant Tech Company mostly

Explanation:

they used it as their server or storing data, right now example we googling by that we send the requests from our computer to supercomputers and those computer will find that information your and send back the respond (e.g. website Brainly). Supercomputers = computers sample as that.

3D printers, also known as ________, create three-dimensional shapes by adding very thin layer after layer of material until the final shape is fully formed.

Answers

Answer:

Additive Manufacturing

Hope this Helps!

3D printers, also known as additive manufacturing create three-dimensional shapes by adding very thin layer after layer of material until the final shape is fully formed.

What is additive manufacturing?

This is known to be tool that is often used to make three-dimensional shapes as  the process of makes an object by building it one layer at a given time.

Therefore,3D printers, also known as additive manufacturing create three-dimensional shapes by adding very thin layer after layer of material until the final shape is fully formed.

Learn more about additive manufacturing from

https://brainly.com/question/19484863

#SPJ9

A ________ takes data from multiple data sources, cleans and processes the data, and stores the data.

Answers

Answer:

A Data Warehouse is the answer

The loss of customer trust because of security problems are ________ that created ________.

Answers

The loss of customer trust because of security problems are Hacking or negligence that created data breaches.

What are data breaches?

A data breach is known to be an incidence where information of customers have been stolen from a system without the authorization of the owner of the system.

Note that customer trust can be destroyed when there is security problems such as  Hacking or negligence that leads to data breaches and loss of customers information.

Learn more about customer trust from

https://brainly.com/question/26872475

what is internet filtering

Answers

Explanation:

internet filtering is a technology that stops users from viewing certain URLs or websites by preventing their browsers from loading pages from these sites.

Answer:  by specifying content patterns – such as text strings or objects within images – that, if matched, indicate undesirable content that is to be screened out.

Explanation:

So it blocks things so they can not be looked at.

Other Questions
Roberta's monthly bank statement says that she has a balance of 386.29, but roberta's check register says that her balance is 370.77. which of the following are still outstanding? i. a $78.17 check to the electric company ii. a $16.15 deposit from roberta's roommate iii. a $22.67 check to the grocery store iv. a $62.65 deposit from roberta's tax return a. i and ii b. ii and iii c. ii and iv d. i and iv please select the best answer from the choices provided a b c d What thoughts did president kennedy most likely have in reaction to the violence in birmingham? new laws would have to give more freedom to whites. New laws were needed to protect the rights of african americans. Old laws would have to remain in place ""as is. "" african americans would have to pass laws on their own behalf. Problem: Y = 3x - 3x + 2Discriminant: b-4ac = 9 - 4 (3)(2) = -15Explain why this has no solution/ 0 real solutions. Explain the discriminant. evaluate the contribution made by the UDF in opposing apartheid in South Africa in the 1980s essay I will give you 100 POINTS and BRAINLIEST (if you answer this correctly) !! I am asking this because there is no result when I search it in the internet, so please avoid answers like 'search it in the internet'. What is this structure? This structure's function is to transport, but I would like to know its exact name. This is a structure like muscle cell, red blood cell, or palisade mesophyll cell and not an organelle like chloroplasts or nucleus. Study the map and map key. Use the information in the map to answer the questions.What are the names of two Egyptian towns or trading centers? Is this cladogram the same as the molecular cladogram? Which ordered pair maximizes the objective function p = 3x 8y? (0, 0) (2, 7) (5, 6) (8, 1) When using the indirect method to prepare the operating activities section of the statement of cash flows, the first amount listed is:. What is the Median of the numbers 20, 18, 14, 7, 15, 5 Which molecular geometry, of an abn molecule, results in a polar molecule?. What is 77x145 ?What do I do?? Does keys rhyme with dreams? A(n) ________ is an organizational change that involves rethinking the nature of the business and the nature of the organization itself. When designing an experiment to see if Big Foot likes apples which house would be your control group? This is for my music appreciation class.The two songs used were "Lose Yourself" by Eminem & "U Can't Touch This" by MC Hammer. What things were similar between the two pieces? What differences did you notice? Consider instruments, singing style, lyrics, tempo, dynamics, and themes, and list at least 2 similarities and at least 3 differences.I promise to give best answer! from the number of card numbered from 1 to 15 orchid is drawn from random find the probability of getting a card having a prime number In the equation below 1. If a sample containing 12.5 moles of NH3 is reacted with excess CuO, how many moles of each product can be made?N2=Cu=H20=thanks! Which function is continuous at x = 18? f (x) = startfraction (x minus 18) squared over x endfraction f (x) = startfraction x squared minus 17 x minus 18 over x minus 18 endfraction f (x) = tangent (startfraction pi over 36 endfraction x) f (x) = startlayout enlarged left-brace first row x squared, x not-equals 18 second row 36, x = 18 endlayout Find thevolume of arectangular prismwith dimensions of12 ft. high, 14 ft.wide, and 9 ft. long.*Don't forget units.