There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.
Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.
Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.
Learn more from
https://brainly.com/question/24069038
Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare the results of that to each other. What kinds of operators does Tamara need to use for each step?
Tamara needs to use
operators to organize the students' grades, then
operators to compare the results.
Answer: you said "Tamara needs to use
operators to organize the students' grades, then
operators to compare the results."
i think your right
Explanation:
sounds right.
write an expression taht evaluated to true if and only if the variable s does not contain the string 'end'
Answer:
//check which string is greater
if(strcmp(name1,name2)>0)
//assign name1 to first, if the
//name1 is greater than name2
first=name1;
else
//assign name2 to first, if the
//name2 is greater than name1
first=name2;
5)
//compare name1 and name2
if(strcmp(name1,name2)>0)
//compare name1 and name3
if(strcmp(name1,name3)>0)
//assign name1 to max, becuase
//name1 is greater than name2 and name3
max=name1;
Explanation:
Which tools exist on the 3-D Map Layer pane? Check all that apply. filter options layer options time visualization category visualization Udata layer visualization data value visualization
Answer:
filter options
layer options
category visualization
data value visualization
Explanation:
The CNSS model of information security evolved from a concept developed by the computer security industry known as the ____________________ triad.
i will give brainliest to the best answer. what is a good screen recorder
Answer:
If your on windows there is an x-box screen recorder installed on it. thats a new windows 11 update. If not, i used to use x-split broadcaster
Explanation:
If your on windows there is an x-box screen recorder installed on it. thats a new windows 11 update. If not, i used to use x-split broadcaster
mark me Brainliest
1.Write a C++ program that allows the user to enter the phrase "I am smart". Output the first letter and last letter of the phrase using string properties.
2.Write a C++ program to output the following values after they are loaded into an array: 67, 45, 12, 89, 46, 88 and 43.
PLS Help they are different questions
Answer:
1)
string value;
cout << "type I am smart";
cin >> value; // get user input from the keyboard
2)
int num1 = 67;
int num2 = 45;
int num3 = 12;
int num4 = 89;
int num5 = 46;
int num6 = 89;
int num7 = 46;
int num8 = 88;
int num9 = 43;
int numbers [ ] = {num1,num2,num3,num4,num5,num7,num8,num9} ;
//to load it as a function
int main ()
{
for ( n=0 ; n<5 ; n++ )
{
result += numbers[n];
}
cout << result;
return 0;
}
The C++ programs are illustrations of arrays and strings
The program 1The program written in C++ is as follows:
#include<iostream>
using namespace std;
int main(){
//This declares the string
string myStr;
//This gets the input
cin>>myStr;
//This prints the first and the last index elements
cout<<myStr[0]<<" "<<myStr[myStr.length()-1];
return 0;
}
The program 2The program written in C++ is as follows:
#include<iostream>
using namespace std;
int main(){
//This initializes the array
int myArr [] = {67, 45, 12, 89, 46, 88, 43};
//This prints the array elements
for(int i = 0; i<7;i++){
cout<<myArr[i]<<" ";
}
return 0;
}
Read more about arrays and strings at:
https://brainly.com/question/15683939
#SPJ2
a ________ uses electronic memory and has no motors or moving parts.
Answer:
a to uses electronic memory and has no motors or moving parts.
Explanation:
brainliest me and follow ty
Four types of firewalls are: Packet filtering, stateful inspection, circuit level proxy and _________ .
Answer:
oxigen
Explanation:
ok so I have two accounts and like, the other account has -20 points??? what happened
Need help with 3.2 lesson practice questions (edhesive)
Answer:
Doesn't have a questionExplanation:
THANK YOUUUntil 2016, the popular song _____ was covered by copyright law, unusually long after it was written in 1893.
A.
Happy Birthday
B.
Merry Christmas, Everyone
C.
Hava Nagila
D.
Auld Lang Syne
Answer: Happy Birthday
Explanation:
What access-point feature allows a network administrator to define what type of data can enter the wireless network?
________________ is access to the internet through your tv connection.
Answer:
Cable Modem
Explanation:
When a mobile user connects to a main office using a standard Internet connection, a ____ provides the mobile user with a secure connection to the company network server.
A virtual private network (VPN) is an encrypted connection using a standard Internet connection to connect a device to a network.
A virtual private network (VPN) is used to connect a private network to a public network. It enables users have access to the private network thereby enabling them to send and receive data across public networks.
A virtual private network (VPN) is an encrypted connection using a standard Internet connection to connect a device to a network.
Find out more at: https://brainly.com/question/25234505
from which Menu option you can change page setup in MS Word
page layout tab or the page setup dialog box
a steep reduction is memory available on the heap to the poiont where it is completly exhausted is known as a
Based on the information that is given, a steep reduction in the memory that's available is known as a memory leak.
A memory leak simply means a form of resource leak which occurs when a computer program manages memory allocations incorrectly in such a way that the memory that isn't needed anymore aren't released.
It should be noted that a memory leak is also a steady reduction in memory available on the heap to the point where it's exhausted. It can also be when an object that is stored in memory can't be accessed by the running code.
Read related link on:
https://brainly.com/question/25820385
How to turn robot voice like real human voice.
What is the quickest option for adding internet images to a PowerPoint presentation?
*it's b. use the online pictures option....
Answer:
b. Use the Online Pictures option to perform a search of web-based images to insert.
Explanation:is correct. post protected
In Java, a reference variable is ________ because it can reference objects of types different from its own, as long as those types are related to its type through inheritance.
Answer:
polymorphic
Explanation:
An example of polymorphic reference, suppose you have 3 classes: Main, Product and SpecificProduct. If SpecificProduct extends Product this means it is a product class but with something else to complement.
Say you want to reference an object of product in the main class, you can do it the classic way:
Product pd = new Product();
Or you can do it polymorphic, like this:
Product pd = new SpecificProduct();
The program will accept just fine because SpecificProduct is extending Product. When you do it like this, we say the reference you made was a polymorphic reference
text to appear
Name the highlighted part as a whole. What are the segments- bgcolor and “SKYBLUE” called?
What is the output going to be due to the highlighted part?
Answer:
bg color stands for background color while SKYBLUE is the color assigned to it.
Explanation:
It is setting the background color of the body tag to sky blue.
we are unable to process your request at this time. if you continue to receive this error, please contact cardholder services by calling the number on the back of your card.
Answer:
is this a sim chip card replacement card for Electronics ?
Explanation:
it is possible to be logged into a wi-fi network that does not have internet access.
Answer:
yes it is possible. it'll take some work tho
Explanation:
you would have to bypass the security and disable the proxy and go through the firewall and do some other things to access it
PLEASE HELP ME FASTTTTTT Input statements allow the user to enter data that a program uses to perform necessary computations. Users enter the data when they the program.
Answer:
The scanf() is the function that is used to take inputs from the user with the help of the standard input device,i.e, the keyboard.
scanf() function is capable of taking any data type as an input, though it has to be specified first like %d for integers, %s for strings and %f for floating-point type. The gets() function can only take a string as an input.
Explanation:
Answer:
ur
Explanation:
ur mom
Which is a function of an operating system?.
Answer:
An operating system is known as the interface between the computer hardware and the user itself. It is one of the most essential parts of a computer, and is the most integral software. It's responsible for executing programs, handling other inputs i.e an additional mouse, keyboard, etc. as well as handling storage for data and other files. In addition to this, it manages the computer's resources as well as executes and enables services.
1. Which software is used mostly for typing text? a) Word b) Excel O c) PowerPoint o d) Paint
Answer:
a. Word
Explanation:
Microsoft Word is the most widely used word processing software according to a user tracking system built into the software.
Answer: a) Word
Explanation: Microsoft Word is the most widely used word processing software.
When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides or bottom of an image?
B will resize but not maint aspect ratio was correct
Answer:
b. It will resize the image but not maintain aspect ratio
Explanation: is correct. post protected
Answer:
b
Explanation:
What is the largest integer that can be represented with 4 bits?.
Answer:
15
Explanation:
You can calculate the maximum number using a simple formula:
2^N (Where N is the number of bits) - 1
So 2^4 - 1 = 16 - 1 = 15
A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer’s technical support team for assistance. The support technician needs specific information from the device about how the app is responding and what is happening to cause the errors.
Answer:
D. The method for retrieval is dependent on the specific app or device’s operating system.
the pathway through which an electric signal moved between devices is known as what?
In older languages, you could leave a selection or loop before it was complete by using a ____ statement
Answer:
D) go to
Explanation:
A) next
B) go next
C) loop
D) go to
D) go to is correct answer
(Hope this helps can I pls have brainlist (crown)☺️)