many phone fraud scammers are expessily cunning because they approach the target to try to sell

Answers

Answer 1

Answer:

improved computer security programs

Explanation:

Answer 2

Answer:

Improved computer security programs.

Explanation:

Just took the quiz


Related Questions

Choose one scene or object to photograph. Take and submit at least three photographs of this scene at three different times of day. Be sure to note the times of day that you choose. Write a brief response about how the light changed in the photograph.
Take and submit photographs of someone using frontlighting, backlighting, and sidelighting. You can use the sun or other lighting.
Practice taking photographs on a cloudy or rainy day. Turn in three of your favorites from that practice.
Take some portrait photographs using a reflector. (Remember that white paper, poster board, sheets, or a wall can all act a reflector.) Practice moving the subject in different positions relative to the reflector. Turn in three of your favorite photographs.
Practice taking photographs in different lighting conditions (indoors and outdoors, different times of day, different weather, and so on) to help you better understand the impact of light on your photographs. Turn in three of your favorite photographs from your practice sessions.

Answers

Answer:

i dont get what you mean

Explanation:

Please Answer ASAP!!

You must attempt to read past the end of the text file before any end-of-file indicators are set
True
False


Answers

Answer:

I think it's true

Explanation:

Sorry if it's wrong :(

Which of the following is Tynker an example of?
Group of answer choices

database

flowchart

Integrated Development Environment

binary code

Answers

Answer:\

Integrated Development Environment

hope it help

Answer:

C

Explanation:

i did the test

Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?

Answers

There are different aspect of computing. The portion of the PuTTY package that allows you to perform file transfers using the SCP (Secure Copy) protocol is pscp.exe.

The pscp.exe tool commonly called the PuTTY Secure Copy Client is known to be the only portion of the Putty package that can let you copy files to and from remote computers through the use of the SCP.

Secure Copy (SCP)  is simply defined as a computer command that one can use in Linux to copy files from one computer to another on a network.  PuTTY is simply known to be a free implementation of SSH (and telnet) used for computer that running Microsoft Windows.

Learn more about the PuTTY package from

https://brainly.com/question/13171394

A portfolio is a collection of materials that demonstrates your skills, abilities, achievements, and potential.
Question 22 options:
True
False

Answers

A portfolio is a collection of materials that demonstrates your skills, abilities, achievements, and potential.

A portfolio is a living and changing  collection of records that reflect your  accomplishments, skills, experiences,  and attributes. It highlights and  showcases samples of some of your best  work, along with life experiences, values  and achievements. A portfolio does not take the place of a resume, but  it can accentuate your abilities and what  you can offer in the chosen field.

Find out more about portfolio at: https://brainly.com/question/24811520

Arrange the code so that the numbers are swapped.

Answers

Rand.int(your_num , your_num

2. It serves as the foundation of all crochet work. a. Chain stitch C. double treble b. Treble stitch d. slip stitch​

Answers

Answer:

a. chain stitch

because the foundation of so many crochet patterns involved a chain of × stitches followed by working sc/dc into the chain

in addition to good design sense, what else do web designers need to be proficient in?

Answers

In addition to good design sense, web designers need to be proficient in front-end coding languages.

A web designer refers to an individual who is saddled with the responsibility of writing executable codes (instructions) for the design and development of a website, especially by using a hypertext markup language (HTML).

Generally, it is expected that all web designers a good design sense in website development. Additionally, web designers need to be proficient in front-end coding languages, so as to ensure the graphical display and user-interface (UI/UX) are attractive and properly rendered.

Some examples of front-end coding languages include:

CSSHTMLJavascriptReactJQuerryVue

Read more on web design here: https://brainly.com/question/8391970

10. What Microsoft program is frequently used to develop pictorial representations
of a database's logical relationships?
A. Visio
B. Access
C. Excel
D. Word

Answers

Answer:

A. Visio

It's a "powerful tool for diagramming needs". In other words, pictures.

If you are in the Slide Master view, what are the steps to add headers and footers?

Answers

Answer:

THat is the correct order.

Explanation:

An IT security threat is anything that might cause serious harm to a computer system.
Question 16 options:
True
False

Answers

Answer:

True

Explanation:

this is true because a threat can endanger the computer and its system

HELP PLEASE!!

which of the following is document content that displays at the top of every page?

Answers

Explanation:

that is a trick question if you need help ask your teacher

Answer:

Title

Explanation:

what type is the combination of an integer and a string

Answers

Answer:

Concatenation.

Explanation:

Which steps allow a user to change the column layout in the Handout Master?

Answers

Answer:

D. Click the View tab, select Handout Master, and choose the number of columns in the Slides Per Page drop-down list.

Explanation: correctEdg

which computer language uses short words known as mnemonics for writing programs?

Answers

The answer is Assembly

How many things can a computer compare at one time?

Answers

Answer: billion of items at one time

Explanation: The computer is very capable of comparing items bulk at one time

You've just received an email message that indicates a new serious malicious code threat is spreading across the internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent the code from spreading further.

Required:
Based on the email message, what are the next BEST actions to complete?

Answers

Answer:

The next BEST actions to complete could either be to call 911 or just drive somewhere further from your computer and where you live because the threat might come to your place, or it might already be in your place.

Explanation:

Michaela has been tracking the temperatures of the dirt, pond water, and air near her home for a science investigation. She is ready to analyze the data to prepare for her science report. Based on each application’s strengths and weaknesses, which one would be the best to choose for this task?

Answers

Answer:

The science of investigation

Explanation:

hope it help

Linear gameplay is sometimes also known as “campaign mode” or what mode?
A. skirmish mode
B. battle mode
C. story mode
D. cyclical mode

Answers

Answer:

Story Mode

Explanation:

The game has a clearly-defined beginning, middle, and end, also known as campaign or story mode.

Answer:

C

Explanation:

Q44. Cell A20 displays an orange background when its value is 5. Changing the value to 6 changes the background color to green. What type of formatting is applied to cell A20

Answers

The type of formatting that is applied to cell A20 is called conditional formatting.

Conditional formatting in Excel Sheet enables an easier method of highlighting noteworthy cells or ranges of cells, displaying data by employing data bars, color scales, and icon sets that match particular variations in data.

A conditional format modifies the look of cells based on the conditions you set. The cell range will be formatted provided that the conditions are true; if otherwise, it will be false and the cell range will not form.

Learn more about conditional formatting here:

https://brainly.com/question/25051360

Janet is playing a game in which she interacts with an environment to solve a puzzle and to meet new characters. She really enjoys this game because there are no time constraints or pressure to perform with speed. What genre of game is Janet most likely playing?
A. simulation
B. action
C. adventure
D. sports

Answers

Answer:

C. adventure

Explanation:

where deep convolutional neural network is used in real life

Answers

Answer:

Business applications of Convolutional Neural Networks. Image Classification - Search Engines, Recommender Systems, Social Media. Face Recognition Applications of RNN is Social Media, Identification procedures, Surveillance. Legal, Banking, Insurance, Document digitization - Optical Character Recognition.

Oil refining is an example of:

Construction Production
Extractive Production
Domestic Production
Traditional Production

Answers

Answer:

i think the answer is B but i could be wrong...

Answer:

Extractive production

Explanation:

See

Oil refining denotes to after oil extraction situationFirst oil is extracted then gets refinedSo it's extractive production

Sort the layout options for two types of masters in PowerPoint.

Answers

Answer:

The program photo is showing the correct answers and the correct place for the two that you missed.

Explanation:

Answer: ANSWER IS SHOWN CORRECTLY

Explanation:

I REALLY HOPE IT HELPS YOU!!!!!!!!!!!!!

THANK YOU & BE SAFE TOO!!!!!!!!!!!!!!!

What is the default folder for text file

Answers

documents or download

It depends where you install it to

Answer:

numbers are stored as characters

Explanation:

currently saved in if another folder

Kari needs to change the brightness and contrast on an image she has inserted into a Word document. Which group should she use to do this? Adjust Picture Styles Arrange

Answers

Answer:

adjust

Explanation:

it can be found in the top left corner

The navigation items for a Lightning app are available on mobile: A. In a special mobile configuration in the navigation menu and in Favorites B. In the profile menu, when in the app C. In the navigation menu and the first four items of the navigation bar, when users are in the app D. In the App Launcher Check the Quiz to Earn 100 Points

Answers

Navigation items are used for moving from one part of the part to a destination using actions and also for passing information. The right option is  C. In the navigation menu and the first four items of the navigation bar, when users are in the app

There are different methods/ways to implement the Navigation component in a mobile application, we have the following type of Navigation Implementation

Bottom NavigationDrawer Navigation(Slides from Left to right)Top Navigation

Learn more about Navigation here:

https://brainly.com/question/8908486

computer science

describe 3 differences between the checksum and check digit:

Answers

Answer:

A check digit, also known as a checksum character, is the number located on the far right side of a bar code. The purpose of a check digit is to verify that the information on the barcode has been entered correctly.

A check digit, even comprehended as a checksum character, stands for the number found on the far right side of a bar code. The intention of a check digit exists to confirm that the information on the barcode contains been documented accurately.

What are the differences between the checksum and check digit?

A checksum in public can be any size, although generally, they exist some suitable number of bits for computation, such as 32. The more extensive the checksum, the wider the range of errors it can capture. For instance, the checksum utilized for credit card numbers will notice changed digits that exist after each other, but not reversed digits that exist split by a single digit.

All cryptographic hashes (like MD5, SHA, etc.) can be utilized as checksums, but not all checksums exist cryptographic. CRC-type checksums aren’t cryptographic, but they’re extremely quick to calculate, and so they exist generally utilized for things like hard drive checksums where you don’t require the cryptographic functionality, but you accomplish want to notice an extensive range of probable errors.

To learn more about checksum and check digit

https://brainly.com/question/14789699

#SPJ2

You arrive at school on Friday for a field trip ! What a lucky day!You need to figure out what room you are in before leaving. You notice there are rosters on each door . What do you do to find your correct room?
If the roster were sorted alphabetically by last name , would that change how you found your correct room ?

Answers

Answer:

Look for the first letter of your last name

Explanation:

what is control structure write it's types​ .

Answers

Answer

Defination-:

A control statement is a statement and a statement whose execution its control.

Types-:

Selection StatementIteration StatementUnconditional branching Statement
Other Questions
Find the 82nd term of the arithmetic sequence 8, 9, 26, ... Find the polynomial function in standard form that has the zeros listed. 1(multiplicity 2), -2(multiplicity 3) plsss help me21 Answer: Which of the following best describes the attitude of whites in the South toward slavery? a. Almost all were against slavery. b. Only plantation owners paid any attention to the slave issue. c. Slaveowners favored slavery, but most who did not own slaves were against it. d. Slaveowners and most who did not own slaves favored slavery.22 Answer: The book UNCLE TOM'S CABIN was one of the most important novels published in the United States in the 1800's because it a. was written by a slaveowner about slaves. b. was written by a slave about slaves. c. was the first successful novel published in the South. d. was an influence on the feelings of people in the United States.23 Answer: The member of Congress who suggested the plan for the Compromise of 1850 was a. John C. Calhoun b. Henry Clay c. Stephen Douglas d. Frederick Douglas24 Answer: The Compromise of 1850 included all of the following except a. California's admission as a free state. b. the end of slavery in the District of Columbia. c. the formation of New Mexico and Arizona from land claimed by California. d. the Fugitive Slave Act.25 Answer: The Missouri Compromise was partially repealed by the a. Compromise of 1850 b. Kansas-Nebraska Act c. Wilmot Proviso d. Fugitive Slave Act Conjugate each verb in parentheses into the imperfect tense (2 points each).Cuando mis padres 1. ______________ (ser) nios, ellos 2. ______________ (jugar) con muecas y bloques y 3. ______________ (leer) muchos libros. Mi mam 4. ____________ (bailar) mucho y mi pap 5. ____________ (ir) al patio de recreo porque 6. ____________ (gustar) jugar con sus amigas all. Give two reasons why parents may need guidance in dealing with teenagers children Read the sample student claim.Many people claim that cell phones are unsafe and that the damage they cause has yet to be revealed, but the benefits they provide far outweigh any potential and unproven risks.Which best addresses a potential counterclaim?Certain types of cancers take twenty to thirty years to develop, and cell phone studies have only been monitoring this potential connection for ten years or less.On April 3, 1973, the first mobile telephone call was made by Martin Cooper, who is now referred to and known as the father of the cell phone.The portability of cell phones increases personal safety by affording people an easier and faster way to call for help in the event of a serious or life-threatening emergency.According to the Federal Communications Commission and the Food and Drug Administration, cell phone use has not been linked to an increased risk of brain tumors. At Howard High School, 6% of the students ride bikes to school. If 950 students attend Howard High School, how many students ride a bike to school?I need the answer like rn... How many solutions?No solutionOne SolutionInfinitely Many Solutions (If someone is online)pls help me to answer this question Help please.. DuE Today. No LiNkS!!Thanks! 8th Grade MathhNo.2 which pair of atoms constitutes a pair of isotopes of the same element? Document DEmpiricism and The Scientific Method: The Scientific Revolution changed the way many Europeans thought about how to acquire knowledge. The Scientific Revolution shifted away from religion and ancient texts and instead shifted toward empiricism. Empiricism is the idea that you acquire knowledge from observation. For example, if you want to learn why the leaves change color, you wouldnt turn to religion or books from the past. You would observe the leaves and then come to conclusions based on those observations. In this case, examining the internal properties of leaves and studying how those internal properties react and respond to environmental factors. Empiricism is at the heart of the scientific method. The scientific method is a method or process for learning about the world. Sometimes, based on observations, scientists run experiments to determine how the world works. How does empiricism represent a challenge to traditional ways to acquire knowledge? Marisol grouped the terms and factored the GCF out of the groups of the polynomial 6x3 "" 22x2 "" 9x 33. Her work is shown. Step 1: (6x3 "" 22x2) "" (9x 33) Step 2: 2x2(3x "" 11) "" 3(3x 11) Marisol noticed that she does not have a common factor. Which accurately describes what Marisol should do next? Marisol should realize that her work shows that the polynomial is prime. Marisol should go back and group the terms in Step 1 as (6x3 "" 22x2) "" (9x "" 33). Marisol should go back and group the terms in Step 1 as (6x3 "" 22x2) (9x "" 33). Marisol should refactor the expression in Step 2 as 2x2(3x 11) "" 3(3x 11). Out of the artists who use their work to protect the environment, who do you think is the most successful and why? Which condition in the figure below will prove l || m? What is this on G00gel Documents , how do I fix it? hey if you talk to me i will mark you as a brainliest and if you answer all my questionhuh huh huh A middle school has an oval track with the dimensions shown. What is the distance around the track? use 3.14 for . show your work. A periodic digital waveform has a pulse width 25 and a period of 150 . Determine the frequency and the duty cycle How many electrons does chlorine need to gain in order to be like Argon ?- 2 electrons- 3 electrons- 1 electron