answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexgriva [62]
1 year ago
6

Lance is at a bus station. His friend is using the ATM machine to withdraw some money. Lance notices a stranger deceptively watc

hing his friend type in the ATM pin. What should lances friend do?
the person watching lances friend typing the atm pin is an example of ( copyright infringement , hacking , shoulder browsing , software piracy ) . Lances friend should ( stop using the atm card , change the atm pin , stop using the atm machine )
Computers and Technology
2 answers:
Blababa [14]1 year ago
8 0

Answer:

The person watching Lances friend typing the ATM pin is an example of <u>"shoulder browsing"</u> and Lances friend should <u>"Change the ATM pin."</u>

<u />

<u>I hope this is the answer you were looking for!</u>

zimovet [89]1 year ago
6 0

Answer:

The person watching Lances friend typing the atm pin is an example of <u>shoulder browsing</u>. Lances friend should <u>change the atm pin</u>.

Explanation:

Shoulder browsing is a technique that consists in looking over people's shoulder to get information like PINs and passwords. Because of this, this is what the person watching Lance's friend is doing.

Also, what Lance's friend should do is to change the pin because as the person already stole it, he can use it to withdraw the funds in his account. So, he has to change it to avoid that.

You might be interested in
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
1 year ago
Give the logical function for the following: If cell B7 equals 12, check contents of cell B10. If cell B10 is 10, then the value
ASHA 777 [7]

Answer:

=IF( B7 = 12, ( IF( B10 = 10,"YES", "")), 7) and PRESS ENTER

Explanation:

the above logical if function checks the following

-IF cell B7 is 12, if true, check the value of cell B10, IF cell B10 contains 10 the function should produce YES as output to whatever cell selected, IF B10 is not 10 output of the function should be an empty string, IF B7 is not equal to 12 the the output of the function should be 7.

5 0
2 years ago
In C++ the declaration of floating point variables starts with the type name double, followed by the name of the variable, and t
Vadim26 [7]

Answer:

See explaination

Explanation:

Given a partial grammar which represents the specification for C++ style variable declaration. In this range a - z indicates terminals that represents the variable names.

'S' is the start symbol of the

non-terminal.

Hence, given,

S= TV

V= CX

Please kindly refer to attachment for further instructions and complete step by step solution.

8 0
2 years ago
When the processor needs an instruction or data, it searches memory in this order: L1 cache, then L2 cache, then L3 cache (if it
Effectus [21]

Answer and Explanation:

Memory Cache speed the processes of the computer. It stores instruction and data. The computer has two types of memory cache

L1 cache, L2 cache, and L3 Cache i.e., Level 1, Level 2 and Level 3

L1 cache is built on the processor chip and has a minimal capacity.

L2 cache is slower than L1 and has a large capacity. Mostly processor uses ATC advanced transfer cache.

When the processor needs instruction, it searched in order L1 cache than L2 cache and L3. If any data or instruction is not found, then search slower speed medium such as a hard disk and optical disc.

3 0
1 year ago
In cell I5, enter a formula to calculate the total admission fees collected for the 2018
V125BC [204]
The formula is to calculate the total admission fees collected is = F5*B14

1. Click on cell I5
2. Type equal sign =
3. Type F5 or click on F5 cell
3. Type multiplication sign *
4. Type B14 or click on B14 cell
4 0
1 year ago
Read 2 more answers
Other questions:
  • Write a loop that reads strings from standard input, where the string is either duck or goose. the loop terminates when goose is
    7·1 answer
  • Write a program that can convert an integer between 0 and 15 into hex number (including 0 and 15). the user enters an integer fr
    15·1 answer
  • What is the purpose of using self.id in tests, while working with unittest?A. self.id returns the name of moduleB. self.id retur
    15·1 answer
  • Question 1 :Which type of unshielded twisted pair (UTP) cable is commonly used for 1000BASE-T Ethernet networks and is often mad
    8·1 answer
  • You'd like to change the minimum password length policy in the Default Domain Policy group policy preference (GPO). What's the b
    10·1 answer
  • Which of the following is a true statement about cloud computing?
    6·1 answer
  • Temperature Class Write a Temperature class that will hold a temperature in Fahrenheit and provide methods to get the temperatur
    6·1 answer
  • What do you call the two parts of lift that go down a mine
    13·2 answers
  • All organizations need good quality cybersecurity to ensure _____. Select 4 options.
    12·2 answers
  • Write a program to input value of three sides, to check triangle is triangle is possible to form of not​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!