menu
Qamnty
Login
Register
My account
Edit my Profile
Private messages
My favorites
Which of the following is a procedure to identify a computer user as a human? A. malware B. virus C. DDoS D. CAPTCHA
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Which of the following is a procedure to identify a computer user as a human? A. malware B. virus C. DDoS D. CAPTCHA
asked
May 18, 2024
206k
views
2
votes
Which of the following is a procedure to identify a computer user as a human?
A. malware
B. virus
C. DDoS
D. CAPTCHA
Computers & Tech
middle-school
Eddyq
asked
by
Eddyq
6.9k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
2
Answers
5
votes
captcha is the answer u can just look up the word
Margrit
answered
May 21, 2024
by
Margrit
8.0k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
1
vote
Answer:
D captcha
Step-by-step explanation:
Dan Lew
answered
May 25, 2024
by
Dan Lew
7.8k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Jan 19, 2024
23.5k
views
CAPTCHA is ________. A) antivirus software B) a password method C) the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website D) a rootkit virus
EliadL
asked
Jan 19, 2024
by
EliadL
8.1k
points
Geography
high-school
1
answer
1
vote
23.5k
views
asked
Mar 8, 2024
210k
views
What is the definition of any attack involving human interaction of some kind? A) Phishing attack B) DDoS attack C) Malware attack D) Firewall attack
Martin Freedman
asked
Mar 8, 2024
by
Martin Freedman
7.9k
points
Computers & Tech
high-school
1
answer
0
votes
210k
views
asked
Sep 12, 2024
189k
views
Which of the following is NOT a common confidentiality compromise vector? a. DDOS b. Unpatched software c. Malware d. Compromised password
Adamjmarkham
asked
Sep 12, 2024
by
Adamjmarkham
8.5k
points
Computers & Tech
high-school
1
answer
4
votes
189k
views
Ask a Question
Welcome to Qamnty — a place to ask, share, and grow together. Join our community and get real answers from real people.
Categories
All categories
Mathematics
(3.7m)
History
(955k)
English
(903k)
Biology
(716k)
Chemistry
(440k)
Physics
(405k)
Social Studies
(564k)
Advanced Placement
(27.5k)
SAT
(19.1k)
Geography
(146k)
Health
(283k)
Arts
(107k)
Business
(468k)
Computers & Tech
(195k)
French
(33.9k)
German
(4.9k)
Spanish
(174k)
Medicine
(125k)
Law
(53.4k)
Engineering
(74.2k)
Other Questions
“What does it mean when we “rework” copyrighted material?”
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
Seven basic internal components found in a computer tower
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qamnty