1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svet-max [94.6K]
1 year ago
6

which explains a method to avoid violation of personal information through phishing? do not carry around your social security ca

rd. keep photocopies of each side of your credit card in a secure place at home. never give out credit information to someone who calls you or emails you. shred personal mail and documents before throwing away.
Computers and Technology
1 answer:
snow_lady [41]1 year ago
6 0

The option that explains a method to avoid violation of personal information through phishing is C. never give out credit information to someone who calls you or emails you.

<h3>What is phishing?</h3>

Phishing is a form of social engineering assault that is frequently employed to obtain user information, such as login credentials and credit card details. It happens when an attacker deceives a victim into opening an email, instant message, or text message by disguising themselves as a reliable source.

Therefore, the option that explains a method to avoid violation of personal information through phishing is to never give out credit information to someone who calls you or emails you.

Learn more about phishing on:

brainly.com/question/23021587

#SPJ1

You might be interested in
Which image file format is an uncompressed raster file which may contain different depths of color depths per pixel, or may be s
dangina [55]

Answer:

BMP

Explanation:

The BMP file format, also known as bitmap image file, device independent bitmap (DIB) file format and bitmap, is a raster graphics image file format used to store bitmap digital images, independently of the display device (such as a graphics adapter), especially on Microsoft Windows[2] and OS/2[3] operating system

6 0
2 years ago
Quick question if anyone knows? How do you give brainlist? Please tell me if you know! ( Here if a chiaki gif for your too lol )
riadik2000 [5.3K]

Answer:

To give brainliest you need to click the little crown under the answer that someone has responded with! it should be located near the rate 5 stars!

Explanation:

hopefully this helps!! also yes yes ty for the gif<3

7 0
2 years ago
1.Discuss why this class is important (or not) to a soon-to-be security practitioner. 2.Discuss one of more subjects you have le
KIM [24]

Answer:

I just can't make out the question

8 0
3 years ago
In the software development process, which review studies the software design before it is released for coding?
marta [7]

1. In the software development process, the <u>software requirement</u> review studies the software design before it is released for coding.

2. <u>Audits</u> and walkthroughs are additional types of reviews performed in the software development process.

<h3>What is software development?</h3>

Software development can be defined as a process through which a software application (program) that is used to perform specific tasks on a computer is conceived, designed, developed (programmed), documented, tested and reviewed.

<h3>What is a software review?</h3>

A software review refers to a process that involves the analysis and examination of a software application (program) by a software developer, computers (robots), project personnel, end users, or user representatives for comment or approval on specifications and standards.

<h3>Types of reviews in software design.</h3>

In the software development process, there are three (3) main types of reviews and these include the following:

  • Preliminary design review (PDR)
  • Critical design review (CDR)
  • Software requirements review (SRR)

Furthermore, the additional types of reviews performed in the software development process are:

  1. Inspection
  2. Code review
  3. Technical review
  4. Pair programming
  5. Audit review

Read more on software development here: brainly.com/question/25760458

8 0
2 years ago
Can you please look through this code and see wants wrong with it? its in python
Ivanshal [37]
I’m confused what are you trying to ask? What is the python?
3 0
2 years ago
Other questions:
  • The combination of two or more technologies or data feeds into a single, integrated tool is referred to as a _____.
    7·1 answer
  • So can u please follow my new ig acc i just started it yesterday its called stunnerspamz
    5·2 answers
  • In 2009 to 2010, 1 in 10 social network users:
    10·1 answer
  • What is technology?
    11·1 answer
  • Design a function that checks if a keyword exists in a given keyword tree and returns true if so and returns false otherwise. Af
    13·2 answers
  • Which option should you select to accept a tracked change? A. Accept B. Reject C. Review D. Delete
    8·2 answers
  • "The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a ce
    7·1 answer
  • 5.During a recent network attack, a hacker used rainbow tables to guess network passwords. Which type of attack occurred
    9·1 answer
  • Identify 5 products/services needed by the people in our current situation.<br>​
    6·1 answer
  • Why it is not recommended to add sound effect on slide transition? Write at least two reasons.​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!