1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irakobra [83]
3 years ago
12

Which process passes private and sensitive information to unscrupulous websites through clicks on random links?

Computers and Technology
2 answers:
professor190 [17]3 years ago
8 0

The answer to this question on PLATO is Phishing.

QveST [7]3 years ago
6 0

Answer is Phishing

Phishing is fraudulent and it attempts to steal your personal information through unscrupulous websites. A phishing website tries to steal private and sensitive information by tricking the user into believing that he/she is on legitimate website. You could easily land into a phishing website by mistyping a web address. It mainly comes through malicious links attached to an email, IM, or text messages. Do not be duped or fall victim to such links.

You might be interested in
3.
gulaghasi [49]

Explanation:

the process of displaying the information from the table is called query

<h2>hey friend </h2><h2>your answer is here </h2><h2>I hope it will be helpful you </h2><h2>please mark as brainiest answer </h2><h2>thank you </h2>
7 0
3 years ago
You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to
lions [1.4K]

Answer:

A Phishing Attack

Explanation:

The term "phishing" comes from the combination of the English term "fishing", which means to fish, with the term "phreak", often used to name the first telephony hackers.

It is a type of scam that uses technological mechanisms, usually based on messages, to persuade and deceive people, with a specific objective, which varies from attack to attack.

For example, sending you an email message with a link like a popular social media platform which is meant to trick you into submitting your login details thereby hacking into your account from the hacker's remote location.

3 0
3 years ago
Read 2 more answers
Which of the following is not a property of a WAN:
docker41 [41]

Answer:

Option d is the correct answer for the above question.

Explanation:

  • WAN is a type of network that facilities network connection all over the world. It can connect every computer which is in anywhere in the world while the other technology like LAN and MAN is used for small area locations.
  • The above question asked that about that statement which is not the property of WAN and that is option d because it states that WAN is used to connect only small areas of computers, but it can connect all the computers of the world, while the other property is valid for WAN.
6 0
3 years ago
Listed three functions tht are ysed in a spreadsheet​
Karo-lina-s [1.5K]

Answer:

The sum function

The count function

The trim function etc.

5 0
2 years ago
If a code word is defined to be a sequence of different letters chosen from the 10 letters A, B, C, D, E, F, G, H, I, and J, wha
netineya [11]

Answer:

The answer is 6:1 .

Explanation:

We don't need to have prior knowledge of combination or permutation.

Count the way to chose 4 letters.As given in the question chose sequence of different letters

For first place we have 10 letter

For second place we have 9 letter as one is already out

For 3 place we have 8 letter as two letter are already out

For 4 place we have 7 letter as three letter are already out

Total group of 4 letters = 10 * 9 *8*7

Similarly form group of 5 letters we have

Total group of 5 letters = 10 * 9* 8 * 7*6

then Calculating ratio between 4 and 5

We have,

Group 5 : Group 4 ::10 * 9* 8 * 7*6:10 * 9 *8*7

                              : : 30240 : 5040

divide by 5040 on both side we get

Group  5: Group 4 :: 6 : 1

5 0
3 years ago
Other questions:
  • Liam is a hacker who tries to access Wi-Fi signals while driving his car. What type of wireless network attack is this?
    9·1 answer
  • Is Wikipedia or a .gov website with more information about the subject not a good enough explanation not a good explanation for
    7·1 answer
  • What will the following segment of code output? Assume the user enters a grade of 90 from the keyboard. cout &lt;&lt; "Enter a t
    5·1 answer
  • You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. Your company requires that all cabling follow the TIA
    14·1 answer
  • Given the 32-bit binary number:
    13·1 answer
  • Discuss how the Internet has made our communication hypertextual, omnidirectional, and more interactive
    6·1 answer
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    9·1 answer
  • PLEASE HELP 10 POINTS!!!Click this link to view O*NET’s Work Activities section for Human Resources Managers. Note that common a
    7·2 answers
  • A list of steps to finish a task. A set of instructions that can be performed with or without a computer is called an
    5·1 answer
  • Choose the response that best completes the following statement.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!