1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grin007 [14]
3 years ago
14

Tanya has received an email, apparently from her bank, stating that some of her records were lost during server maintenance work

and that they therefore need the user ID and password for her account. Tanya suspects that it is a phishing attempt.
Computers and Technology
1 answer:
Alecsey [184]3 years ago
5 0
Phishing is a type of social engineering attack that is used to steal a vicitm's credentials. Making a fake email is probably one of the most effective phishing attacks against commercial enterprises. It always baffles me how people can fall for it!

Yes, that email is a phishing attempt...They should call the bank to verify. 

The best way to tell is by looking at who sent you the email and who is CC'd to it. Also, the title of the email might be a dead giveaway...
You might be interested in
Which of the following was not important in the development of the internet?
lesantik [10]
D. Rise of NASA.Hope I helped.
8 0
3 years ago
Read 2 more answers
Describe a situation involving making a copy of a computer program or an entertainment file of some sort for which you think it
Margaret [11]

Answer:

Copying anything may be the computer program or an entertainment file, it is not a good thing as the original developers or the writers are going to feel bad since their hard work is being used by others without letting them know. However, if you are using it for academic purposes, or give them credit in your work, then the original writer will not feel that bad as he is being credited, and hence you can reuse in that case definitely, but always ensure to give the credit to the original writer.

As an example, if a film is copied like many in the past the Directors always feel bad, and they have the reason for feeling bad. The same thing is to technology.

Explanation:

The answer is self explanatory.

8 0
3 years ago
15 points: Which type of system is used to capture and leverage the decision-making abilities of human experts?
salantis [7]

Answer:

A

Explanation:

4 0
3 years ago
They will wash the car change into tag question​
valentina_108 [34]

Answer:

They will wash the car, won't they?

Explanation:

A tag question usually comes after an independent clause. The tag question is most times attached with the intent of affirming the statement made in the independent clause. Our independent clause in the answer above is; "They will wash the car". The tag question, "Won't they?" is meant to affirm that statement.

Another example is, "They are going to school, aren't they?" In this example also, the independent clause makes a sentence that is to be confirmed by the tag question.

8 0
3 years ago
Three types of common program errors are syntax, runtime, and logic. (5 points)
adoni [48]

Answer:

True

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Mike needs to write the primary objectives of a project in a project plan. In which section should he write them?
    6·1 answer
  • What command displays a computer s network settings?
    5·1 answer
  • The objective of ____ testing is to identify and eliminate execution errors that could cause a program to terminate abnormally,
    15·1 answer
  • If you were required to give a speech identifying the risks of using computers and digital devices, which group of items would y
    7·1 answer
  • A _____ network is where all computers are equal and each one is both data requester and data provider.
    13·1 answer
  • What are the 5 characteristics of flowchart<br>​
    14·1 answer
  • What is your personal definition of life? How do you appreciate life?​
    10·1 answer
  • Write down the characterizations that best suits the term Java applets?
    7·1 answer
  • Is a dot matrix printer an impact or non-impact printer
    12·2 answers
  • Write about virus in five points.​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!