1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lisov135 [29]
3 years ago
10

Pierre received an urgent email appearing to come from his boss asking him to respond quickly to the email with the company cred

it card
Computers and Technology
1 answer:
Wewaii [24]3 years ago
4 0

Answer:

This is a Phishing email

Explanation:

Pierre has received a phishing email from a certain scammer. These kinds of emails are an attempt from the scammer to fool the receivers like in this case Pierre and get the personal and financial information that they can use to steal the money from their account. It's hence, a fraudulent attempt to steal the money from the account of a certain person like here it is Pierre.

You might be interested in
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
Encoding in the information processing theory is the process of _____
Katyanochek1 [597]

Encoding in the information processing theory is the process of inputting of information into the memory system.

<h3>What is encoding?</h3>

Encoding is an act or a system method that is used in the inputting of information into the computer memory system.

It entails the storage in the retention of encoded information. After encoding is the Retrieval method that is the act of getting the information out of memory.

Learn more about encoding from

brainly.com/question/3926211

8 0
2 years ago
Write a loop to print 10 to 90 inclusive (this means it should include both the
Semmy [17]

Answer:

The loop in cpp language is as follows.

for(int n=10; n<=90; n++)

{

cout<<n<<" ";

count = count+1;

if(count==10)

{

cout<<""<<endl;

count=0;

}

}

Explanation:

1. The expected output is obtained using for loop.

2. The loop variable, n is initialized to the starting value of 10.

3. The variable n is incremented by 1 at a time, until n reaches the final value of 90.

4. Every value of n beginning from 10 is displayed folllowed by a space.

5. When 10 numbers are printed, a new line is inserted so that every line shows only 10 numbers.

6. This is achieved by using an integer variable, count.

7. The variable count is initialized to 0.

8. After every number is displayed, count is incremented by 1.

9. When the value of count reaches 10, a new line is inserted and the variable count is initialized to 0 again. This is done inside if statement.

10. The program using the above loop is shown below along with the output.

PROGRAM

#include <stdio.h>

#include <iostream>

using namespace std;

int main()

{

   int count=0;

   for(int n=10; n<=90; n++)

   {

       cout<<n<<" ";

       count = count+1;

       if(count==10)

       {

           cout<<""<<endl;

           count=0;

       }

       

   }

   return 0;

}  

OUTPUT

10 11 12 13 14 15 16 17 18 19  

20 21 22 23 24 25 26 27 28 29  

30 31 32 33 34 35 36 37 38 39  

40 41 42 43 44 45 46 47 48 49  

50 51 52 53 54 55 56 57 58 59  

60 61 62 63 64 65 66 67 68 69  

70 71 72 73 74 75 76 77 78 79  

80 81 82 83 84 85 86 87 88 89  

90

1. In the above program, the variable count is initialized inside main() but outside for loop.

2. The program ends with a return statement since main() has return type of integer.

3. In cpp language, use of class is not mandatory.

8 0
4 years ago
Ed wants to make sure that his system is designed in a manner that allows tracing actions to an individual. Which phase of acces
tatiyna

The phase of access control that one can say that Ed is more concerned about is called Accountability.

<h3>What is accountability?</h3>

Accountability is known to be one that removes the time and effort you that is used on distracting activities and a lot of unproductive behavior and it makes one to be more focused.

Hence, The phase of access control that one can say that Ed is more concerned about is called Accountability.

Learn more about Accountability from

brainly.com/question/27958508

#SPJ1

7 0
2 years ago
What are three common operating systems
Leno4ka [110]

Types of operating systems

The three most common operating systems for personal computers are Microsoft Windows, macOS, and Linux.

7 0
3 years ago
Read 2 more answers
Other questions:
  • What type of operating system runs a dedicated electronic device such as a smart thermostat?
    5·1 answer
  • Below is a sequence of 32-bit memory address references observed during the execution of an application, and given as word addre
    7·1 answer
  • What are the three main components of an IF function?
    12·1 answer
  • The _____ stage of information technology planning outlines business processes that are central to achieving strategic goals and
    10·1 answer
  • Which of the following is a typical concern for developers while using prototypes?
    6·2 answers
  • Money from a Coverdell Education Savings Account can be used for:
    11·1 answer
  • Plz answer me will mark as brainliest​
    13·1 answer
  • Use the drop-down menus to complete the sentences about the Calendar view Arrange command group.
    6·1 answer
  • What kind of electronic communication might commonly be affected by citizen journalism?
    9·1 answer
  • Which tool is used to see the wireless networks in a given area?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!