Answer:
Explanation:
def indexOfMax(lis):
m = max(lis)
indx=0
for i in range(len(lis)):
if lis[i]==m:
indx=i
break
return indx
print(indexOfMax([1,5,8,23,78,22,0]))
Answer:
no
Explanation:
No she should not because it might be for a test
Answer: Phishing
Explanation: A cybercrime in which, a target or targets are contacted by email, telephone or text message by someone acting or posing as a legitimate institution to lure these targets or a target into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords is referred to as Phishing.
The CyberCriminals use these information to access important accounts, steal identities and even money.
Beside email and website phishing, there are phishing methods like 'vishing' (voice phishing), 'smishing' (SMS Phishing).
SOME FEATURES OF PHISHING EMAILS
The Emails are usually Too Good To Be True with a sense of Urgency, telling you to click on the link fast because the offers are limited.
They may tell you that your account will be suspended unless you update your personal details immediately and with attachments you are supposed to click on and from an unusual sender.
Whether it looks like it's from someone you know or don't know if anything seems out of the ordinary, unexpected, out of character or just suspicious please don't click on it the link. It might just be phishing.
Answer:
Explanation:
Download and install Microsoft Office applications
1. Log into your Microsoft Office 365 portal. ...
2. In the top right corner, click Install Office apps.
3. Select Office 2016. ...
4. If prompted, click the Save File button, to allow the download.
5. The install file will download to your computer.
6. When you launch the new applications, log in with your Office 365 email address and password.
The <u>TCP</u> hijacking attack uses ip spoofing to enable an attacker to impersonate another entity on the network.
<h3>What is a TCP hijacking attack?</h3>
TCP is a term that connote the Transmission Control Protocol a communications standard that helps application programs as well as computing devices to pass messages over a network.
This hijack is known to be a kind of cyber attack where it is found to be an authorized user that tend to gets control to a legitimate linkage of another client in the network.
Note that by the hijacked of the said TCP/IP session, the attacker can be able to read and change transmitted data packets and thus,The <u>TCP</u> hijacking attack uses ip spoofing to enable an attacker to impersonate another entity on the network.
Learn more about <u>TCP</u> hijacking attack from
brainly.com/question/15052311
#SPJ1