1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
4 years ago
11

What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to di

sclose sensitive information or click on a link?
Computers and Technology
1 answer:
Len [333]4 years ago
7 0

Answer:

It is called Phishing

Explanation:

In computer security, phishing is an attempt by fraudsters to steal very important information from victims. These information most times are the login credentials such as debit/credit card details, usernames and passwords/PIN etc. Fraudsters carryout phishing by sending out messages (mostly electronic mails) to their victims, these messages appear as though they are genuine and official from institutions known to the victim (for example banks). Once the victim opens the email, he/she will be tricked to click on  links that lead to the Phisher's website where sensitive information can be stolen.

You might be interested in
What these large numbers in unemployment could mean long term for America?
riadik2000 [5.3K]

Answer:

Im twelve but i know something about economics. The more homeless the more free coupons the government give out which the middle and high class pay for. The more people the higher the taxes and inflation causing the middle class to shrink making only rich and poor people. The U.S. then will have more homeless.

Explanation: Larg bwain finking

6 0
4 years ago
Font size, font style, and _______ are all aspects of character formatting.
mel-nik [20]
The answer, im prettysure, is d. typeface.
hope this helps (:

6 0
3 years ago
Read 2 more answers
Read the description of Mike’s work, and identify his profession. Mike’s job is to record sounds in a studio. He studies a video
kipiarov [429]
Mike is a Sound Engineer
7 0
3 years ago
Read 2 more answers
Which of the following is a reliable source of information: a book recommended from my professor, britannica, a blog, or wikiped
ratelena [41]
A book recommended from your professor is a reliable source of information.
8 0
3 years ago
How does inertia affect a person who is not wearing a seatbelt during a collision
disa [49]
Inertia would keep them going the same speed as the car was going. therefore, the person not wearing a seatbelt would be sent flying forward, probably ending up dead
8 0
3 years ago
Other questions:
  • show how one version of the technology is an improvement over a previous iteration of that same technology
    11·1 answer
  • What is the difference between a sequential program and an event-driven program?
    9·1 answer
  • Which device makes computers that are connected to separate segments appear and behave as if they're on the same segment? (Pleas
    11·1 answer
  • A circuit breaker will do which of the following
    12·1 answer
  • Good Morning! Please Help!
    15·1 answer
  • Employers can use spyware to track program usage by employees.
    12·1 answer
  • Suppose you are working in a computer lab during the work you are facing window failure or other technical issues.How you will s
    12·1 answer
  • Do anyone else receive random points from Brainly… because I swear I had like 2K+ something and I check and Im at ACE… and with
    10·1 answer
  • Koi jinda hei kya hello​
    13·2 answers
  • Which of the following describe the characteristics of a good logo? Choose all that apply. It is a complex design It is memorabl
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!